coded continuous-phase fsk: information theoretic limits...

160
Coded Continuous-phase FSK: Information Theoretic Limits and Receiver Design Shi Cheng Dissertation submitted to College of Engineering and Mineral Resources at West Virginia University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical Engineering Matthew C. Valenti, Chair Erdogan Gunel Daryl S. Reynolds Natalia A. Schmid Brian D. Woerner Lane Department of Computer Science and Electrical Engineering Morgantown,West Virginia 2007 Keywords: Orthogonal Modulation, Continuous-phase Frequency Shift Keying, Error Control Coding, Channel Estimation c 2007, Shi Cheng

Upload: others

Post on 22-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Coded Continuous-phase FSK:

Information Theoretic Limits and Receiver Design

Shi Cheng

Dissertation submitted toCollege of Engineering and Mineral Resources

at West Virginia Universityin partial fulfillment of the requirements for the degree of

Doctor of Philosophyin

Electrical Engineering

Matthew C. Valenti, ChairErdogan Gunel

Daryl S. ReynoldsNatalia A. SchmidBrian D. Woerner

Lane Department of Computer Science and Electrical Engineering

Morgantown,West Virginia2007

Keywords: Orthogonal Modulation, Continuous-phase Frequency ShiftKeying, Error Control Coding, Channel Estimation

c© 2007, Shi Cheng

UMI Number: 3300892

33008922008

UMI MicroformCopyright

All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code.

ProQuest Information and Learning Company 300 North Zeeb Road

P.O. Box 1346 Ann Arbor, MI 48106-1346

by ProQuest Information and Learning Company.

ABSTRACT

Coded Continuous-phase FSK:

Information Theoretic Limits and Receiver Design

Shi Cheng

Continuous-phase frequency shift keying (CPFSK) is a type of frequency shift key-

ing (FSK) that maintains phase continuity from symbol to symbol. The bandwidth

efficiency of a CPFSK waveform is characterized by its modulation index, number of

frequency tones and channel coding rate. These parameters can be flexibly designed to

meet different bandwidth and energy requirements in wireless communication systems.

One special case of CPFSK, orthogonal FSK, could be applied when bandwidth con-

straints are loose. By increasing the number of frequency tones, the energy efficiency

can be improved at the expense of spectral efficiency. In this dissertation, the general

case of orthogonal FSK, orthogonal modulation is first studied. Capacity, convergence

behavior and asymptotic error rates of coded orthogonal modulation are analyzed. In

addition to coherent detection, we consider noncoherent detection as well, which is one

benefit of CPFSK. More often, CPFSK is designed to achieve high spectral efficiency

by reducing its modulation index. The general case of nonorthogonal CPFSK is then

studied. Capacity, spectral efficiency and capacity approaching code design are discussed

for both coherent and noncoherent CPFSK.

In addition to the system design and information theoretic issues, channel estimation

for noncoherent CPFSK is considered. An iterative channel estimation, demodulation

and decoding algorithm is derived using the expectation maximization (EM) algorithm.

Finally, we apply noncoherent CPFSK to frequency hopping (FH) networks, leverag-

ing the results acquired throughout the dissertation. Simulations show FH networks

with CPFSK modulation and channel estimation can achieve robust performance against

partial-band and multiple-access interference.

iii

Acknowledgments

First, I would like to thank Dr. Valenti for offering me the opportunity to study

at West Virginia University and sponsoring my research on wireless communications.

His insightful suggestions are invaluable to my research work, and I enjoyed very much

working for him. Besides, for all my papers and presentations, Dr. Valenti also helped

me a lot, giving me very detailed comments on both technology and English grammar.

He is a terrific advisor and researcher, and I have learned a lot from him.

Next, I would like to thank my committee members for giving assistance to my dis-

sertation work. They are Dr. Erdogan Gunel, Dr. Daryl S. Reynolds, Dr. Natalia A.

Schmid and Brian D. Woerner. I was fortunate to take courses from all of them, which

provides a broad background for my research.

I would also like to give special thanks to Dr. Don Torrieri at U.S. Army Research

Lab. He is one of my major co-authors of several papers, and provided extremely helpful

notes and advices to my research work on CPFSK and frequency hopping networks in

Chapter 4-7.

I would also thank my colleague, Dr. Rohit Iyer Seshadri, for helping verify my results

and comment my papers. Finally, I would like to appreciate my parents for their great

support and encouragement.

Contents

Abstract ii

Acknowledgments iii

List of Tables vii

List of Figures xiii

1 Introduction 1

1.1 Channel Coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.1.1 Linear Block Codes . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.1.2 Convolutional Codes . . . . . . . . . . . . . . . . . . . . . . . . . 4

1.1.3 Turbo Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

1.2 Channel Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.3 Organization of This Dissertation . . . . . . . . . . . . . . . . . . . . . . 11

2 Coded Orthogonal Modulation 14

2.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

2.1.1 Transmitter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

2.1.2 Channel and Receiver Front-End . . . . . . . . . . . . . . . . . . 16

2.1.3 Receiver Back-End . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2.2 BICM vs BICM-ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

2.2.1 BICM Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

2.2.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . 26

iv

CONTENTS v

2.2.3 Convergence and Capacity Analysis . . . . . . . . . . . . . . . . . 29

2.3 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

3 Asymptotic Analysis of Coded Orthogonal Modulation 38

3.1 Union Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

3.1.1 Joint Inner Code and Modulation Trellis . . . . . . . . . . . . . . 40

3.1.2 Union Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

3.2 Pairwise Error Probability . . . . . . . . . . . . . . . . . . . . . . . . . . 48

3.2.1 Coherent Detection . . . . . . . . . . . . . . . . . . . . . . . . . . 48

3.2.2 Noncoherent Detection . . . . . . . . . . . . . . . . . . . . . . . . 49

3.3 Results and Performance Analysis . . . . . . . . . . . . . . . . . . . . . . 52

3.4 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

4 Coherent CPFSK 57

4.1 Coherent Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

4.2 Capacity of Coherent Detection . . . . . . . . . . . . . . . . . . . . . . . 61

4.3 Capacity under Spectral Efficiency Constraint . . . . . . . . . . . . . . . 64

4.4 Coded System Implementation . . . . . . . . . . . . . . . . . . . . . . . . 66

4.5 Code Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

4.5.1 Degree Distribution Optimization . . . . . . . . . . . . . . . . . . 73

4.5.2 Symbol Labeling Issues . . . . . . . . . . . . . . . . . . . . . . . . 74

4.5.3 Interleaver Design Issues . . . . . . . . . . . . . . . . . . . . . . . 76

4.6 Optimization and Simulation Results . . . . . . . . . . . . . . . . . . . . 79

4.7 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

5 Noncoherent CPFSK 84

5.1 Capacity of Symbol-by-symbol Noncoherent Detection . . . . . . . . . . 85

5.2 Capacity under Spectral Efficiency Constraint . . . . . . . . . . . . . . . 87

5.3 Multi-symbol Noncoherent Detection . . . . . . . . . . . . . . . . . . . . 93

5.4 Code Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

5.5 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

CONTENTS vi

6 Channel Estimation of Noncoherent FSK 100

6.1 Channel Estimator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

6.1.1 Iterative Decoding, Demodulation and Channel Estimation . . . . 101

6.1.2 EM Channel Estimator . . . . . . . . . . . . . . . . . . . . . . . . 102

6.2 Reduced Complexity Estimation . . . . . . . . . . . . . . . . . . . . . . . 106

6.2.1 Linear Approximation of F (·) . . . . . . . . . . . . . . . . . . . . 106

6.2.2 Hard Limiting of pk,i . . . . . . . . . . . . . . . . . . . . . . . . . 108

6.3 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

6.4 Complexity Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

6.5 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

7 Application of CPFSK to FH Networks 115

7.1 Frequency Hopping Networks . . . . . . . . . . . . . . . . . . . . . . . . 116

7.2 CPFSK-FH Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

7.3 Partial Band Jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

7.4 Asynchronous Multiple Access Interference . . . . . . . . . . . . . . . . . 123

7.5 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

8 Summary and Future Work 128

8.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

8.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

A Outage Probability of Interference Channels 132

B Minimum Value of Φ∆(δ) of noncoherent detection 134

References 136

List of Tables

2.1 Minimum Eb/N0 required to achieve a BER of 10−5 using the 6138 bit

cdma2000 turbo code, M-ary noncoherent orthogonal modulation, and

either BICM or the proposed BICM-ID technique. The corresponding

Shannon capacities and EXIT thresholds are also given. . . . . . . . . . . 36

4.1 Capacity and code optimization results for spectral efficiency η = 0.5

bps/Hz. The ith element of the labeling vector is the octal value of the bit

pattern labeling symbol qi. The simulation Eb/N0 is the value for which a

system with Nu = 100, 000 message bits and 200 decoder iterations reaches

a simulated BER of 10−5. . . . . . . . . . . . . . . . . . . . . . . . . . . 82

5.1 Optimized codes for MSK at rate r = 0.5. For each of the coherent and

multi-symbol noncoherent (N = 4) detectors, the degree distributions,

capacity, and thresholds are listed. . . . . . . . . . . . . . . . . . . . . . 97

6.1 Number of operations required for each type of estimator to execute one

EM iteration per block of N symbols. M is the modulation order and R

is the number of recursions used to solve (6.16). . . . . . . . . . . . . . . 113

vii

List of Figures

1.1 Convolutional encoders . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

1.2 Turbo code structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

1.3 General channel model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.4 Unconstrained Gaussian capacity vs BPSK capacity . . . . . . . . . . . . 9

1.5 Two dimensional unconstrained capacity vs CM capacities . . . . . . . . 10

2.1 System model diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2.2 CM capacity vs BICM capacity of 2 dimensional modulation in AWGN

channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

2.3 CM capacity vs BICM capacity for coherent orthogonal modulation in

AWGN channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

2.4 BER performance in Rayleigh fading (noncoherent detection with CSI) of

the r(o) = 1/4 input-length Nu = 6138 bit cdma2000 turbo code using 64-

ary orthogonal modulation and both BICM (dashed line) and BICM-ID

(solid line). From right to left, the curves show performance after 1, 2, 3,

4, 5, 10, 16, and 30 iterations. . . . . . . . . . . . . . . . . . . . . . . . . 28

2.5 Extrinsic information transfer characteristics for soft noncoherent demod-

ulator of orthogonal modulation in AWGN at ES/N0 = 3 dB for several

values of M . Also shown (dashed lines) is the CM capacity of M =

{2, 4, 16, 64}. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

viii

LIST OF FIGURES ix

2.6 EXIT chart for BICM-ID using M = 16 orthogonal modulation and the

rate R = 1/4 length cdma2000 turbo code in Rayleigh fading with nonco-

herent detection CSI at Eb/N0 = 4 dB. Two average decoding trajectories

are shown: The narrower trajectory is for a K = 6138 bit interleaver and

one local channel decoding iteration per global iteration, and the wider tra-

jectory is for a K = 20730 bit interleaver and two local channel decoding

iterations per global iteration. . . . . . . . . . . . . . . . . . . . . . . . . 32

2.7 Minimum Eb/No required to achieve BER = 10−4 and thresholds pre-

dicted by EXIT analysis as a function of code rate R over an AWGN

channel using M-ary orthogonal modulation with noncoherent detection

and the K = 6138 bit cdma2000 turbo code. For M = 2 two points are

shown: The upper point is the simulated value and the lower point is the

EXIT threshold. For M = {4, 16, 64} four points are shown, from top to

bottom: (1) Simulated BICM receiver; (2) Threshold for BICM; (3) Sim-

ulated BICM-ID receiver; and (4) Threshold for BICM-ID. For reference,

the corresponding BICM (dashed) and CM (solid) capacities are shown. . 33

2.8 Minimum Eb/No for a fully interleaved Rayleigh flat-fading channel using

M-ary noncoherent modulation and noncoherent detection with channel

state information. See caption to Fig. 2.7 for full description. . . . . . . 34

2.9 Minimum Eb/No for a fully interleaved Rayleigh flat-fading channel using

M-ary noncoherent modulation and noncoherent detection with no channel

state information. See caption to Fig. 2.7 for full description. . . . . . . 35

3.1 BICM-ID Simulation results of length 6138 turbo coded and convolution-

ally coded orthogonal modulation in AWGN channel, noncoherent detec-

tion. Results shown are up to 20th iteration. . . . . . . . . . . . . . . . . 39

3.2 Trellis merging for the inner code. . . . . . . . . . . . . . . . . . . . . . . 41

3.3 The calculation of tail terminated error events . . . . . . . . . . . . . . . 44

3.4 The concatenation of g(o) = [1 + D4, D + D3 + D4] and g(i) = 1/(1 + D),

with information size Nc = 400 and M = 4, noncoherent reception. The

simulation runs up to 20th iteration. . . . . . . . . . . . . . . . . . . . . . 47

LIST OF FIGURES x

3.5 Bounds of BICOM g(i) = 1 and BICOM-DP g(i) = 1/(1 + D). Both

systems has the outer code g(o) = [1 + D2, 1 + D + D2], 16-ary orthogonal

modulation, fully interleaved Rayleigh fading channel, and noncoherent

Reception with CSI. Simulation results are shown for Nc = 400. The

simulations ran up to 20th iteration. . . . . . . . . . . . . . . . . . . . . . 53

3.6 Bounds of BICOM g(i) = 1 and BICOM-DP g(i) = 1/(1 + D). Both

systems has the outer code g(o) = [1 + D2, 1 + D + D2], 8-ary orthogonal

modulation, AWGN channel, and coherent Reception. Simulation results

are shown for Nc = 600. The simulations ran up to 20th iteration. . . . . 54

3.7 Bounds of BICOM-DP with the outer code g(o) = [1 + D2 + D3, 1 + D +

D2 + D3], 16-ary orthogonal modulation, Nc = 1000. All five channel

reception combinations are shown. . . . . . . . . . . . . . . . . . . . . . 55

3.8 Bounds and simulation results of BICOM and BICOM-DP in AWGN chan-

nel, noncoherent detection . . . . . . . . . . . . . . . . . . . . . . . . . . 56

4.1 Capacities of MSK (M = 2, h = 1/2): From left to right, they are i.u.d.

capacity of coherent detection, i.u.d. capacity of BICM detection and

symbol-wise noncoherent capacity respectively. . . . . . . . . . . . . . . . 64

4.2 Capacities of binary CPFSK for different spectral efficiency constraints.

From top to bottom, the spectral efficiencies are η = 0.75, η = 0.5, η =

0.25 and η = 0.02. h is considered with the denominator up to 5. So from

left to right, they are 15, 1

4, 1

3, 2

5, 1

2, 3

5, 2

3, 3

4and 4

5respectively. Also, the

memoryless orthogonal case h = 1 is listed for reference. . . . . . . . . . 66

4.3 CPFSK capacities of different M for spectral efficiency η = 0.5. h is

considered with the denominator up to 5. So from left to right, they are15, 1

4, 1

3, 2

5, 1

2, 3

5, 2

3, 3

4and 4

5respectively. . . . . . . . . . . . . . . . . . . 67

4.4 Nonsystematic IRA coding structure. “=” corresponds to variable nodes

and “+” corresponds to single parity-check nodes. . . . . . . . . . . . . . 68

4.5 Inner code EXIT curves of M = 4, h = 1/3 with gray and natural label-

ings. Es/N0 = 0dB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

4.6 Gray and natural labelings of M = 4, h = 1/3 . . . . . . . . . . . . . . . 76

LIST OF FIGURES xi

4.7 Bad interleaver designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

4.8 Counter example of the lower bound on ρ1 in (4.43) . . . . . . . . . . . . 78

4.9 Optimized EXIT curves for M = 4, h = 1/3 with natural labeling. . . . . 80

4.10 BER of optimized M = 4, h = 1/3 system. The system has uncoded bits

Nu = 100, 000, and the figure shows the BERs of 50,60,70,80,90,100,150

and 200 iterations from top to bottom. . . . . . . . . . . . . . . . . . . . 81

5.1 Capacity of binary CPFSK . . . . . . . . . . . . . . . . . . . . . . . . . . 86

5.2 Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarily

low error rate versus modulation index h in AWGN with M = 2 for several

spectral efficiencies η = {0, 1/3, 1/2, 1}. For fixed h, the minimum Eb/N0

increases with η. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

5.3 Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarily

low error rate versus modulation index h in AWGN for several modulation

orders M = {2, 4, 8, 16, 32, 64} and spectral efficiencies η = {0, 1/2}. . . 89

5.4 Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarily

low error rate versus modulation index h in Rayleigh fading for several

modulation orders M = {2, 4, 8, 16, 32, 64} and spectral efficiencies η =

{0, 1/2}. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

5.5 Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarily

low error rate versus spectral efficiency η in AWGN for several modulation

orders M = {2, 4, 8, 16, 32, 64}. For fixed η the minimum Eb/N0 decreases

with increasing M . The values at η = 0 correspond to the orthogonal FSK

capacity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

5.6 Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarily

low error rate versus spectral efficiency η in Rayleigh fading for several

modulation orders M = {2, 4, 8, 16, 32, 64}. For fixed η the minimum

Eb/N0 decreases with increasing M . The values at η = 0 correspond to the

orthogonal FSK capacity. . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

5.7 Capacity of MSK using multi-symbol noncoherent and coherent detection. 95

LIST OF FIGURES xii

5.8 Nonsystematic IRA coding structure. “=” corresponds to variable nodes

and “+” corresponds to single parity-check nodes. . . . . . . . . . . . . . 96

5.9 EXIT curves of inner codes without accumulator . . . . . . . . . . . . . . 97

5.10 EXIT curve-matching result of N = 4 noncoherent detection of MSK . . 98

5.11 BER of MSK with rate r = 0.5 coding designed using EXIT curve-fitting. 98

6.1 F (x) = I1(x)/I0(x) and its linear approximation. . . . . . . . . . . . . . . 107

6.2 BER comparison of the different estimators in block Rayleigh fading with

N = 4 symbols per block. The system uses 16-FSK modulation and the

rate 1/2 cdma2000 turbo code (Nu = 1530 input bits). Shown from left

to right is performance with: (1) a√ES and N0 known for each block; (2)

The full-complexity EM estimator; (3) Estimator EM-H, which makes hard

decisions on pk,i; (4) Estimator EM-L, which uses a linear approximation to

the F (·) function; and (5) Estimator EM-H/L, which makes hard decisions

on pk,i and uses a linear approximation to F (·). . . . . . . . . . . . . . . 110

6.3 Influence of the block length N on the BER performance in block Rayleigh

fading. For each value of N = {4, 8, 16, 32}, two curves are shown. The left

curve (dashed line) shows performance when a√ES and N0 are known for

each block; the right curve (solid line) shows performance with Estimator

EM-H/L. The system uses 16-FSK modulation and the rate 1/2 cdma2000

turbo code (Nu = 1530 input bits). . . . . . . . . . . . . . . . . . . . . . 111

6.4 Performance in AWGN as a function of block length N . The performance

with known ES and N0 (dashed lines) is compared against the performance

with Estimator EM-H/L. Modulation is 16-FSK. The code is the rate 1/2

cdma2000 turbo code with Nu = 1530. . . . . . . . . . . . . . . . . . . . 112

7.1 Throughput Efficiency of FH network in Rayleigh fading environment,

Eb/N0 = 3dB, J = 20 transmitters . . . . . . . . . . . . . . . . . . . . . . 119

LIST OF FIGURES xiii

7.2 Minimum Eb/N0 required for frequency hopping system to achieve BER at

10−3 versus fraction of partial band interference µ, Eb/It0 = 10dB, 32 hops

per codeword, 4-ary CPFSK, h = 0.46, Rayleigh fading, Rician fading

K = 10dB, AWGN channel from top to bottom. UMTS turbo code is

used, with Nu = 2048 information bits and rate r(o) = 16/27. . . . . . . 121

7.3 Minimum Eb/N0 required for frequency hopping system to achieve BER at

10−3 versus fraction of partial band interference µ, Eb/It0 = 10dB, 32 hops

per codeword, 8-ary CPFSK, h = 0.32, Rayleigh fading, Rician fading

K = 10dB, AWGN channel from top to bottom. UMTS turbo code is

used, with Nu = 2048 information bits and rate r(o) = 8/15. . . . . . . . 122

7.4 Minimum Eb/N0 required for frequency hopping system to achieve BER at

10−3 versus fraction of partial band interference µ, Eb/It0 = 13dB, Rayleigh

fading, 4-ary CPFSK(M = 4), h = 0.46, 16,32,64 hops per codeword from

top to bottom. UMTS turbo code is used, with Nu = 2048 information

bits and rate r(o) = 16/27. . . . . . . . . . . . . . . . . . . . . . . . . . . 123

7.5 Minimum Eb/N0 required for frequency hopping system to achieve BER at

10−3 versus fraction of partial band interference µ, Eb/It0 = 13dB, Rayleigh

fading, 8-ary CPFSK(M = 8), h = 0.32, 16,32,64 hops per codeword from

top to bottom. UMTS turbo code is used, with Nu = 2048 information

bits and rate r(o) = 8/15. . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

7.6 Minimum Eb/N0 required for frequency hopping system to achieve BER at

10−4 in multiples access interference, Rayleigh fading, 32 hops per code-

word. UMTS turbo code is used, with Nu = 2048 information bits, rate

r(o) = 1/3 for orthogonal case and r(o) = 16/27 and 8/15 for nonorthogonal

4CPFSK and 8CPFSK respectively. . . . . . . . . . . . . . . . . . . . . . 126

Chapter 1

Introduction

The introduction of turbo codes [1] and rediscovery of low density parity check (LDPC)

codes [2,3] have drawn the attention of the communications research community towards

a deeper understanding of the information theoretic limits of digital communication sys-

tems. These limits include capacity, spectral efficiency and asymptotic performance.

Such information theoretic research provides a benchmark for designing practical sys-

tems, and is important especially for the wireless environment, where the channel is poor

due to severe fading or interference, and the power is limited by the battery.

A practical digital communication system includes channel coding and digital modula-

tion, and their counterparts at the receiver. Modern channel coding, e.g. turbo codes [1]

and LDPC codes [2], can approach the capacity closely. The background of channel

coding is reviewed in Section 1.1. Next the concept of channel capacity is introduced

in Section 1.2. With a capacity-approaching code, the constrained channel capacity is

a more important metric than the uncoded error rate. The modulation constrained ca-

pacity is also discussed in this section. Finally, the organization of the remainder of the

dissertation is given in Section 1.3.

1.1 Channel Coding

Channel coding is a technique that uses redundant information to protect data commu-

nicated through the channel. By encoding the data stream with some redundancy, the

1

CHAPTER 1. INTRODUCTION 2

decoder at the receiver could still possibly recover the data even though the transmission

is corrupted by noise or interference.

In 1948, Shannon’s channel coding theorem [4] stated that if the data rate R is below

the channel capacity C, there exists a way to achieve reliable communications with an

arbitrarily small error probability. Shannon outlined the ideas of the proof in [4], and

the rigorous proof was made much later [5]. The full proofs can now be found in [6] [7],

and they follow the basic idea given by Shannon, using long random codewords. While

the idea of using long random codewords is a useful strategy for proving the theorem,

practical channel coding requires some structure to permit finite complexity encoding

and decoding algorithms.

After the pioneering work by Shannon, there were a lot of contributions in the art of

error control coding. However, practical codes could not approach capacity until Berrou

et al. invented turbo codes in 1993 [1]. Then LDPC codes were reinvestigated [3] using

the idea of iterative decoding from turbo codes, although LDPC codes were first invented

in 1960’s by Gallager [2]. Both turbo codes and LDPC codes are shown to be within 1

dB of the capacity limit.

In the rest of this section, we will introduce linear block codes, convolutional codes

and turbo codes.

1.1.1 Linear Block Codes

A block code is a set of fixed length vectors, whose elements are chosen from an alphabet

of q symbols. When q = 2 and the alphabet has only 0 and 1, the code is said to be

binary. To limit the length and the scope of this dissertation, we will only have a brief

introduction of binary codes here.

If the length of a binary block code is n, there are a total of 2n possible combinations

of the {0, 1} sequence. We may choose a set of 2k, k < n, of them to be the code C. Such

a code is said to have rate R = k/n, usually referred as an (n, k) code. If the modulo 2

sum of any two codewords from C is still in the set, the code is called a linear code. Note

that any codeword added to itself produces all-zeros, which means all linear binary codes

always have the all-zeros codeword. For any two codewords, the Hamming distance is

CHAPTER 1. INTRODUCTION 3

the number of bit positions that differ. For a linear binary code, the minimum Hamming

distance is the minimum Hamming weight (number of ones in a codeword) of all the

codewords except for the all-zeros codeword.

By using linear algebra over the Galois Field GF(2), we can represent the encoding

as,

cT = uTG, (1.1)

where c is a length n column vector representing the coded bits, and u is a length k

column vector representing the uncoded information bits. G is a k × n matrix, called

the generator matrix, whose elements are either 0 or 1. In order to generate 2k distinct

codewords, the rows of G must be linearly independent, which means G needs to be a

full rank matrix or its rows must span a k dimensional subspace of {0, 1}n.

If G has the form of

G = [Ik | P] , (1.2)

the first k bits in c is the same as u. We call such a code a systematic code, the first k

bits of c the systematic bits, and the n− k redundant bit the parity bits.

For any (n, k) linear code, there is always a dual code C⊥ of dimension n − k whose

codewords are orthogoal to all codewords in C. Suppose such a dual code has generator

matrix H of size (n− k)× n. It is easy to see that

GHT = 0, (1.3)

and for any c generated by G,

cTHT = 0. (1.4)

With respect to the (n, k) code, we call H the parity check matrix. For the special case

CHAPTER 1. INTRODUCTION 4

of the systematic code in (1.2), H could be written as

H =[PT | I(n−k)

]. (1.5)

Equation (1.4) plays an important role in decoding. The simplest method is hard

decision decoding. The received vector can be represented as (c+e), where e is the error

vector imposed by the channel. The decoder first finds the syndrome s by multiplying

the received vector by the parity check matrix H,

sT , (c + e)THT = eTHT . (1.6)

Then the decoder looks for the error pattern of e in a predefined table, and then deter-

mines the uncoded information u.

1.1.2 Convolutional Codes

Convolutional codes are encoded by passing the uncoded bits through a finite state shift

register. The encoder for a (n, k, K) convolutional code reads in k bits at a time, passes

the input bits through a shift register with K − 1 stages, and outputs n bits at a time.

K is also called the constraint length of the convolutional code. Fig. 1.1(a) shows

an example of (2,1,4) convolutional code. In order to represent the logic of each tap

associated with each output, we can use generators. The generators in Fig. 1.1(a) can be

written in binary form as g1 = [1011] and g2 = [1101]. Conventionally, we use the octal

form [13,15]. Another way to represent the encoder is the generator polynomial. In this

format, the generator polynomial for the code in Fig. 1.1(a) is [1+D2 +D3, 1+D +D3].

While the two generator polynomials are both feed forward, there is another type

of convolutional code called recursive systematic convolutional (RSC) code, which has

a feedback polynomial. Fig. 1.1(b) shows an example recursive encoder. Basically, the

upper parallel output in 1.1(a) is fed back to the first stage of the shift register. Usually,

we use [1, 15/13] in octal form or the generator polynomials [1, (1+D+D3)/(1+D2+D3)]

to represent the code.

While both codes above have the same codeword set, they have different mapping

CHAPTER 1. INTRODUCTION 5

D D D

g 1

g 2

u

(a) Nonrecursive convolutional encoder

D D D

g 1

g 2

u

(b) Recursive convolutional encoder

Figure 1.1: Convolutional encoders

rules for the encoding. In a nonrecursive code, a single ‘1’ at the input will take the

encoder out of the all zeros state, but the encoder will return to the all-zeros state after

K − 1 consecutive inputs of ‘0’. On the other hand, with a RSC code, the same input

will drive the encoder out of the all-zeros state where it will remain indefinitely, or until

a second ‘1’ is input to the encoder. For this reason, nonrecursive encoders can be

considered to be finite impulse response (FIR) systems, while RSC encoders are infinite

impulse response (IIR) systems.

The Viterbi Algorithm [8] is a widely used algorithm for maximum likelihood sequence

estimation (MLSE), which minimizes the codeword error rate. In recent years, with the

emergence of the turbo codes, the BCJR algorithm [9], which performs maximum a

posteriori (MAP) decoding, has also become widely used.

1.1.3 Turbo Codes

Turbo codes, also called parallel concatenated convolutional codes (PCCC), were intro-

duced by Berrou et al. in 1993 [1]. A turbo encoder is shown in Fig. 1.2(a). The uncoded

bit stream is encoded by the upper recursive convolutional encoder, and the uncoded bits

are bit-wise interleaved and then encoded by the lower recursive convolutional encoder.

The two convolutional encoders could be either identical or different. An optional punc-

turing could be applied on the parity bits from either or both convolutional encoders. In

the case of no puncturing, the turbo encoder will produce one copy of the information

CHAPTER 1. INTRODUCTION 6

bits c(i), one copy of the parity bits from the upper encoder c(u) and one copy of the

parity bits from the lower encoder c(l).

u

Upper Convolutional

Encoder

Lower Convolutional

Encoder

I n t e

r l e a

v e r

c (i)

c (l)

c (u)

(a) Turbo encoder

y

Upper SISO

Lower SISO

D e

i n t e

r l e

a v e

r

z (i)

I n t e

r l e

a v e

r

z e (u) z (u)

z' e (l)

z e (l)

Demodulator

z' e (u)

z' (i)

z' (l)

(b) Turbo decoder

Figure 1.2: Turbo code structure

The turbo decoder is shown in Fig. 1.2(b). It has two soft in soft output (SISO)

convolutional decoders, working in an iterative manner [10]. First, the soft demodulator

calculates the bit-wise log likelihood ratio (LLR) for both information bits and parity

bits. Assuming the modulation is binary and the channel is memoryless, the LLR of xi

is calculated based on the channel observation yi,

zci = logp(yi|ci = 1)

p(yi|ci = 0). (1.7)

Then z(i)c and z

(u)c is then forwarded to the upper SISO decoder. Also, the upper SISO

decoder takes z(l)e from the lower SISO decoder, called extrinsic information, which is the

information that the other component decoder provides for iterative processing. Initially,

the extrinsic information is set to be all-zeros, and it is updated during the decoding, as

we will discuss later. The upper SISO decoder then performs the BCJR algorithm and

produces

z(u)i = log

p(ci = 1|z(i)c , z

(u)c , z

(l)e )

p(ci = 0|z(i)c , z

(u)c , z

(l)e )

. (1.8)

The extrinsic information is calculated by

z(u)e,i = z

(u)i − z

(i)c,i − z

(l)e,i . (1.9)

CHAPTER 1. INTRODUCTION 7

z(u)e is then interleaved to z

′(u)e . Here we use ′ to represent the interleaved copy of the

signal. The lower SISO decoder then takes z′(u)e , z

′(i)c and z

′(l)c to produce

z′(l)i = log

p(ci = 1|z′(i)c , z′(l)c , z

′(u)e )

p(ci = 0|z′(i)c , z′(l)c , z

′(u)e )

. (1.10)

After deinterleaving, if z(l) satisfies a stopping criteria1, the decoding iteration stops and

the hard decision of z(l) is produced as the output. Otherwise, the deinterleaved extrinsic

information of the lower SISO decoder is calculated,

z(l)e,i = z

(l)i − z

(i)c,i − z

(u)e,i . (1.11)

Thus, (1.8), (1.9), (1.10) and (1.11) work in an iterative manner.

Berrou used the same recursive convolutional code [1, 1+D4/1+D+D2+D3+D4] for

both upper and lower encoder in [1], which has a constraint length 5. In this dissertation,

we will use either CDMA2000 turbo code [15] or UMTS turbo code [16] with a lower

constraint length of 4. These two turbo codes have well designed interleavers, and have

a wide range of coding rates and lengths.

CDMA2000 turbo code supports the information sequence length {378, 570, 762,

1146, 1530, 2398, 3066, 4602, 6138, 9210, 12282, 20730} and rate {1/2,1/3,1/4,1/5}. It

uses a pair of rate 1/3 recursive systematic convolutional constituent codes with generator

polynomials [1, (1 + D + D3)/(1 + D2 + D3), (1 + D + D2 + D3)/(1 + D2 + D3)]. The

unpunctured rate of the code is 1/5. Rate 1/4 is achieved by puncturing every other bit

in the second parity stream; rate 1/3 is achieved by puncturing the entire second parity

stream; rate 1/2 is achieved by puncturing the entire second parity stream and every

other bit in the first parity stream.

UMTS turbo code supports any information sequence length from 40 to 5114. It has

the same constituent encoders as the one in Fig. 1.1(b), which is the same as CDMA2000

turbo code at rate 1/3. The base rate of the UMTS code is 1/3, but the standard also

1Different stopping criteria for turbo decoding are studied in [11–14]. Among these stopping criteria,cross entropy check is based on the soft output of the decoder, while sign check and cyclic redundancycheck (CRC) is based on the hard decision output. In this dissertation, we assume perfect CRC, i.e. thecomplexity and the error rate induced by CRC are zero.

CHAPTER 1. INTRODUCTION 8

EncoderChannelp(Y|X)

Decoder

X Y

Figure 1.3: General channel model

has a rate matching procedure which supports any rate above 1/3.

1.2 Channel Capacity

A general channel model is shown in Fig. 1.3. It has input X and output Y , and can be

modelled by its transition probability p(Y |X). The capacity of the channel is defined as

C , maxp(x)

I(X; Y ), (1.12)

where I(X; Y ), the mutual information between X and Y , is defined as

I(X; Y ) , E

[log

p(X, Y )

p(X)p(Y )

], (1.13)

and the maximization in (1.12) is taken over all possible input distributions p(x).

A simple but widely used channel model is the Additive White Gaussian Noise

(AWGN) channel. Under the input signal average power constraint E(X2) 6 ES, the

capacity is

C =1

2log2

(1 +

2ES

N0

)bits/channel use, (1.14)

where N0 is the one sided noise spectral density of the channel. By Shannon’s channel

coding theorem, any data rate R 6 C is achievable, and conversely, it is not possible for

any rate R > C to be supported with an arbitrarily low error probability [4]. Equation

(1.14) is achieved by choosing X to be Gaussian distributed with zero mean and variance

ES. In this case, X has an infinite alphabet size. Since there is no other constraint on X

except for the power constraint, we call this capacity C the unconstrained capacity.

CHAPTER 1. INTRODUCTION 9

Es/No(dB)

C a p

a c i t y

( b i

t s )

-15 -10 -5 0 5 10 15 20 0

0.5

1

1.5

Unconstrained Gaussian Capacity CM Capacity: BPSK

Figure 1.4: Unconstrained Gaussian capacity vs BPSK capacity

However, the Gaussian input pdf for X is not feasible due to its infinite alphabet

size and unbounded instantaneous power maxX2. Instead, in practical communication

system, X must be chosen from a finite alphabet X . This selection process is called

modulation, and X is the constellation of the modulation. When the source is appropri-

ately encoded, each constellation point will occur with equal probability. Therefore, the

channel capacity under modulation constraints can be written as

C = log2 |X | − E

[log2

∑|X |−1k=0 p(Y |Xk)

p(Y |X)

], (1.15)

where |X | is the cardinality of X . Usually, (1.15) does not have a closed form solu-

tion when the expectation involves a multi-dimensional integral. Instead, Monte-Carlo

integration can be used to find a numerical solution.

Fig. 1.4 shows the unconstrained Gaussian channel capacity and binary phase shift

keying (BPSK) constrained capacity. Note that the unconstrained capacity is always

CHAPTER 1. INTRODUCTION 10

Es/No(dB)

C a p

a c i t

y ( b

i t s )

-10 -5 0 5 10 15 20 25 30 0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5 Unconstrained Gaussian Capacity CM Capacity 16QAM CM Capacity 8PSK CM Capacity 4PSK CM Capacity BPSK

Figure 1.5: Two dimensional unconstrained capacity vs CM capacities

higher than the BPSK capacity. At low ES/N0, the two capacities are very close. But

when ES/N0 becomes greater than 5 dB, the BPSK capacity reaches a limit of one

bit per channel use, which is the base 2 log of the cardinality of X = {−√ES,√ES}.

In order to achieve the BPSK capacity and other modulation constrained capacities, a

capacity-approaching channel coding is usually necessary. So we also call this constella-

tion constrained capacity the coded modulation (CM) capacity. For a fixed constellation,

the CM capacity serves as a benchmark for the performance of the coded system.

In modern digital communications, the modulation is allowed to span multiple dimen-

sions. Given a complex domain, the unconstrained capacity of Gaussian channels can be

achieved by distributing equal energy on each dimension. Thus, the real and imaginary

dimensions each have the capacity in (1.14) with half energy. Therefore,

C = log2

(1 +

ES

N0

). (1.16)

In Fig. 1.5, we show this unconstrained complex Gaussian channel capacity and the

CHAPTER 1. INTRODUCTION 11

constrained capacities of some two dimensional modulations, including 4-ary and 8-ary

phase shift keying (PSK) and 16-ary quadrature amplitude modulation (QAM). PSK

uses the phase to carry information, and its constellation is

XPSK = {√ESe

j2πkM , k = 0, 1, · · · ,M − 1}. (1.17)

QAM carries the information on the amplitudes of both dimensions. The constellation

of a square QAM, i.e.√

M is an integer, can be represented as,

XQAM =

(kI −

√M − 1

2

)+ η

(kQ −

√M − 1

2

)j, kI , kQ = 0, 1, · · · ,

√M − 1

}

. (1.18)

where η is the normalization constant to meet the constraint E(X2) ≤ ES.

It is seen that (1.16) is an upper bound on the constrained capacities of all types of

two dimensional modulation. When the ES/N0 is high enough, the capacities with finite

constellation all reach the limit of log2 |X |.We have considered the AWGN channel and compared the unconstrained capacity

with the modulation constrained capacities. In this dissertation, we will consider M-

ary orthogonal modulation and nonorthogonal frequency shift keying (FSK), and also

consider some other types of channels, e.g. ergodic fading channel and block fading

channel, which will be introduced in the next chapter.

1.3 Organization of This Dissertation

In this chapter, we gave a brief background on channel coding and channel capacity. The

rest of this dissertation consists of three parts. The first part is Chapter 2 and Chapter 3,

which covers the information theoretic limits of coded orthogonal modulation. Chapter

2 focuses on the capacity of orthogonal modulation; and it is demonstrated that iterative

demodulation and decoding is beneficial for systems with coded orthogonal modulation.

In Chapter 3, the asymptotic error rate is analyzed for convolutional coded orthogonal

modulation system. A recursive inner code structure is used to exploit the interleaving

CHAPTER 1. INTRODUCTION 12

gain in frame error rate.

The second part of the dissertation includes Chapter 4 and Chapter 5, which mainly

focus on the information theoretic limits of nonorthogonal modulation. In particular,

nonorthogonal continuous phase frequency shift keying (CPFSK) is considered because

of its compact bandwidth. Chapter 4 studies the coherent CPFSK detector for AWGN.

By treating CPFSK and AWGN as a finite state Markov channel (FSMC), the identically

uniformly distributed (i.u.d.) capacities are evaluated through Monte Carlo simulation.

Then the capacity under spectral efficiency constraints are analyzed, and a code design

method to approach the evaluated capacity is also introduced in this chapter. Next,

in Chapter 5, we turn our attention to noncoherent detection. First, the capacity of

symbol-by-symbol noncoherently detected CPFSK is evaluated, and then the capacity

under spectral efficiency constraints is discussed. Then, in AWGN, the multi-symbol

noncoherent detector is analyzed, which achieves the coherent capacity when the block

size is large enough. The design of capacity approaching codes is also covered at the end

of this chapter.

The last part of the dissertation considers other issues related to noncoherent CPFSK.

Chapter 6 derives the channel estimator for noncoherent CPFSK using a priori informa-

tion from the decoder. The estimator uses the expectation maximization (EM) algorithm,

and works jointly with the demodulator and decoder. Next, nonorthogonal noncoherent

CPFSK is applied to frequency hopping (FH) networks in Chapter 7. Simulation results

show good performance against both partial band jamming and multiple access interfer-

ence. Finally, the summary of this dissertation and a few open problems for future work

are addressed in Chapter 8.

The work in this dissertation has been externally published. In particular, the capac-

ity of noncoherent orthogonal modulation and the convergence behavior of coded system

in Chapter 2 are presented in [17, 18]. [19] includes the asymptotic analysis of coded

orthogonal modulation system in Chapter 3. The capacity and code design of coherent

and multi-symbol noncoherent CPFSK in Chapter 4 and 5 appear in [20]. Chapter 4

also refers to the BICM coherent capacity published in [21]. The capacity of symbol-by-

symbol noncoherent CPFSK is presented in [22]. The channel estimator for noncoherent

orthogonal FSK in Chapter 6 is presented in [23,24]. It is straightforward to be extended

CHAPTER 1. INTRODUCTION 13

to nonorthogonal CPFSK, and its application to FH networks in Chapter 7 appears

in [25, 26]. Other related publications but not covered in this dissertation include [27]

and [28]. [27] discussed the throughput of a macrodiversity network, and the duo binary

turbo codes for digital video broadcasting (DVB) are described in [28].

Chapter 2

Coded Orthogonal Modulation

In this chapter, a general system model for coded orthogonal modulation is given. The

system uses a pragmatic approach to coded modulation known as bit interleaved coded

modulation (BICM) [29]. We show from capacity and error rate simulations that iterative

demodulation and decoding is desirable for orthogonal modulation. This is called bit in-

terleaved coded modulation with iterative decoding (BICM-ID) [30,31]. The convergence

behavior of BICM-ID is also considered in this chapter.

In the following discussion, bold lowercase letters will be used to denote (column)

vectors, e.g. x, and bold uppercase will be used for matrices, e.g. X. The scalar value

xi,j is used to denote the (i, j)th entry of the matrix X, while the scalar value xi is used

to denote the ith element of the vector x. All matrices and vectors are indexed starting

at zero, x = [x0, x1, ..., xM−1]T . Matrices may be represented as a row of column vectors,

e.g. X = [x0,x1, ...,xN−1].

2.1 System Model

2.1.1 Transmitter

As shown in Fig. 2.1, a vector u ∈ {0, 1}Nu of message bits is passed through an outer

rate r(o) = k(o)/n(o) binary encoder to produce a codeword c′ ∈ {0, 1}Nc . The codeword

is passed through an interleaver, which permutes the order of the code bits. The output

14

CHAPTER 2. CODED ORTHOGONAL MODULATION 15

OuterEncoder

u c’ c X

Π

InnerEncoder

M-aryOrthogonalModulator

H

N

Inner SISO &Demapper

Y1−Π

Π

OuterSISO

k / n(i) (i)k / n(o) (o)ES

zz’

v’ v

u

Serial/Parallel

Converter

DemodulatorS

b B

NoncoherentChannel

Estimator

N0 E Sa

Figure 2.1: System model diagram

of the interleaver c is then optionally encoded by the inner rate r(i) = k(i)/n(i) binary

encoder to generate a codeword b′ ∈ {0, 1}Nb , where r(i) = 1 when the inner encoder is

not present. The lengths of the codewords have the following relationship,

Nc = Nun(o)/k(o) + N

(o)t (2.1)

Nb = Ncn(i)/k(i) + N

(i)t , (2.2)

where N(o)t and N

(i)t are the number of coded tail bits appended by the outer and inner

encoder respectively. In Chapter 2 and 3, the outer code could be a convolutional code

or a turbo code. In this chapter, we first consider operation without an inner encoder,

i.e. b = c, and then in Chapter 3 we introduce the recursive structure to achieve lower

asymptotic error bound.

After the binary encoding by both encoders, the sequence b is forwarded into the

serial to parallel converter, which reshapes the sequence into a matrix B with m = log2 M

rows and Nq columns. It is assumed that Nb = mNq, which can be accomplished by zero

padding when Nq does not divide Nq. The ith column of B represents the bits to be

sent during the ith signaling interval. The binary matrix B is then transformed into a

CHAPTER 2. CODED ORTHOGONAL MODULATION 16

length-Nq vector q with elements from the set {0, 1, ..., M − 1}. The ith element of q is

found from the m code bits in the ith column of B by the natural mapping

qi =m−1∑

k=0

2kbk,i. (2.3)

The memoryless orthogonal modulator then uses the vector q to form the modulated

symbol matrix X =[x0,x1, · · · ,xNq−1

], with each symbol picked from the orthogonal

set X = {e0, e1, · · · , eM−1} of elementary column vectors1. Without loss of generality,

we assume xi = eqi. In orthogonal FSK, q is the sequence of tones to be transmitted.

Note that because of symmetry of orthogonal modulation, natural mapping is equivalent

to any other type of mapping.

2.1.2 Channel and Receiver Front-End

The modulated signal passes through a frequency-nonselective fading channel with addi-

tive Gaussian noise. The receiver front-end downconverts the signal and passes it through

a bank of 2M matched filters (or correlators), a quadrature pair for each of the M pos-

sible transmitted tones [32, 33]. The output of the matched filters are sampled at the

symbol rate and each quadrature pair is represented as a complex scalar value. The

complex samples are then placed into an M ×Nq matrix Y whose ith column represents

the outputs of the matched filters corresponding to the ith received symbol. Note that

we assume perfect symbol synchronization.

Block Fading Channel

We assume the channel is a block-fading channel, which means that the channel is cor-

related in such a way that blocks of N contiguous symbols experience the same fading

amplitude, though each symbol in the block could experience different phase shifts. An

appropriate choice for N is to equate it to the coherence time of the channel [34]. Fur-

thermore, it is assumed that while the noise spectral density is constant for the duration

of a block, it could vary from one block to the next in an arbitrary manner.

1ek is all zeros except for a one in position k.

CHAPTER 2. CODED ORTHOGONAL MODULATION 17

If there are N symbols per block, then there will be L = dNq/Ne blocks per codeword.

The matrix Y can be partitioned according to Y = [Y0,Y1, ...,YL−1], where the M by N

submatrix Y` contains the received signal vectors corresponding to the `th fading block.

The complex channel gain during the `th block can be represented by the N×N diagonal

matrix

H` = a`diag(ejθ0,` , . . . , ejθN−1,`

)(2.4)

where j =√−1, a` is the (real-valued) fading amplitude during the `th block. θi,` is the

random phase shift on the ith symbol, which could be caused by fading and oscillator

phase noise. In this dissertation, we assume that a` is a random Rician variable with

factor K, which has the pdf

p(a) =a

σ2R

e−x2+m2

R2σ2

R I0

(mRx

σ2R

), (2.5)

where

mR =

√K

K + 1(2.6)

σ2R =

1

2(K + 1), (2.7)

and Iµ in (2.5) is the modified Bessel function of the first kind and order µ.

The `th block at the output of the receiver front-end is then

Y` =√ESX`H` + N`, (2.8)

where X` consists of the corresponding columns of X and N` is a M × N noise matrix

whose elements are independently and identically distributed (i.i.d.) complex Gaussian

variables that have independent real and imaginary components with zero mean and

variance N0,`/2.

CHAPTER 2. CODED ORTHOGONAL MODULATION 18

Combining all the blocks together, we can get

Y =√ESXH + N, (2.9)

where

H =

H0

H1

. . .

HL−1

. (2.10)

A special case is when the number of symbols per block is N = 1, and the noise spectral

density is constant over the whole codeword. In this case, each symbol is subject to i.i.d

fading, and we call this ergodic fading, or fully interleaved fading.

Furthermore, if we let the Rician fading factor K be zero, the channel becomes a

Rayleigh fading channel. If we let the Rician fading factor K be infinity, all the fad-

ing amplitude will equal unity, which is the same as with an AWGN channel except

for the random phase. For the coherent detector with known phase information, this

channel is equivalent to the AWGN channel. If the detector is noncoherent, the phase is

marginalized out of the decision variable, as discussed below.

Coherent Detection

The demodulator can perform coherent detection if the fading amplitude a and phase θ

is known to the receiver. Let’s drop the block index `. With knowledge of the symbol

energy ES and the noise spectral density N0, we can represent the conditional pdf of the

(k, i)th entry of Y given that the transmitted symbol is qi = ν, as

p(yk,i|qi = ν, aejθ, ES, N0) =1

πN0

exp

(−

∣∣yk,i − aejθ√ESδk,ν

∣∣2N0

), (2.11)

CHAPTER 2. CODED ORTHOGONAL MODULATION 19

where δk,ν is the Kroneker delta function (δk,ν = 1 if k = ν, otherwise δk,ν = 0). Therefore,

the pdf of yi given qi = ν is

p(yi|qi = ν, aejθ, ES, N0)

=

(1

πN0

)M

exp

(−

∑M−1k=0 |yk,i|2 + a2ES

N0

)exp

(2√ESReal(a−jθyν,i)

N0

). (2.12)

Cancelling out the terms common to all ν, the symbol-wise likelihood can be computed

using only the final exponential factor.

Noncoherent Detection

Based on the coherent metric (2.12), we can derive the noncoherent detector when the

phase information is missing. In this case, we can still make use of the known amplitude

information, and we call this noncoherent detection with channel state information (CSI).

To compute the conditional probability without phase, we can take the expectation of

(2.12) over the random phase θ, which is assumed to be i.i.d. uniform over the range

[0, 2π). As a result, we get

p(yi|qi = ν, a, ES, N0)

=

θ

p(yi|qi = ν, aejθ, ES, N0)p(θ)dθ

=

(1

πN0

)M

exp

(−

∑M−1k=0 |yk,i|2 + a2ES

N0

)I0

(2a√ES|yν,i|

N0

), (2.13)

Again, the only term in (2.13) dependent upon ν is the final factor, which is computed

in the demodulator as the symbol-wise likelihood.

Another type of noncoherent detector operates without CSI, when neither fading

amplitude nor phase information is known to the receiver. However, even though the

instantaneous fading information is unknown, the detector does know the fading statistics

information, for instance that the fading is Rician fading with a particular K factor.

Integrating over the phase θ and fading amplitude a, we get the conditional pdf of yk,i

CHAPTER 2. CODED ORTHOGONAL MODULATION 20

given qi = ν,

p(yk,i|qi = ν, ES, N0)

=

1

π(N0+ES

K+1)exp

(−|yk,i|2+ K

K+1ES

N0+ES

K+1

)I0

(2√

KK+1

√ES|yk,i|N0+

ESK+1

)k = ν

1πN0

exp

(−|yk,i|2

N0

)k 6= ν

(2.14)

Thus, the pdf for the ith symbol is

p(yi|qi = ν, ES, N0) ∝ exp

(ES |yν,i|2

N0((K + 1)N0 + ES)

)I0

(2√

K(K + 1)ES |yν,i|(K + 1)N0 + ES

)

, (2.15)

where A ∝ B means A is proportional to B. When K = 0, (2.15) reduces to

p(yi|qi = ν, ES/N0) ∝ exp

( ES

N0|yν,i|2

ES

N0+ 1

)(2.16)

which is the noncoherent noCSI metric for the Rayleigh fading channel.

When neither the instantaneous fading coefficient nor the fading statistics are known,

channel estimation is performed to estimate the parameters needed by the noncoherent

CSI metric in (2.13), namely A , N0 and B , 2a√ES. The estimator works in the joint

manner together with the decoder. We will introduce this channel estimator in Chapter

6.

After all possible symbol-wise likelihoods are calculated, they form the matrix S,

whose νth row and ith column’s element is defined as sν,i , p(yi|qi = ν).

2.1.3 Receiver Back-End

The symbol-wise likelihood matrix S, computed by the demodulator based on the channel

observation matrix Y, is passed to the receiver back-end, which comprises three main

processing modules: a channel estimator, an inner soft-input/soft-output (SISO) decoder

CHAPTER 2. CODED ORTHOGONAL MODULATION 21

[35] and outer decoder. To simplify the discussion below, we now only consider the

demodulator without the noncoherent channel estimator, which produces the likelihoods

of (2.12), (2.13) or (2.15), depending on what channel state information is known to the

demodulator. The details of the noncoherent channel estimator can be found in Chapter

6. For the remainder of this chapter, we consider no inner encoder in the transmitter,

which drives the inner SISO decoder to be an M-ary demapper.

BICM Receiver

The demapper is the back-end of the demodulator. In the absence of feedback from the

decoder, it transforms the symbol-wise likelihoods S into a m by Nq matrix Z whose

(k, i)th element is the log-likelihood ratio (LLR)

zk,i = logp(bk,i = 1|yi)

p(bk,i = 0|yi)

= log

∑q∈Q(1)

kp(yi|q)∑

q∈Q(0)k

p(yi|q) , (2.17)

where Q(b)k contains all the symbols 0, 1, ...,M − 1 labelled with bk = b. The second

equality of (2.17) comes from Bayes rule and the equally likely symbols. The matrix Z

is reshaped into a length Nb vector and deinterleaved, and the resulting vector z′ is fed

into the outer decoder.

BICM-ID Receiver

If the outer SISO decoder is used, its soft output can be fed back to the demapper

for iterative processing. The extrinsic information v′ at the output of the decoder is

interleaved and reshaped into a m by Nq matrix V containing the a priori information

vk,i = logp(bk,i = 1|Z\zk,i)

p(bk,i = 0|Z\zk,i). (2.18)

Conditioning on Z\zk,i means that the extrinsic information for bit bk,i is produced

without using zk,i.

CHAPTER 2. CODED ORTHOGONAL MODULATION 22

When V is fed back to the demapper, the output (2.17) is replaced by the extrinsic

information

zk,i = logp(bk,i = 1|yi,vi\vk,i)

p(bk,i = 0|yi,vi\vk,i)

= log

∑q∈Q(1)

kp(q|yi,vi\vk,i)∑

q∈Q(0)k

p(q|yi,vi\vk,i). (2.19)

Now consider how the summand in (2.19) can be computed. First, using Bayes’ rule

p(q|y,v\vk) =p(y|q,v\vk)p(q,v\vk)

p(y,v\vk). (2.20)

After conditioning on q, y is independent of v and thus p(y|q,v\vk) = p(y|q). From the

definition of conditional probability, p(q,v\vk) = p(q|v\vk)p(v\vk). Gathering all these

factors, we obtain

p(q|y,v\vk) =p(y|d)p(q|v\vk)p(v\vk)

p(y,v\vk). (2.21)

Inserting this back into (2.19) and cancelling common factors yields

zk,i = log

∑q∈Q(1)

kp(yi|q)p(q|vi\vk,i)∑

q∈Q(0)k

p(yi|q)p(q|vi\vk,i). (2.22)

The contribution of the a priori information is passed to the demapper from the decoder,

which affects only the p(q|v\vk) term. Under the assumption of independent code bits

(achieved by proper interleaving), the probability of q given the a priori input v is

p(q|v) =m−1∏j=0

p(bj(q)|vj), (2.23)

where bj(q) is the value of the jth bit in the labelling of symbol q, which can be found for

j = {0, ..., m− 1} by inverting (2.3). The a priori input is interpreted by the demapper

to be v = log[p/(1− p)], where p is the decoder’s most recent estimate of the probability

CHAPTER 2. CODED ORTHOGONAL MODULATION 23

that the corresponding code bit is a one. Inverting the logarithm and solving for p yields

p = ev/(1 + ev), which the demapper uses for p(b = 1|v). Similarly, the demapper uses

1− p = 1/(1 + ev) for p(b = 0|v). Since b = {0, 1}, the following expression can be used

for both cases:

p(b|v) =ebv

1 + ev. (2.24)

Substituting (2.24) into (2.23) yields

p(q|v) =m−1∏j=0

evjbj(q)

1 + evj. (2.25)

The term p(q|v\vk) in (2.22) is only computed for those q ∈ Q(b)k , in which case p(bk =

b|v\vk) = p(bk = b) = 1/2. Thus,

p(q|v\vk) =1

2

m−1∏j=0j 6=k

evjbj(q)

1 + evj, q ∈ Q(b)

k (2.26)

and indeed vk is not used in this calculation.

The soft demapper output zk is found by substituting (2.26) into (2.22). Since (2.22)

contains a ratio of probabilities, several factors cancel, such as the denominator of (2.26).

Thus,

zk,i = log

q∈Q(1)k

p(yi|q)m−1∏j=0j 6=k

exp (bj(q)vj,i)

q∈Q(0)k

p(yi|q)m−1∏j=0j 6=k

exp (bj(q)vj,i)

, (2.27)

where p(yi) is calculated by (2.12), (2.13) or (2.15). Note that (2.12) has a convenient

exponential form, while (2.13) and (2.15) both have the Bessel function term. If we

further define the combination of log and Bessel function, log I0(·), we can calculate

CHAPTER 2. CODED ORTHOGONAL MODULATION 24

(2.27) in log domain. Therefore,

zk,i = max∗q∈Q(1)

k

log p(yi|q) +

m−1∑j=0j 6=k

bj(q)vj,i

−max∗

q∈Q(0)k

log p(yi|q) +

m−1∑j=0j 6=k

bj(q)vj,i

.(2.28)

where the pairwise max-star operator is defined in [36], max∗(x, y) = max(x, y)+ log(1+

e−|x−y|) = max(x, y) + fc(|x− y|), and for multiple arguments,

max∗i

{xi} = log

{∑i

exi

}. (2.29)

After (2.28) is computed, it is forwarded to the outer SISO decoder again. Thus the

demapper and decoder work in an iterative manner, with binary extrinsic information

exchanged between them.

2.2 BICM vs BICM-ID

In [29], Caire showed that the capacity of BICM with gray labelling approaches the CM

capacities. Gray labelling is the labelling such that for any constellation point X, no more

than one closest neighbor can have the the same bit on any position where X differs. For

many 2-Dimensional constellations, e.g. M-ary QAM and PSK, a gray labelling exists.

However, when the constellation is not gray labelled, a gap can always be found between

the BICM capacity and the CM capacity, which leads to a performance loss in an actual

coded system.

2.2.1 BICM Capacity

The BICM capacity [29] is defined as the mutual information between the modulator

input and the output of the demapper without the feedback from the outer decoder.

Let us use B to denote a random variable in the sequence b, and use Z to denote

the corresponding variable in z, calculated from (2.17) without the feedback from the

CHAPTER 2. CODED ORTHOGONAL MODULATION 25

decoder. The BICM capacity can be represented as

CB , mI(B; Z). (2.30)

where

m = log2 M (2.31)

Substituting in the conditional probability and applying the assumption of equally likely

input symbols, we get

CB = m−m−1∑

k=0

E

[ ∑M−1q=0 p(y|q)∑

q∈Q(b)k

p(y|q)

], (2.32)

which can easily be found through Monte Carlo simulation. The BICM channel can

be viewed as m parallel binary channels, with each corresponding to one bit labelling

position. Therefore the total capacity is the sum of m parallel channel capacities.

Fig. 2.2 shows the CM capacity and BICM capacity of several 2D constellations,

namely 16QAM, 8PSK and QPSK. For all three modulations, we show the CM and

BICM capacities with gray labelling and set partition (SP) labelling. Note that SP

labelling is the same as natural labelling for QPSK. In addition, we show the maximum

squared Euclidean weight (MSEW) labelling for 16QAM and 8PSK [37]. For the three

modulations, we observe that BICM with gray labelling has a capacity that is very

close to the CM capacity, while the other labellings are far worse. The situation is

different for orthogonal modulation. Fig. 2.3 shows the CM and BICM capacities of

coherent orthogonal modulation for M = 4, 16, 64. The labelling is not specified for

BICM, because every mapping is equivalent. Since gray labelling can not be applied,

there is a gap between the BICM and CM capacities, and the size of the gap grows with

increasing M .

CHAPTER 2. CODED ORTHOGONAL MODULATION 26

Es/No(dB)

C a p

a c i t

y ( b

i t s )

16QAM

8PSK

QPSK

-10 -5 0 5 10 15 20 0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5

CM capacity BICM: gray BICM: SP BICM: MSEW

Figure 2.2: CM capacity vs BICM capacity of 2 dimensional modulation in AWGNchannel

2.2.2 Simulation Results

To illustrate the effectiveness of the proposed BICM-ID technique for M-ary orthogonal

modulation, we conducted an extensive set of simulations using the turbo code from

the cdma2000 specification [15]. Although the simulations shown are for noncoherent

detection, the coherent detector is expected to have similar performance. We investigated

all four code rates supported by cdma2000, specifically r(o) = 1/2, 1/3, 1/4, and 1/5.

While cdma2000 supports 12 distinct frame sizes, we focused on frames created using

K = 6138 message bits (we also tested the three larger frame sizes of 9210, 12282,

and 20730, but found that their performance was not significantly better). The BICM

interleaver Π was implemented as a m by Nb/m block interleaver, with bits written into

the interleaver row-wise and read out column-wise. We also tried some other interleaver

designs, including s-random interleavers and interleavers designed according to the three

rules in [38]. However we found that performance was not significantly influenced by

interleaver design, presumably due to the fact that the turbo code already contains its

CHAPTER 2. CODED ORTHOGONAL MODULATION 27

-10 -5 0 5 10 15 20 0

1

2

3

4

5

6

7

CM capacity BICM

Es/No(dB)

C a p

a c i t

y ( b

i t s )

16FSK

4FSK

64FSK

Figure 2.3: CM capacity vs BICM capacity for coherent orthogonal modulation in AWGNchannel

own internal interleaver.

For each code rate, we considered AWGN as well as fully-interleaved Rayleigh flat-

fading, and noncoherent detection both with and without CSI. In all cases, it is assumed

that the average value of Eb/N0 is known at the receiver. Four values of the modulation

order M were considered, M = 2, 4, 16, and 64. For M > 2, both BICM and BICM-ID

were considered (for M = 2, BICM-ID degenerates into BICM and thus separate results

are not necessary). In each case, 30 iterations of BICM-ID decoding were performed

(with a single local iteration of turbo decoding for each global iteration of BICM-ID).

For every data point, the simulation ran until at least 30 frame errors were recorded.

Bit error rate (BER) curves for both BICM (dashed lines) and BICM-ID (solid lines)

are shown for Rayleigh fading with CSI, M = 64, and R = 1/4 in Fig. 2.4. From

right to left, the performance after iterations 1,2,3,4,5,10, 16, and 30 are shown. The

curves indicate that the performance of BICM-ID after 4 iterations is always better than

CHAPTER 2. CODED ORTHOGONAL MODULATION 28

2.5 3 3.5 4 4.5 5 5.5 6 6.510

−5

10−4

10−3

10−2

10−1

100

Eb/No(in dB)

BE

R

BICM

BICM ID

Figure 2.4: BER performance in Rayleigh fading (noncoherent detection with CSI) ofthe r(o) = 1/4 input-length Nu = 6138 bit cdma2000 turbo code using 64-ary orthogonalmodulation and both BICM (dashed line) and BICM-ID (solid line). From right to left,the curves show performance after 1, 2, 3, 4, 5, 10, 16, and 30 iterations.

the performance of BICM after all 30 iterations. This implies that, although BICM-

ID is marginally more complex per iteration than BICM, a system using BICM-ID can

actually be much less complex than BICM because it can achieve the same performance

by running fewer iterations.

BER curves for the other simulated scenarios exhibited similar behavior. Since space

does not permit BER curves to be shown for all 84 scenarios, we instead found for each

case the value of Eb/N0 for which the BER = 10−4. These values are indicated in Fig.

2.7-2.9. In particular, the value of Eb/N0 is shown as a function of code rate R for

all four modulation orders in AWGN (Fig. 2.7), Rayleigh fading with CSI (Fig. 2.8),

and Rayleigh fading with NCSI (Fig. 2.9). The thresholds found using the convergence

analysis of Section 2.2.3 are also indicated. For each value of M > 2, four points are

shown. From top to bottom these points correspond to: (1) Simulated BICM receiver;

CHAPTER 2. CODED ORTHOGONAL MODULATION 29

(2) Threshold for BICM; (3) Simulated BICM-ID receiver; and (4) Threshold for BICM-

ID. For reference, the corresponding BICM [29] and CM [39] capacities are shown. The

results will be further discussed in Section 2.2.3.

2.2.3 Convergence and Capacity Analysis

As is common for turbo-coded systems, the BER curves for the proposed system are

characterized by a sharp transition from a high error rate region to a low error rate

floor. The location of this transition, also called the turbo-cliff or waterfall region, can

be predicted using an extrinsic information transfer (EXIT) chart [40, 41].

The starting point of the convergence analysis is a characterization of mutual infor-

mation at the output of the soft demapper as a function of the channel SNR and the

mutual information of the a priori information passed to the demodulator from the de-

coder. In terms of our notation, the bitwise mutual information at the output of a soft

demapper can be expressed as [40]

Iz , I(B; Z) (2.33)

= 1− 1

m

m−1∑

k=0

E

[log2

p(bk = 0|y,v\vk) + p(bk = 1|y,v\vk)

p(bk = b|y,v\vk)

](2.34)

where Z in (2.33) is from the soft demapper allowing feedback from the decoder (2.19),

and the expectation in (2.34) is over the two equally likely values of bk = b ∈ {0, 1}, the

received signal y when the channel SNR is ES/N0, and the a priori input v when the

mutual information between b and the a priori input v is Iv.

Given the complexity of the demapper, direct evaluation of (2.34) is not generally

feasible. However, it can be accurately evaluated using a Monte Carlo approach.The input

v is Gaussian distributed and has mutual information Iv and variance σ2v . The mean of

vk is σ2v/2 when bk = 1 and −σ2

v/2 when bk = 0. Histograms of several decoding runs

confirmed that this a posteriori probability (APP) input was indeed Gaussian distributed.

The demodulator inputs are processed using (2.28) and the resulting m bitwise extrinsic

information values z are stored. For each value of ES/N0 and Iv, this processes is repeated

a large number of times and the stored values of z are used to calculate the output

CHAPTER 2. CODED ORTHOGONAL MODULATION 30

mutual information. The exact expression for output mutual information is obtained by

substituting identities (2.19) and (2.29) into (2.34) and noting that bk = b ∈ {0, 1} are

equally likely, yielding

Iz = 1− log2(e)

m

m−1∑

k=0

E[max∗ (

0, zk(−1)bk(d))]

. (2.35)

Some example extrinsic transfer characteristics are shown for the noncoherent demod-

ulator in Fig. 2.5 for M = 4, 16 and 64-ary orthogonal modulation in an AWGN channel

with ES/N0 = 3 dB. The x-axis shows the mutual information Iv of the APP input, while

the y-axis shows the corresponding mutual information Iz at the demodulator output.

The conventional BICM receiver corresponds to the case that no information is fed back

from the decoder and, hence, Iv = 0. In fact, the value of Iz when Iv = 0 corresponds to

the BICM capacity (2.32) [29]. On the other hand, when Iv = 1 the demodulator has full

knowledge of all the bits in the symbol except for bit bk. In this case, the demodulation

boils down to a binary decision, and hence, the value of Iz when Iv = 1 corresponds to

the capacity of binary orthogonal modulation. Another interesting observation is that

the value of Iz when Iv = 1/2 corresponds to the CM capacity [29] [42], as indicated on

the figure by the dashed lines.

Next, the influence of the channel decoder must be taken into account. This is com-

plicated by two factors. First, while we have observed that the output of the channel

decoder (APP input to the demodulator) was Gaussian distributed, the output of the

soft demodulator was highly non-Gaussian. Histograms of the demodulator output (not

shown) reveal that it is non-symmetric and very “peaky” over a wide range of channel

conditions (even when the channel is AWGN). This is due to a combination of the non-

linear operations within the demodulator, such as (2.13) or (2.15), and the fact that each

output zk only depends on a single noisy observation y and a small number (m − 1)

of APP inputs, and therefore the Central Limit Theorem does not hold. The second

complicating factor is that we are using a turbo code, and therefore the iterative nature

of the channel decoder must be considered. Both of these factors were taken into account

by carefully generating the extrinsic transfer characteristic of the turbo decoder.

CHAPTER 2. CODED ORTHOGONAL MODULATION 31

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

Mutual information at demodulator input Iv

Mu

tua

l in

form

ati

on

at

de

mo

du

lato

r o

utp

ut

I z

M=4

M=16

M=64

Figure 2.5: Extrinsic information transfer characteristics for soft noncoherent demodula-tor of orthogonal modulation in AWGN at ES/N0 = 3 dB for several values of M . Alsoshown (dashed lines) is the CM capacity of M = {2, 4, 16, 64}.

In contrast with [40, 41], we did not completely separate the generation of the de-

coder’s extrinsic transfer characteristic from the demodulator’s characteristic, since this

would require an assumption regarding the distribution of the decoder’s input. Instead,

the generation of the decoder characteristic was linked to the demodulator’s character-

istic as follows. First the demodulator characteristic is plotted for the desired value of

ES/N0. An example for M = 16 in Rayleigh fading with CSI and ES/N0 = 4 dB is

shown in Fig. 2.6. Then, for each value of demodulator input extrinsic information Iv,

the demodulator characteristic curve is used to determine the mutual information Iz at

the demodulator output. Rather than passing Gaussian distributed extrinsic information

with mutual information Iz′ = Iz into the decoder, the actual demodulator was simulated

with Gaussian distributed input extrinsic information Iv to assure that the input to the

decoder will have the correct distribution. Given the actual demodulator outputs, the

mutual information at the decoder output Iv′ was tracked by simulating entire turbo

CHAPTER 2. CODED ORTHOGONAL MODULATION 32

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10.22

0.24

0.26

0.28

0.3

0.32

0.34

0.36

0.38

0.4

Output Iv’ of decoder becomes input I v of demodulator

Ou

tpu

t I z

of

de

mo

du

lato

r b

ec

om

es

inp

ut

I z’

of

de

co

de

r

demodulator characteristic

decoder characteristic

trajectory K=6138

trajectory K=20730

Figure 2.6: EXIT chart for BICM-ID using M = 16 orthogonal modulation and the rateR = 1/4 length cdma2000 turbo code in Rayleigh fading with noncoherent detection CSIat Eb/N0 = 4 dB. Two average decoding trajectories are shown: The narrower trajectoryis for a K = 6138 bit interleaver and one local channel decoding iteration per globaliteration, and the wider trajectory is for a K = 20730 bit interleaver and two localchannel decoding iterations per global iteration.

codewords and measuring the output mutual information after each decoder iteration.

This process is repeated for a large number of modulated turbo codewords, and the re-

sulting average decoder output mutual information Iv′ is plotted for each iteration on

the EXIT chart against the value of the demodulator’s output extrinsic information Iz.

The example shown in Fig. 2.6 corresponds to the rate r(o) = 1/4 cdma2000 turbo code

and channel decoding iterations one through six (there is little change in the curves for

iterations beyond six, especially in the pinch-off regions that most affect convergence).

Note that since M = 16 and r(o) = 1/4, ES/N0 = Eb/N0. While a decoder character-

istic generated in this way will depend on the interleaver length K, we found that the

characteristics for K = 6138 and K = 20730 were nearly identical.

CHAPTER 2. CODED ORTHOGONAL MODULATION 33

0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.551

2

3

4

5

6

7

8

Code Rate R

Min

imu

m E

b/N

o (

in d

B)

M=2

M=4

M=16

M=64

Figure 2.7: Minimum Eb/No required to achieve BER = 10−4 and thresholds predictedby EXIT analysis as a function of code rate R over an AWGN channel using M-aryorthogonal modulation with noncoherent detection and the K = 6138 bit cdma2000turbo code. For M = 2 two points are shown: The upper point is the simulated value andthe lower point is the EXIT threshold. For M = {4, 16, 64} four points are shown, fromtop to bottom: (1) Simulated BICM receiver; (2) Threshold for BICM; (3) SimulatedBICM-ID receiver; and (4) Threshold for BICM-ID. For reference, the correspondingBICM (dashed) and CM (solid) capacities are shown.

Generating the decoder characteristic in this manner is not equivalent to simply let-

ting the BICM-ID receiver run freely, as we are holding the value of input/output mutual

information at the demodulator constant, while in the BICM-ID receiver this value will

increase after each iteration. Because the demodulator’s extrinsic information is care-

fully controlled, the EXIT chart can be used to glean some insight into the convergence

behavior of the complete BICM-ID receiver. The EXIT chart is read by first initializing

demodulator input Iv = 0. Next, the initial value at the output of the demodulator

Iz is read off the chart. Assume that there is one local channel decoding iteration for

every global BICM-ID iteration. In this case, the output of the decoder Iv′ after the first

CHAPTER 2. CODED ORTHOGONAL MODULATION 34

0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.551

2

3

4

5

6

7

8

9

10

Code Rate R

Min

imu

m E

b/N

o (

in d

B)

M=2

M=4

M=16

M=64

Figure 2.8: Minimum Eb/No for a fully interleaved Rayleigh flat-fading channel using M-ary noncoherent modulation and noncoherent detection with channel state information.See caption to Fig. 2.7 for full description.

BICM-ID iteration is the intersection of the horizontal line Iz′ = Iz and the decoder char-

acteristic corresponding to decoder iteration one. Next, the output of the demodulator

Iz during the second iteration is found as the intersection of the vertical line Iv′ = Iv and

the demodulator’s characteristic. The output of the decoder after the second iteration is

found like it was for the first iteration, only now the characteristic for decoder iteration

two is used. The trajectory continues in a zig-zag fashion, bouncing between the demod-

ulator characteristic and the characteristic of the decoder for the corresponding iteration

number. If the zig-zag path is able to progress to the right side of the EXIT chart, then

decoding will succeed with high probability, indicating that system is operating with

Eb/N0 greater than the threshold. Conversely, if the path gets stuck at some Iv < 1, then

decoding is likely to fail, indicating that the system is operating with Eb/N0 smaller than

the threshold. The threshold itself is found by determining the minimum value of Eb/N0

for which the path progresses all the way to the right side of the chart.

CHAPTER 2. CODED ORTHOGONAL MODULATION 35

0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.552

3

4

5

6

7

8

9

10

Code Rate R

Min

imu

m E

b/N

o (

in d

B)

M=2

M=4

M=16

M=64

Figure 2.9: Minimum Eb/No for a fully interleaved Rayleigh flat-fading channel usingM-ary noncoherent modulation and noncoherent detection with no channel state infor-mation. See caption to Fig. 2.7 for full description.

The effectiveness of the EXIT chart can be illustrated by overlaying actual decoding

trajectories for the rate R = 1/4 cdma2000 turbo code on Fig. 2.6. The trajectories

are obtained by simulating the entire BICM-ID receiver and measuring the appropriate

mutual information after each iteration. Fig. 2.6 shows two average trajectories, the

first of which (dotted line) is for an interleaver length of K = 6138. At first, the tra-

jectory bounces between the demodulator characteristic and the decoder characteristic

corresponding to the same iteration. While the trajectory is always bounded by the

demodulator characteristic, for higher iterations it no longer touches the appropriate de-

coder characteristic. This is due to two reasons. First, a length K = 6138 interleaver is

too short for the EXIT chart to be exact and causes correlations to arise in the actual

BICM-ID receiver that are not accounted for in the EXIT analysis. Second, while the

first constituent channel decoder receives extrinsic information from the demodulator

CHAPTER 2. CODED ORTHOGONAL MODULATION 36

Table 2.1: Minimum Eb/N0 required to achieve a BER of 10−5 using the 6138 bitcdma2000 turbo code, M-ary noncoherent orthogonal modulation, and either BICM orthe proposed BICM-ID technique. The corresponding Shannon capacities and EXITthresholds are also given.

BICM BICM-IDType Rate M Simulation Threshold Capacity Simulation Threshold CM Capacity

AWGN 1/2 2 7.28 dB 7.00 dB 6.71 dB N/A N/A N/A4 5.19 dB 4.89 dB 4.65 dB 4.85 dB 4.60 dB 4.18 dB16 3.81 dB 3.51 dB 3.28 dB 3.12 dB 2.89 dB 2.07 dB64 3.32 dB 2.99 dB 2.81 dB 2.57 dB 2.33 dB 1.11 dB

Rayleigh 1/4 2 8.09 dB 7.75 dB 7.40 dB N/A N/A N/AFading 4 6.14 dB 5.77 dB 5.39 dB 5.74 dB 5.56 dB 4.88 dB(CSI) 16 4.95 dB 4.52 dB 4.20 dB 4.12 dB 3.80 dB 2.80 dB

64 4.67 dB 4.19 dB 3.89 dB 3.69 dB 3.34 dB 1.85 dBRayleigh 1/4 2 8.75 dB 8.43 dB 8.05 dB N/A N/A N/AFading 4 6.78 dB 6.42 dB 6.05 dB 6.35 dB 6.01 dB 5.55 dB(NCSI) 16 5.57 dB 5.13 dB 4.80 dB 4.71 dB 4.40 dB 3.45 dB

64 5.20 dB 4.74 dB 4.45 dB 4.16 dB 3.94 dB 2.49 dB

due to iteration n, the (local) extrinsic information that it receives from the other con-

stituent decoder actually corresponds to iteration n−1. Thus, when performing one local

channel iteration per global BICM-ID iteration, the mutual information at the output of

the decoder does not reach the decoder characteristic curve for iterations n. These two

effects can be visualized by showing the average trajectory with a larger interleaver (in

this case, K = 20, 730) and performing two local iterations per global iteration. This is

the second trajectory shown in Fig. 2.6, and it can be seen that under these conditions

the trajectory follows the EXIT chart more closely, though still not perfectly. Note that

while the trajectory of later iterations do not follow the decoder characteristic exactly, it

is the trajectory for the first few iterations that most influence the pinch-off region [41],

and it is in this region that the EXIT curve is most closely followed. The accuracy of the

EXIT analysis is confirmed by comparing the predicted thresholds against the location

of the waterfall found through simulation, as is shown in Fig. 2.7- 2.9 and Table 2.1.

Due to the noncoherent combining penalty [39], performance does not necessarily

improve with decreasing code rate as it does for coherent modulation. Thus, for each

channel type and modulation order there is an optimal value of R; decreasing R below

this value actually increases the required Eb/N0. For AWGN, R = 1/2 performed best,

CHAPTER 2. CODED ORTHOGONAL MODULATION 37

while in both Rayleigh fading scenarios, R = 1/4 was best. In Table I, we list the value

of Eb/N0 required to achieve a BER of 10−5 for each channel type and modulation order

using the cdma2000 code rate with the best performance. For each case, the table lists

the Eb/N0 for both BICM and BICM-ID along with the corresponding thresholds and

capacities. In fading, the penalty for not using CSI is about 0.6 dB in all cases. The dB

gain of BICM-ID over BICM increases with M , with gains between 0.34 and 0.43 dB for

M = 4, between 0.69 and 0.86 dB for M = 16, and between 0.75 and 1.04 dB for M = 64.

The gain in fading was higher than the gain in AWGN. While the observed performance

actually exceeded the BICM capacity, there is still a gap to the CM capacity, and this

gap increases with M , suggesting that further improvements to this process are possible.

The threshold for BICM-ID predicted by EXIT analysis are between 0.18 and 0.35 dB

lower than the simulated results, indicating that the analysis is a good indicator of the

location of the turbo cliff.

2.3 Chapter Summary

A general model of coded orthogonal modulation system is given in this chapter. In both

AWGN and ergodic fading channel, we discussed coherent and noncoherent demodulators.

In ergodic fading channel, two types of noncoherent receptions are considered, with or

without CSI. The inner encoder is assumed to be absent in this chapter, which drives

the inner SISO to be an M-ary demapper. For orthogonal modulation, BICM capacity

is shown to have a performance loss relative to the CM capacity, due to the symmetry

property of the constellation. An iterative demodulation and decoding approach, BICM-

ID, is presented to close the gap between BICM and CM capacities. This result is verified

by simulations of turbo coded systems with noncoherent reception. EXIT analysis [40]

is also used to accurately predict the decoding threshold.

Chapter 3

Asymptotic Analysis of Coded

Orthogonal Modulation

In the previous chapter, we have motivated the use of BICM-ID for coded orthogonal

modulation. The turbo coded system is shown to have good performance. But what if

a convolutional code is used instead? Would it perform better or worse than the turbo

code?

Fig. 3.1 shows the simulation results of several convolutionally coded systems versus

the turbo coded system in AWGN channel. All the curves use an uncoded bit length of

6138. For both M = 16 and M = 64, the convolutionally coded systems always have

an earlier waterfall than the turbo coded system. However, the convolutionally coded

systems tend to reach an error floor at moderate SNR. Also, the longer the constraint

length of the convolutional code has, the higher the error floor.

In order to make the convolutionally coded orthogonal modulation more appealing,

we need to reduce the high error floor. The asymptotic error rate analysis is given in this

chapter. Since it has been shown that iterative demodulation and decoding is desirable

for coded orthogonal modulation, we will refer to our system as bit coded interleaved

orthogonal modulation (BICOM), which includes the iterative processing at the receiver

back-end.

In this chapter, we consider BICOM from the perspective of being a serially concate-

nated code (SCC). In our baseline system, the inner code is simply a memoryless mapper

38

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 39

Eb/No(dB)

BER

1 1.5 2 2.5 3 3.5 4

10-4

10-3

10-2

10-1

100

K = 3

K = 4

K = 5

K = 6

Turbo code

10-5

(a) M = 16

Eb/No(dB)

BER

1 1.5 2 2.5 3

10-4

10-3

10-2

10-1

100

K = 3

K = 4

K = 5

K = 6

Turbo code

10-5

(b) M = 64

Figure 3.1: BICM-ID Simulation results of length 6138 turbo coded and convolutionallycoded orthogonal modulation in AWGN channel, noncoherent detection. Results shownare up to 20th iteration.

that transforms groups of log2 M bits to orthogonal symbols. In this case, the inner en-

coder is simply direct forwarding without any encoding, and therefore it is nonrecursive,

of course. However, a well known result from [43] is that an interleaver gain is only possi-

ble if the inner code is recursive. Likewise, an interleaving gain is achieved with iterative

demodulation and decoding only if the modulator is recursive [44]. One way to guarantee

this condition is to use modulation that is inherently recursive, such as continuous phase

modulation (CPM) [45] or differential phase shift keying (DPSK) [46]. Another way is to

precede an otherwise memoryless modulator with a recursive precoder, which could sim-

ply be a differential encoder. Henceforth, we will use the term BICOM with differential

precoding (BICOM-DP) to describe a serially concatenated system whose inner code is a

(binary) differential encoder followed by an orthogonal modulator.

In this chapter, we derive union bounds on the performance of both BICOM and

BICOM-DP. Similar to [47], we explicitly take into account the tail bits used to terminate

the trellis of the recursive inner code, which makes the bound more accurate. While the

bounds presented in this chapter assume maximum likelihood (ML) joint demodulation

and decoding, we show that the bounds are a good prediction of the performance of

iterative demodulation and decoding by comparing the bounds against simulation results

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 40

and the BICM-ID error free feedback (EFF) bound of [31].

The remainder of this chapter is arranged as follows. In Section 3.1, the union bound

is derived via the joint trellis representation of the inner code and modulation. The

calculation of the pairwise error probability (PEP) of the M-ary orthogonal modulation

is introduced in Section 3.2. The next section is devoted to results of the bound and the

performance analysis. Finally, we summarize this chapter.

3.1 Union Bound

With the development of channel coding, researchers have focused on deriving tight

upper error bounds on complicated coded system, when no explicit error rate can be

found. One type of this work is to minimize the error region of the union bound. For

example, the tangential bound [48], the sphere bound [49], the tangential sphere bound

[50–52] and Divsalar bound [53] are all bounds that are tighter the union bound. Among

those, the tangential sphere bound is reported to be tightest for a block coded PSK

system with coherent detection. Other work improves the Gallager type random coding

bound [2, 6, 54]. The important works are the tight turbo code bound by Duman and

Salehi [55, 56].

However, these bounds usually require complicated calculation and optimization, es-

pecially for noncoherent detection. In this chapter, we still focus on the union bound,

which is simple for both coherent and noncoherent detection but still offers tight asymp-

totic performance, which is improved for predicting error floors.

3.1.1 Joint Inner Code and Modulation Trellis

The inner SISO processor operates over a merged trellis which describes the inner code

and orthogonal modulator, while the outer SISO processor performs soft-output decoding

of just the outer code. While the implementation of the outer SISO decoder is quite

straightforward, the inner SISO decoder requires that the inner encoder and modulator

be merged into a single trellis. When m/n(i) is an integer, as is the case for a differential

inner code, each state-transition in the merged trellis corresponds to one output symbol.

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 41

D

0/10/01/01/1 00/e0 11/e10/10/01/01/1 00/e3 11/e201/e3 10/e210/e101/e01/10/0 1/10/0 00/e0 01/e110/e2 11/e3

(a) g(i) = 1 M=4

(b) g(i) = 1/(1+D) M=4

Figure 3.2: Trellis merging for the inner code.

The number of states in the merged trellis is the same as the number of states of the

inner code, while the number of branches leaving or entering any state is equal to M .

Two examples of merged trellises are shown for M = 4 in Fig. 3.2, (a) BICOM (inner

encoder g(i) = 1), and (b) BICOM-DP (inner encoder g(i) = 1/(1 + D)). For each case,

the diagram on the left depicts the encoder, the diagram in the middle shows the trellis

clocked at the bit rate, and the diagram on the right shows the merged trellis clocked at

the symbol rate and labeled by M − ary symbols. Note that in the merged trellis, there

are parallel transitions. The SISO algorithm dealing with the parallel edges can be found

in [35].

3.1.2 Union Bound

Based on the merged inner trellis, the union bounds on BER and frame error rate (FER)

are derived in this section. For an arbitrary M-ary modulation, the PEP needs to be

calculated over the different modulated codeword pairs (X, X). An efficient method of

random labelling can be applied to simplify the calculation [29]. In this chapter, we focus

on orthogonal modulation, which is already symmetric and uniform. Therefore, the PEP

can be evaluated relative to the all-zeros codeword, without changing the performance.

Moreover, for both coherent and noncoherent detections, the decoder is equally likely to

pick any other symbol when a symbol error occurs. As a result, the PEP can be simplified

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 42

as,

P (X, X) = P (h), (3.1)

where h is the Hamming distance, i.e. the number of symbols in which X differs from

X. When X is the modulated all-zeros codeword, h is simply the number of symbols X

contains other than e0. For simplicity during further discussion, we refer to the number

of symbols it contains other than x0 as the weight of the modulated codeword.

Based on the PEP P (h), we can write the union bound on frame error rate as,

Pf ≤Nu∑

d=dmin

Nq∑

h=1

Wd,hP (h) (3.2)

and the union bound of bit error rate as,

Pb ≤Nu∑

d=dmin

Nq∑

h=1

d

Nu

Wd,hP (h) (3.3)

where dmin is the minimum input weight of the outer code that can generate an error

event. Wd,h represents the number of modulated codewords that have d input weight and

h the weight of the modulated codeword, and is the coefficient of the term DdHh from

the input output weight enumerating function (IOWEF),

W (D, H) =Nu∑

d=0

Nq∑

h=0

Wd,hDdHh. (3.4)

Using the uniform bit interleaving model [43], Wd,h can be found as,

Wd,h =Nc∑

l=d(o)free

W(o)d,l W

(i)l,h(

Nc

l

) , (3.5)

where d(o)free is the minimum free distance of the outer code. W

(o)d,l and W

(i)l,h are the

coefficients from the IOWEF of outer code and inner code with merged trellis, like the

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 43

relationship between Wd,h and W (D, H) in (3.4).

The upper bound of W(o)d,l and W

(i)l,h can be found in the similar way of [43], based

on W(o)d,l,j and W

(i)l,h,j, defined in [43]. W

(o)d,l,j is the number of sequences of input weight d,

output weight l with j adjacent error events in the outer code, and so is W(i)l,h,j defined. The

outer code in this chapter is chosen to be nonrecursive, since it offers better performance

than the equivalent recursive code. When the inner code is nonrecursive, the bounds on

W(o)d,l and W

(i)l,h are found as,

W(o)d,l ≤

t(o)max∑j=1

(Nc/n

(o)

j

)W

(o)d,l,j (3.6)

W(i)l,h ≤

t(i)max∑j=1

(Nc/(mk(i))

j

)W

(i)l,h,j. (3.7)

where t(o)max and t

(i)max are the maximum possible number of error events in the outer code

trellis and the super inner trellis respectively. This is similar to [43], except that the

merged trellis for the combined inner code and orthogonal modulation is used instead.

Example 3.1 The conventional BICOM system has a trivial one state rate 1 inner code

as shown in Fig. 3.2(a) for M = 4. All the edges except the all-zeros edge contain

errors. Let W (i)(L,H, j) be the input-output weight enumerating function (IOWEF) with

j adjacent error events. It can be calculated as

W (i)(L,H, 1) = ((L + 1)m − 1) H, (3.8)

W (i)(L,H, j) = W (i)(L,H, 1)j. (3.9)

It is obvious that the maximum number of error events is t(i)max = Nc/m, which is the

total number of inner trellis stages. Therefore,

W (i)(L,H) =

Nc/m∑j=1

(Nc/m

j

)W (L,H, j)

= [((L + 1)m − 1) H + 1]Nc/m − 1. (3.10)

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 44

1 2 3 j...

Input weight lOutput weight h

1 2 3 j...

Input weight l>l’Output weight h

Input weight l’

Wl,h,j(i)

T l',h,j(i)

Figure 3.3: The calculation of tail terminated error events

Note that (3.7) is satisfied with equality in this case, and W(i)l,h is just the coefficient of

the term LlHh. ¥

In this chapter, we also take into account the tail termination of a recursive encoder.

For a nonrecursive encoder with constraint length K, the termination is accomplished by

appending zeros input for the last K − 1 trellis stages. However, the recursive encoder

cannot use the all zeros tail to put encoder back to zero state, if the state right before

the termination is nonzero. In this case, the automatic tail bits produced by the encoder

would have a positive weight, and it complements the information input to generate the

final error event. When the inner code is recursive, we define the term T(i)l′,h,j as the

number of sequences, which have the following properties, (1)having the input weight l′

up to the last but K−1 sub-trellis stages, (2) having the output weight of h, (3) having j

adjacent error events, and (4) having totally the input weight l > l′. Here, the sub-trellis

stage represents the trellis of the inner code itself, and the last property means the tail

bits automatically produced by the encoder have a positive weight. Fig. 3.3 illustrates

the difference between T(i)l′,h,j and W

(i)l,h,j. While the j error events of W

(i)l,h,j are all allowed

to be arranged among all the trellis stages, only j − 1 error events of T(i)l′,h,j are free to

move, because the last error event is fixed at the tail. As a result, for the recursive inner

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 45

code, (3.7) is rewritten as,

W(i)l,h ≤

t(i)max∑j=1

(Nc/(mk(i))

j

)W

(i)l,h,j +

t(i)max∑j=1

(Nc/(mk(i))

j − 1

)T

(i)l,h,j

. (3.11)

Example 3.2 A BICOM-DP system has a differential inner encoder g(i) = 1/(1 + D).

As shown in Fig.3.2(b) for M = 4, the merged inner trellis has two states and M/2

parallel edges between every distinct starting and ending state. Without tail bits, only

even weight inputs can generate error events, i.e. W(i)l,h,j = 0 for all odd l. If terminated

by a tail bit, the tail is non-zero only for odd weight inputs, i.e. T(i)l,h,j = 0 for all even

l. Let T (i)(L,H, j) be the tail termination IOWEF with j adjacent error events. When

M = 4,

W (i)(L,H, 1) = 3L2H + 4L2H2 + 4L2H3 + 4L2H4

+2L4H2 + 6L4H3 + 10L4H4 · · · (3.12)

T (i)(L,H, 1) = 2LH + 2LH2 + 2LH3 + 2LH4

+L3H2 + 3L3H3 + 5L3H4 · · · (3.13)

and the concatenation of the error events is equivalent to the product of the IOWEFs,

W (i)(L,H, j) = W (i)(L,H, 1)j, (3.14)

T (i)(L,H, j) = W (i)(L,H, 1)j−1T (i)(L,H, 1). (3.15)

Using the above results, W(i)l,h can be easily found from (3.11). ¥

We simply consider a nonrecursive structure for the outer code. However, it is straight-

forward to apply the tail termination, when an outer recursive convolutional code is used.

Although the derived bound considers the union of all the error patterns, we claim

that for a reasonably high SNR, only a few terms in the summation account for most of

the bound. When N is large, the combinatorics of(

Nj

)is about proportional to N j. The

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 46

exponents of Nc on the FER and BER bounds are [43]

αf = t(o) + t(i) − l (3.16)

αb = t(o) + t(i) − l − 1. (3.17)

It is verified that the interleaver gain by using an inner recursive encoder also applies to

our system. In addition, we mention another two points:

(1) For a nonrecursive inner code, αf,max = t(o)max. When the SNR is high enough, the

sequence which diverges from and merges to the zero state one time has relatively high

probability of error against the other error event. The effective αf here is 1, and hence

αb is close to zero, which means there is no interleaver gain for BER, and FER goes up

linearly with Nc. This point is shown in Section 3.3.

(2) For a recursive inner code, αf,max = −bd(o)free−1

2c. In most cases, there is an FER

interleaver gain by using the inner recursive code. Here, we look into the minimum output

weight associated with the maximum exponent, hmin(αf,max). As we will see later, this

parameter is important for the performance in Rayleigh fading channel. When d(o)free is

even, hmin(αf,max) is written as,

hmin(αf,max) =d

(o)freed

(i)2,free

2. (3.18)

where d(i)2,free is the minimum output weight of the merged inner trellis with input weight

2 (without tail termination) . If d(o)free is odd, the maximum exponent of αf,max = −d

(o)free−1

2

is achieved in one of the following three situations: (1) when there are (d(o)free− 1)/2 error

events with input weight 2 and the left only left 1 is complemented by the tail bits, (2)

when there are (d(o)free − 3)/2 error events with input weight 2 and the other event with

input weight 3, or (3) when the minimum even Hamming distance of the outer code is

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 47

5 6 7 8 9 10 11 12 13 14 1510-1010-910-810-710-610-510-410-310-210-1100

Eb/No (dB)

FER

Rayleigh Noncoherent CSI

AWGNNoncoherent

BICOM-DPOuter Code

g(o) = [ 1+D4, D+D3+D4]Inner Code

g(i) = 1/(1+D)M = 4, Nc = 400Simulation

Bounds NOT considering tail termination

Bounds considering tail termination

Figure 3.4: The concatenation of g(o) = [1+D4, D +D3 +D4] and g(i) = 1/(1+D), withinformation size Nc = 400 and M = 4, noncoherent reception. The simulation runs upto 20th iteration.

d(o)even = d

(o)free + 1. We have,

hmin(αf,max) = min

{(d

(o)free − 1)d

(i)2,free

2+ d

(i)1,t ,

(d(o)free − 3)d

(i)2,free

2+ d

(i)3,free, (3.19)

(d(o)free + 1)d

(i)2,free

2

∣∣∣∣∣d(o)even=d

(o)free+1

,

where d(i)3,free is the minimum output weight of the merged inner trellis with input weight

3 (without tail termination), and d(i)1,t is the minimum weight generated by a weight 1

input together with the automatic tail termination. The notation of A|B means A takes

its value only B is satisfied, otherwise A = +∞.

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 48

Fig. 3.4 shows results for BICOM-DP with noncoherent reception. The outer code

is rate 1/2 with g(o) = [1 + D4, D + D3 + D4] and M = 4 orthogonal modulation. The

interleaver size is Nc = 400. The outer code has odd minimum distance d(o)odd = 7, and

even minimum distance d(o)even = 10. Also, from Example 3.2 , d

(i)1,t = d

(i)2,free = 1 and

d(i)3,free = 0. Without tail bits, no odd weight input to the inner code will generate an

error event. We get hmin(αf,max) = 5, which comes from (3.18). However, using a tail

can add an additional 1 to the minimum odd input, so hmin(αf,max) is actually 4 instead

of 5, which is the diversity gain in fading.

3.2 Pairwise Error Probability

Since orthogonal modulation is symmetric, the PEP is only a function of the weight of the

error of modulated sequence. The distance between every pair of constellation points is

equal both in the sense of coherent detection and noncoherent detection. We will evaluate

the PEP of both detection methods under AWGN and fully interleaved Rayleigh fading

channel. It is also obvious that the PEP is a function of the SNR γ = Es/N0. As long as

γ or γ remains constant, the PEP is independent of the modulation alphabet size M . In

the following, we calculate the PEP based on the binary orthogonal modulation. Let X

and X be the binary orthogonal modulated sequences which differ in h positions,

X = [e0, e0, · · · , e0]

X = [e1, e1, · · · , e1]︸ ︷︷ ︸h

(3.20)

Therefore, the PEP can be written as,

P (h) = P(log p (Y|X)− log p

(Y|X

)≤ 0

)(3.21)

3.2.1 Coherent Detection

If the channel’s phase and amplitude information is available, coherent detection can be

performed.

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 49

AWGN Channel

For the AWGN channel, the PEP is just a Q-function of the Euclidean distance,

P (h) = Q(√

hγ)≤ e−hγ/2 (3.22)

Rayleigh Channel

When the channel is fully interleaved Rayleigh fading, the PEP is the expectation of the

conditional PEP taken over the fading coefficients.

P (h) = Ea0,a1,...ah−1

Q

√√√√h−1∑i=0

|ai|2γ

(3.23)

where ai’s are i.i.d. complex Gaussian variables with zero mean and variance 1/2 on both

components. The closed form solution to this can be found in [32](14.4-15)(14.4-21),

P (h) =

(1− µ

2

)h h−1∑i=0

(h− 1 + i

i

)(1 + µ

2

)i

(3.24)

where

µ =

√γ

2 + γ. (3.25)

3.2.2 Noncoherent Detection

When the phase information is not available at the receiver, the noncoherent metric needs

to be used instead of the Euclidean distance.

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 50

AWGN Channel

Since the noise on each symbol is i.i.d., the log likelihood ratio (LLR) in (3.21) can be

written in the summation of individual LLRs,

∆ = log p (Y|X)− log p(Y|X

)

=h−1∑i=0

[log p (yi|e0)− log p (yi|e1)] (3.26)

The PEP is just the probability of the summation of LLRs smaller than zero. Due to

the nonlinear form of the noncoherent metric, we take Laplace transform over the pdf of

∆ [29],

Φ∆(s) = E[e−s∆

]

= Ey

[(p (y|e0)

p (y|e1)

)−s]h

(3.27)

=

(Ey0

[I0

(2√Es |y0|

N0

)−s])h (

Ey1

[I0

(2√Es |y1|

N0

)s])h

The last step of (3.27) comes from the noncoherent metric [17], where yi represents the

ith element in vector y. Due to the integration property of laplace transforms, Φ∆(s)s

is

the Laplace transform of the cdf of ∆, and thus the cdf of ∆ is found by taking the

inverse laplace transform of Φ∆(s)s

. The PEP, P (∆ ≤ 0), is merely the cdf evaluated at

zero, hence,

P (h) = P (∆ ≤ 0)

=1

2πj

∫ δ+j∞

δ−j∞

Φ∆(s)

sds. (3.28)

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 51

The integral (4.37) can be evaluated using Gauss-Chebyshev quadratures, suggested in

[29] [57]. Suppose ν is an even positive integer,

P (∆ ≤ 0) =1

ν

ν/2∑

k=1

(Real (Φ∆(δ + jδτk)) + τkImag (Φ∆(δ + jδτk))) + Eν (3.29)

where

τk = tan(2k − 1)π

2ν, (3.30)

and Eν is the residual error vanishing when ν goes to infinity. Usually, the accuracy is

better than 10−8 when ν is greater than 64. We also show in the Appendix B that Φ∆(δ)

achieves its minimum value at δ = 1/2, which offers the best convergence rate [57].

Although Monte Carlo simulation is needed to evaluate the two expectations in the

final step of (3.27), it is much easier than simulating the whole system. Also, it works

independently with the coding and even the modulation alphabet size M .

Another option here is to use an upper bound on the PEP, which comes from the

suboptimal square law detection. A closed form of error probability can be found in [58].

Therefore

P (h) ≤ 1

2(2h−1)e−

γ2

h−1∑i=0

[1

i!

2

)ih−1−i∑j=0

(2h− 1

j

)]. (3.31)

Rayleigh Channel with CSI

When the fading amplitude information is known to the receiver, the metric also has the

log I0(·) form [17]. We can use the method in (3.27) and (4.37) to find the PEP. The only

difference lies in the (3.27), where y0 and y1 are both dependent on the fading coefficient,

thus not independent any more. The Laplace transform is written as,

Φ∆(s) =

Ea,y

I0

(2√Es|a||y1|

N0

)

I0

(2√Es|a||y0|

N0

)

s

h

, (3.32)

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 52

and the same step in (4.37) can be applied.

Rayleigh Channel with no CSI

When neither the fading amplitude nor the phase information is known to the receiver,

the optimal metric is [17],

log p(y|ei) =Es |y[i]|2

N0(N0 + Es)i = 0, 1. (3.33)

This is equivalent to a square law demodulator, and the PEP has the same form as in

(3.24) [32](14.4-30), except that

µ =γ

2 + γ. (3.34)

3.3 Results and Performance Analysis

The derived bound assumes joint decoding of the inner and outer code, and therefore does

not exactly bound the performance using suboptimal iterative decoding. However, the

union bound still works well at the range of medium-high SNR. The simulation results

show that the bound is asymptotically tight, and it is a good tool for evaluating the

system’s error floor performance.

Fig. 3.5 shows the bound and simulation results for outer code g(o) = [1 + D2, 1 +

D +D2] and 16-ary orthogonal modulation. BICOM-DP is compared with BICOM. The

channel is fully interleaved Rayleigh fading, and noncoherent reception with CSI is used

at the receiver. The simulation results converge to the analytical bound very well, and the

benefit of using the differential inner code is clear shown in the figure. When the length

of the information input increases from Nc = 400 to Nc = 4000, the FER of BICOM goes

up, while the one of BICOM-DP decreases with the exponent of bd(o)free−1

2c = 2, since the

outer code has the free distance d(o)free = 5.

Fig. 3.6 compares the BER of BICOM and BICOM-DP, both using outer code g(o) =

[1 + D2, 1 + D + D2], 8-ary orthogonal modulation and coherent detection in AWGN

channel. For BICOM, αb,max = t(o)max − 1 from (3.17). When the SNR is reasonably

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 53

4 6 8 10 12 14 16 1810

-10

10-8

10-6

10-4

10-2

100

Bound Nc=400

Bound Nc=4000

simulation Nc=400

Rate ½ Outer Code

g(o)=[1+D2,1+D+D2]

M= 16,

Rayleigh Fading

Noncoherent CSI

Detection

BICOM

g(i)=1BICOM-DP

g(i)=1/(1+D)

Eb/No(dB)

FE

R

Figure 3.5: Bounds of BICOM g(i) = 1 and BICOM-DP g(i) = 1/(1 + D). Both systemshas the outer code g(o) = [1 + D2, 1 + D + D2], 16-ary orthogonal modulation, fullyinterleaved Rayleigh fading channel, and noncoherent Reception with CSI. Simulationresults are shown for Nc = 400. The simulations ran up to 20th iteration.

high, the sequence with only 1 error event in the outer code occurs with much greater

frequency than the other error events. Thus, the effective αb is close to zero, which causes

BICOM’s BER bound to converge to the the EFF bound [31]. However, for BICOM-DP,

the BER decreases by about 10−3 when Nc increases 10 times. This verifies the maximum

exponent of Nc on BER −bd(o)free+1

2c = −3, where d

(o)free = 5 for the 4-state outer code.

Fig. 3.7 shows the bounds on BICOM-DP for all five channel detection types with

outer code g(o) = [1 + D2 + D3, 1 + D + D2 + D3] and 16-ary orthogonal modulation.

It is seen that the bounds for AWGN channel go down exponentially, while the bounds

in fully independent Rayleigh channel are asymptotically straight, with diversity gain

hmin(αf,max) = 3, since the minimum free distance of the outer code is 6. The reason is

when the interleaver size Nc is large, the bounds mostly depend on the coefficients Wd,h

with maximum exponent on Nc. Among those coefficients, the one with the minimum

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 54

0 1 2 3 4 5 6 7 8 9 1010-1510-1010-5100 N=600 SimulationN=600N=1200N=6000N=12000EFF bound

Eb/No (dB)

BER BICOM

g(i)=1BICOM-DPg(i)=1/(1+D)

Rate ½ Outer Code g(o)=[1+D2,1+D+D2]

M= 8, AWGNCoherent Detection

Figure 3.6: Bounds of BICOM g(i) = 1 and BICOM-DP g(i) = 1/(1 + D). Both systemshas the outer code g(o) = [1 + D2, 1 + D + D2], 8-ary orthogonal modulation, AWGNchannel, and coherent Reception. Simulation results are shown for Nc = 600. Thesimulations ran up to 20th iteration.

output weight hmin(αf,max) determines the asymptotic performance at medium-high SNR.

For large γ in Rayleigh fading channel, (3.24), (3.25) and (3.34) can be approximated as,

P (h) = 2−h

(2h− 1

h

)γ−h (3.35)

for coherent reception, and

P (h) =

(2h− 1

h

)γ−h (3.36)

for noncoherent reception without CSI. Although there is no closed form on the PEP for

noncoherent detection with CSI in Rayleigh fading channel, it is obvious that this case is

bounded between the coherent detection and the noncoherent detection without CSI. So

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 55

0 5 10 1510

-15

10-10

10-5

100

AWGN Coherent

AWGN Noncoherent

Rayleigh Coherent

Rayleigh Noncoherent CSI

Rayleigh Noncoherent noCSI

Square Law

Upper Bound

on AWGN

Noncoherent

Detection2 3

BICOM-DP

Rate ½ Outer Code

g(o)=[1+D2+D3,

1+D+D +D ]

M = 16, Nc = 1000

FE

R

Eb/No(dB)

Figure 3.7: Bounds of BICOM-DP with the outer code g(o) = [1+D2+D3, 1+D+D2+D3],16-ary orthogonal modulation, Nc = 1000. All five channel reception combinations areshown.

P (h) is still proportional to γ−h. Hence, hmin(αf,max) is the diversity gain of the system.

3.4 Chapter Summary

This chapter presents a union bound on SCCC coded M-ary orthogonal modulation. Tail

termination effects are considered to make the bound more accurate. The recursive inner

code is shown to have an interleaver gain relative to the nonrecursive code, including the

conventional BICMID system. Both coherent and noncoherent reception are evaluated,

in AWGN and fully interleaved Rayleigh fading. Diversity gain in the Rayleigh fading

channel is analyzed.

We can lower the error floor of the convolutional BICOM system by putting a recursive

inner code before the modulator. The simplest recursive structure is the differential

encoder, which has only two states. Fig. 3.8 shows the BICOM-DP simulation results

CHAPTER 3. ASYMPTOTIC ANALYSIS OF CODED ORTHOGONAL MODULATION 56

1 1.5 2 2.5 3 3.5 4 4.5 510

-10

10-8

10-6

10-4

10-2

100

Eb/No (dB)

BE

R

K = 3

K = 4

Turbo code

BICOM

Bounds

BICOM

Simulations

BICOM-DP

Simulations

BICOM-DP

Bounds

Length 6138

Rate ½

M = 16 Orthogonal Modulation

AWGN channel

Noncoherent Detection

(a) M = 16

Eb/No (dB)

BE

R

BICOM

Bounds

BICOM

Simulations

BICOM-DP

Simulations

BICOM-DP

Bounds

Length 6138

Rate ½

M = 64 Orthogonal Modulation

AWGN channel

Noncoherent Detection

1 1.5 2 2.5 3 3.5 4 4.5 510

-10

10-8

10-6

10-4

10-2

100

K = 3

K = 4

Turbo code

(b) M = 64

Figure 3.8: Bounds and simulation results of BICOM and BICOM-DP in AWGN channel,noncoherent detection

and their union bounds. With a very low error floor, the constraint length K = 3

convolutional BICOM-DP system is now about 0.7 dB better than the turbo coded

system.

However, a major drawback of BICOM-DP is the channel estimation difficulty. Al-

though the block fading coefficients are still assumed to be independent, the inner code

makes an intrinsic connection between adjacent blocks, which makes the block by block

channel estimator for BICOM unfeasible. In Chapter 6, we will introduce the channel

estimator for a general coded CPFSK system, including BICOM.

Chapter 4

Coherent CPFSK

The previous chapters focused on coded orthogonal modulation. One major drawback of

orthogonal modulation is its high bandwidth, since it requires M dimensions to transmit

m = log2 M bits.

This chapter begins our discussion of nonorthogonal continuous phase FSK (CPFSK)

modulation. In contrast with the orthogonal case, adjacent frequency tones can be placed

h/TS apart, where the modulation index h is usually between 0 and 1. Also, in CPFSK

modulation, the phase is continuous from symbol to symbol, which reduces the band-

width. The bandwidth efficiency can be further improved by using partial response

signaling, achieved by shaping the pulses prior to FM modulation. However, such a

strategy induces severe inter-symbol interference (ISI) which cannot be mitigated by a

truly noncoherent receiver. While the ISI can be resolved using differential detection,

such techniques are outside the scope of this dissertation. The interested reader is re-

ferred to [59] [60].

Unlike memoryless FSK, the phase of CPFSK is accumulated from symbol to symbol

to maintain a smooth phase transition. When the modulation index h is a rational

number, the accumulated phases take values from a finite set Φ ⊂ [0, 2π). In such a

case, the phase trajectory can be viewed as a finite-state Markov random process, so

that the modulator and additive white Gaussian noise (AWGN) channel can together be

considered as a finite-state Markov channel (FSMC). This allows coherent detection to

be performed on a trellis.

57

CHAPTER 4. COHERENT CPFSK 58

Finding the capacity of a FSMC is difficult, since it requires a maximization over

the probability density function (pdf) of a long input sequence. [61] studied the analyt-

ical bounds of discrete-time intersymbol interference (ISI) channel, one type of FSMC.

However, fortunately in practice, the input to the FSMC is usually preceded by an outer

channel encoder, which typically produces uniformly distributed outputs. Arnold et

al. [62] and Pfister et al. [63] use the forward recursion of the BCJR algorithm [9] to

compute the symmetric information rate of the FSMC, which is the mutual information

when the inputs are independent and uniformly distributed (i.u.d.). In this chapter, we

apply a similar approach to compute the symmetric information rate of coherently de-

tected CPFSK, which is to our knowledge a new application of the techniques in [62,63].

For the remainder of the chapter, we assume i.u.d. inputs and therefore use the term

capacity to specifically mean the symmetric information rate.

In this chapter, the signal model for coherent CPFSK in AWGN is introduced in

Section 4.1. Next, in Section 4.2 the i.u.d. capacity of coherent detected CPFSK is

evaluated by treating CPFSK and AWGN as a FSMC. Then, Section 4.3 analyzes the

capacity under spectral efficiency constraint.

Having established the capacity of coherent CPFSK, we turn our attention to the

design of systems that are capable of approaching the capacity. Iterative demodulation

and channel decoding of coded CPM systems was studied in [45,64], using convolutional

codes as outer codes. [65] considered a low density parity-check (LDPC) coded system

for minimum shift keying (MSK), achieving lower convergence threshold. In Section 4.4,

a binary irregular repeat-accumulate (IRA) code [66] is used along with iterative demod-

ulation and decoding with the CPFSK modulator assuming the role of the accumulator.

The IRA code is designed directly from the system’s EXIT chart using a curve-matching

technique proposed by ten Brink et al. [67] and Roumy et al. [68]. This method is adopted

in Section 4.5, and the optimization tool is linear programming, which was used by Chung

et al. [69] and Ardakani et al. [70] to find capacity approaching LDPC codes. This was

also applied to the noncoherent detection of orthogonal FSK by Guillen i Fabregas in [71],

where the area between inner and outer EXIT curves is minimized in order to find capac-

ity approaching code designs. The combination of IRA codes and CPM has previously

been considered in [72,73]. However, we point out later that the lower bound constraint

CHAPTER 4. COHERENT CPFSK 59

on degree one check node can be loosened, which potentially allows the optimized codes

to approach the capacity more closely. Simulation results in Section 4.6 show that our

coded system designs are only 0.4dB away from the coherent capacities of various M , h.

4.1 Coherent Detection

Suppose the input sequence to a CPFSK modulator is q, whose elements are i.u.d. over

the integers from 0 to M − 1. For every entry of q, the modulated signal xi(t) is chosen

as the qthi signal of the set S = {sk(t), k = 0, 1, · · · , M − 1}, where

sk(t) =1√Ts

exp

{j2πkht

Ts

}, t ∈ [0, Ts), (4.1)

and h is the modulation index. In order to satisfy the continuous-phase constraint, the

phase of each modulated symbol is accumulated as

φi+1 , φi + 2qihπ, (4.2)

where φi is the accumulated phase at the start of the ith symbol [59]. The complex-

baseband representation of the transmitted continuous-time waveform is√Ese

jφixi(t),

and the corresponding complex-baseband received signal is

yi(t) =√Ese

jφixi(t) + ni(t), (4.3)

where ni(t) is a circularly symmetric complex AWGN process with noise spectral density

N0, and Es is the energy per symbol [33].

Given the initial phase φi at the start of the ith interval, the front-end of the coherent

receiver determines the likelihoods of receiving yi(t) conditioned on each signal in S.

Since this process is the same for every received symbol, we drop the index i for the

remainder of this section. The received signal y(t), 0 ≤ t ≤ Ts, is first passed through a

bank of M pairs of matched filters, with one pair matched to the in-phase and quadrature

components of each tone, and then sampled at the symbol epoch. The sampled signal

CHAPTER 4. COHERENT CPFSK 60

can be written in vector form as

y = ejφ√Esx + n, (4.4)

where the elements of x and n are

xk =

∫ Ts

0

x(t)s∗k(t)dt (4.5)

nk =

∫ Ts

0

n(t)s∗k(t)dt, (4.6)

and k = {0, 1, ..., M − 1}. The noise vector n is Gaussian with a covariance matrix

R = E(nnH) with (k, i)th element

rk,i = N0

∫ Ts

0

s∗k(t)si(t)dt

= N0sin(π(i− k)h)

π(i− k)hejπ(i−k)h. (4.7)

When conditioned on both x and φ, the vector y is Gaussian with mean x and covariance

R, and has conditional pdf

p(y|x, φ) =1

πMdet(R)e−(y−ejφ

√Esx)HR−1(y−ejφ√Esx). (4.8)

The exponent can be simplified as

−(y − ejφ√Esx)HR−1(y − ejφ

√Esx)

= −yHR−1y − EsxHR−1x + 2Re(e−jφ

√Esx

HR−1y). (4.9)

Define K , 1N0

R, i.e. a normalized version of R. Note that when x(t) = sν(t), x is the

νth column of K. Therefore, given x(t) = sν(t), the exponent becomes

−yHK−1y + Es

N0

+ 2

√Es

N0

Re(e−jφyν). (4.10)

CHAPTER 4. COHERENT CPFSK 61

Taking the log of (4.8) and discarding terms that are common to all hypothesis, the log-

likelihood for coherent reception can be expressed for each postulated ν = {0, ..., M − 1}as

log f(y|x = kν , φ) = 2

√Es

N0

Re(e−jφyν), (4.11)

where kν represents the νth column of K and f(y|x, φ) ∝ p(y|x, φ).

4.2 Capacity of Coherent Detection

Trellis-based detection of CPFSK requires that the modulation index h be a rational

number so that the accumulated phase φ takes on values from a finite set. Suppose

h = P/Q, where P and Q are relatively prime positive integers. The total number of

unambiguous values that φ can assume is Q. Thus, demodulation can be performed over

a trellis with Q states and QM branches per trellis section.

In the following, the notation xji represents the set {xi,xi+1, · · · ,xj}. The capacity of

coherently detected CPFSK is found by first evaluating the average mutual information

I(xN−10 ,yN−1

0 ) between xN−10 and yN−1

0 , and then taking the average as the sequence

length N goes to infinity,

C(c) = limN→∞

1

NI(xN−1

0 ,yN−10 ). (4.12)

From the chain rule of entropy,

I(xN−10 ,yN−1

0 ) = H(xN−10 )−H(xN−1

0 |yN−10 )

=N−1∑i=0

H(xi)−N−1∑i=0

H(xi|xi−10 ,yN−1

0 ), (4.13)

where H(xi|xi−10 ) = H(xi) is used. Because xi is i.u.d. over M constellation points,

H(xi) = log2 M , and all that remains to be calculated is H(xi|xi−10 ,yN−1

0 ) . Note

that this factorization is different from the factorization I(xN−10 ,yN−1

0 ) = H(yN−10 ) −

H(yN−10 |xN−1

0 ) used in [62,63], which requires the calculation of two entropies. From the

CHAPTER 4. COHERENT CPFSK 62

definition of conditional entropy,

H(xi|xi−10 ,yN−1

0 ) = −E[log2 p(xi|xi−1

0 ,yN−10 )

]. (4.14)

The above expectation can be found using Monte Carlo integration.

To compute the probability p(xi|xi−10 ,yN−1

0 ), first apply Bayes’ rule to obtain

p(xi|xi−10 ,yN−1

0 ) =p(xi,x

i−10 ,yN−1

0 )

p(xi−10 ,yN−1

0 ). (4.15)

Rather than explicitly calculating the denominator in (4.15), its value is found to ensure

that

∑xi

p(xi|xi−10 ,yN−1

0 ) = 1. (4.16)

Similar to [62], a BCJR-like method can be used to compute p(xi,xi−10 ,yN−1

0 ), which is

described as follows. Assume φ takes on values from the set Φ, whose cardinality is Q.

Define α, β, γ as

αi(φi) , p(φi,yi−10 ,xi−1

0 ) (4.17)

βi+1(φi+1) , p(yN−1i+1 |φi+1) (4.18)

γ(φi → φi+1,yi,xi) , p(yi, φi+1|φi,xi). (4.19)

Note that γ(φi → φi+1,yi,xi) is nonzero only when xi causes the state transition from

φi to φi+1. Therefore, it may be written as

γ(φi → φi+1,yi,xi = kν)

= p(φi+1|φi,xi = kν)p(yi|φi+1, φi,xi = kν)

=

{p(yi|φi,xi = kν) φi+1 = φi + 2νhπ

0 φi+1 6= φi + 2νhπ.(4.20)

CHAPTER 4. COHERENT CPFSK 63

As with the BCJR algorithm, α can be calculated in a forward recursion as

αi+1(φi+1) =1

M

φi∈Φ

αi(φi)γ(φi → φi+1,yi,xi = kqi). (4.21)

Similarly, β can be calculated in a backward recursion as

βi(φi) =1

M

∑xi

φi+1∈Φ

βi+1(φi+1)γ(φi → φi+1,yi,xi). (4.22)

Note that xi is marginalized out of the summand since βi(φi) does not depend on it.

In the absence of knowing the starting and ending states, both α0 and βN can be

initialized assuming equally likely states, i.e. α0(φ) = βN(φ) = 1/M , ∀φ ∈ Φ. Alterna-

tively, if the initial phase φ0 is known to the detector, α0 can be set to all zeros except

a one at the corresponding entry. Obviously, the effect of the initial states of α0 and βN

diminish as N approaches infinity.

Given the above definitions, p(xi,xi−10 ,yN−1

0 ) is found from

p(xi,xi−10 ,yN−1

0 ) =1

M

φi∈Φ

φi+1∈Φ

αi(φi)βi+1(φi+1)γ(φi → φi+1,yi,xi). (4.23)

Fig. 4.1 shows the capacities of different detectors of MSK (M = 2, h = 1/2). From

left to right, they are i.u.d. capacity of coherent detection, i.u.d. capacity of BICM de-

tection [21] and symbol-wise noncoherent capacity [22] respectively. The BICM detector

uses the coherent metric in (4.11) and decodes through the trellis as well. However, it as-

sumes no priori information, and measures the mutual information at the decoder output.

Therefore, the BICM capacity of MSK is strictly bounded by the coherent capacity.

C(BICM) = limN→∞

1

N

N−1∑i=0

[H(xi)−H(xi|yN−1

0 )]. (4.24)

< limN→∞

1

N

N−1∑i=0

[H(xi)−H(xi|xi−1

0 yN−10 )

].

= C(c)

CHAPTER 4. COHERENT CPFSK 64

-30 -25 -20 -15 -10 -5 0 5 10 15 200

0.2

0.4

0.6

0.8

1

1.2

Es/No

Capa

city

Coherent i.u.d. CapacityBICMnoncoherent capacity

Figure 4.1: Capacities of MSK (M = 2, h = 1/2): From left to right, they are i.u.d.capacity of coherent detection, i.u.d. capacity of BICM detection and symbol-wise non-coherent capacity respectively.

At coding rate r = 0.5, the gap between BICM capacity and coherent capacity is about

2.5dB. This also tells that the iterative decoding of coherent CPFSK is desirable, because

the extrinsic information can help the CPFSK detector exploits more information from

the trellis.

4.3 Capacity under Spectral Efficiency Constraint

For coherent detection, it is generally true that the minimum Eb/N0 required is a mono-

tonic increasing function over the coding rate r. But lower coding rates require wider

bandwidth, which reduces the spectral efficiency. To quantify the tradeoff between Eb/N0

and spectral efficiency, the bandwidth of the CPFSK signal must be computed. The

power spectral density (PSD) Ψs(f) of the CPFSK signal s(t) is given in Section 4.4.2

CHAPTER 4. COHERENT CPFSK 65

of [32]. From the PSD, the 99% power bandwidth B99 of s(t) is defined as

∫ B99/2

−B99/2

Ψs(f)df = 0.99

∫ ∞

−∞Ψs(f)df. (4.25)

This bandwidth is a function of M , h, and the symbol rate Rs = 1/Ts. Given that

s(t) with parameters M and h is transmitted at a rate of Rs baud, we can define the

normalized bandwidth to be B(M, h) = B99Ts Hz/baud. We can then define the spectral

efficiency η = r log2 M/B(M, h), which has units of bits-per-second-per-Hz (bps/Hz).

To determine the fundamental tradeoff between η and Eb/N0, one must determine the

minimum value of Eb/N0 for a particular desired spectral efficiency η. For each choice

of η, h, and M , the range of r that may be considered is restricted, and there will be a

threshold r′ on code rate

r′ = ηB(M, h)

log2 M(4.26)

such that r ∈ [r′, 1]. Rates r < r′ cannot be considered because for the particular h

and M , the spectral efficiency will be lower than η. For coherent detection, given the

fact that Eb/N0 monotonically increases with respect to the coding rate r, r′ is the point

where the minimum Eb/N0 can be achieved. Note that this is different from the case of

noncoherent detection, where the optimal coding rate could be anywhere in the range

[r′, 1] due to the noncoherent combining penalty [17,22].

Determining of the minimum Eb/N0 for each choice of M , h, and η requires that the

curve showing Eb/N0 versus r be generated. Next, the minimum rate r′ is determined. For

example, when M = 2 and η = 1/2 bps/Hz, the minimum values of r are 0.39, 0.55, 0.64,

and 0.96 for h = 1F/5, 2/5, 3/5, and 4/5, respectively. Since B(M = 2, h = 1) =

2.1309 > 1/η, no code of rate r ≤ 1 can be used at this η when h = 1 and thus

orthogonal modulation cannot be considered. Next, the minimum Eb/N0 at coding rate

r′ is found.

Fig. 4.2 shows the binary CPFSK capacity for different spectral efficiencies. To

constrain complexity, we restrict the denominator of h to assume values Q ≤ 5. For the

loosest constraint (η = 0.02), the minimum Eb/N0 required approaches −1.6 dB for every

CHAPTER 4. COHERENT CPFSK 66

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1-2

-1

0

1

2

3

4

5

h

min

Eb/

No

= 0.75

= 0.25

= 0.02

= 0.5

Figure 4.2: Capacities of binary CPFSK for different spectral efficiency constraints. Fromtop to bottom, the spectral efficiencies are η = 0.75, η = 0.5, η = 0.25 and η = 0.02. his considered with the denominator up to 5. So from left to right, they are 1

5, 1

4, 1

3, 2

5,

12, 3

5, 2

3, 3

4and 4

5respectively. Also, the memoryless orthogonal case h = 1 is listed for

reference.

choice of h. As the bandwidth gets tighter, the required Eb/N0 becomes larger. When

η = 0.25, the minimum Eb/N0 is about −1 dB, and it is achieved at h = 35

and coding

rate r = 0.32. When η = 0.5, the minimum Eb/N0 = −0.1 dB is still achieved at h = 35,

and the coding rate is doubled to about 0.64. When η = 0.75, the minimum Eb/N0 = 1.9

dB is achieved at h = 25, and the optimal coding rate is r = 0.83.

Fig. 4.3 shows the CPFSK capacities of different M under spectral efficiency η = 0.5.

The optimal choice of h and r for each M is listed in Table 4.1.

4.4 Coded System Implementation

The structure of a coded system capable of approaching the CPFSK capacity limits is

shown in Fig. 4.4. The system is a serial concatenation of two codes separated by an

CHAPTER 4. COHERENT CPFSK 67

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9-1

-0.5

0

0.5

1

1.5

2

2.5

3

h

min

Eb/

No

M=2M=4M=8

Figure 4.3: CPFSK capacities of different M for spectral efficiency η = 0.5. h is consid-ered with the denominator up to 5. So from left to right, they are 1

5, 1

4, 1

3, 2

5, 1

2, 3

5, 2

3, 3

4

and 45

respectively.

interleaver Π. The outer code is a mixture of repetition codes represented by variable

nodes “=”. The degree d of a variable node is the number of times that the corresponding

message bit is repeated. Since the code is irregular, the variable nodes do not all have the

same degree. The entire set of repeated bits is interleaved and sent to the check nodes,

represented by “+”. Each check node forms a single party-check (SPC) on a distinct

subset of interleaved bits. The degree of a check node is the number of bits used to

form the check. The outputs of the SPC nodes are grouped together and passed to the

modulator. As in [74], the code is nonsystematic, and therefore unlike [68], the message

bits are not modulated.

The system shown in Fig. 4.4 is reminiscent of the IRA code proposed in [66]. When

used with a memoryless modulation, an IRA code must include an accumulator to ensure

that the inner code is recursive. However, as evident by (4.2), CPFSK with noninteger

h is already recursive. Thus, as observed in [72], a coherent nonorthogonal CPM system

does not need an accumulator because the recursive modulator may assume the role of

CHAPTER 4. COHERENT CPFSK 68

+=

= + Parallel/S

erial

CPFSK

zi

vi

ri,j

mi,jFigure 4.4: Nonsystematic IRA coding structure. “=” corresponds to variable nodes and“+” corresponds to single parity-check nodes.

the accumulator.

At the transmitter, a binary message vector u ∈ {0, 1}Nu is encoded in parallel by Nu

variable nodes, each generating a repetition code. In the factor-graph representation of

the code, the degree d of a node is the number of edges that are incident to the node. The

degree distribution of the variable nodes can be described by either the node-perspective

degree distribution λd or the edge-perspective degree distribution λd. In particular, λd is

the fraction of nodes that have degree d, while the λd is the fraction of edges that touch

degree d nodes. The two perspectives are related by

λi =λii∑dv

d=1 λdd(4.27)

where dv is the maximum variable-node degree.

The outputs from the Nu variable nodes form a vector c′ of length Nc =∑dv

d=1 λddNu.

c′ is then interleaved into c and forwarded to Nb single-parity-check nodes. The check-

node degree distributions may be represented in either node-perspective ρd or edge-

perspective ρd. The variables Nb and Nc are related by Nb = Nc/(∑dc

d=1 ρdd), where dc

is the maximum check-node degree. Each check node computes the single parity-check

CHAPTER 4. COHERENT CPFSK 69

bit of its inputs, and forms the vector b for modulation. Therefore, the coding rate r

satisfies

r =

∑dc

d=1 ρdd∑dv

d=1 λdd=

∑dv

d=1λd

d∑dc

d=1ρd

d

. (4.28)

Before it is modulated, the binary vector of bits b must be transformed into the M-ary

symbol vector q by an appropriate symbol labeling function g(·), which can be expressed

as

qi = g

(µ−1∑j=0

biµ+j2µ−1−j

), (4.29)

where µ = log2 M . In this chapter, we simply assume Nb is divisible by µ. Otherwise,

b can be padded to meet this requirement. Therefore, q is a M-ary vector of length

N = Nb/µ. For the binary case, labeling is not important, since the two frequency

tones are interchangeable. However, when M is greater than 2, the labeling can be very

important for certain values of h. This point will be discussed in the next section.

At the receiver, decoders for each of the inner and outer codes exchange extrinsic

information using a turbo-like schedule [68], or equivalently using the sum-product al-

gorithm [75]. Fig. 4.4 also shows the extrinsic information flow using dashed arrows.

During the first stage, based on the channel observation yN−10 , the log likelihood ratios

z are found by using the BCJR [9] or SISO [35] decoding algorithm. The jth element of

z is

zj = logp(bj = 0|yN−1

0 ,v\vj)

p(bj = 1|yN−10 ,v\vj)

, (4.30)

where v is the extrinsic information from the check nodes, and \vj indicates that vj

is excluded, so that zj carries extrinsic information only. Obviously, in the first half

decoding iteration, v is all zeros.

The check nodes then update the messages sent to the variable nodes. The output

information ri,j from jth check node to ith variable node, assuming they are connected,

CHAPTER 4. COHERENT CPFSK 70

can be calculated as [75]

ri,j = sign(zj)∏

i′:Rj\isign(mi′,j)ψ

ψ(|zj|) +

i′:Rj\iψ(|mi′,j|)

(4.31)

where

sign(z) =

{−1 z < 0

1 z ≥ 0(4.32)

ψ(|z|) = loge|z| + 1

e|z| − 1, (4.33)

Rj is the set of indices of the variable nodes connected to the jth check node, and \imeans excluding the element i. Here, mi,j is the a priori information from the ith variable

node to the jth check node, which is zero for the first half iteration.

The second half iteration begins with every variable node updating its output, which

is forwarded to the check nodes. When the ith variable node and jth check node are

connected, the output is

mi,j =∑

j′:Mi

ri,j′ − ri,j, (4.34)

where Mi is the set of indices of the check nodes connected to the ith variable node.

Here, the first term∑

j′:Miri,j′ is used for the hard decision of the decoding output.

After all variable nodes update their outputs, the check nodes calculate the extrinsic

information forwarded to the CPFSK SISO. Every check node processes the messages

from all the connected variable nodes, and the information on the jth check node can be

computed as

vj =∏

i′:Rj

sign(mi′,j)ψ

i′:Rj

ψ(|mi′,j|) (4.35)

The second half of the first iteration is finished once all check nodes update their outputs

v. The second iteration then starts to compute (4.30) with the nonzero sequence v, and

CHAPTER 4. COHERENT CPFSK 71

performs (4.31), (4.34) and (4.35) accordingly. It is feasible that the variable nodes and

check nodes can perform several local iterations within a single global iteration. That

is, (4.31) and (4.34) are evaluated more than once before (4.30) is executed in the next

global iteration. But in this chapter, in order to exploit the most information from the

CPFSK trellis, we only perform (4.31) and (4.34) once per global iteration.

4.5 Code Optimization

EXIT charts are often used to analyze the convergence behavior of iterative decoding

systems. In [67], a curve-matching technique was applied that allows EXIT charts to

be directly used as a code design methodology. This technique was later applied to the

design of IRA codes in [68] and systems using orthogonal FSK with symbol-by-symbol

noncoherent detection in [74]. Here, we apply the EXIT curve-matching technique to

design nonsystematic IRA codes for CPFSK with coherent detection.

An EXIT chart is created for a particular SNR by drawing the information-transfer

functions for the inner and outer codes on the same plot. The information-transfer

function for an outer repetition code of degree d is [76]

I(o)E,d(I

(o)A ) = J

(√d− 1J−1(I

(o)A )

), (4.36)

where the superscript (o) denotes the outer code, and the subscripts A and E represent

the a priori input information and the extrinsic output information. The function J(·)is defined in [76] as

J(σ) =

∫1

2πσe−

(x−σ2)2

2σ2 log2

(1 + e−x

)dx, (4.37)

and can be predetermined by numerical or Monte Carlo integration.

When an IRA code is used, the variable nodes do not all have the same degree. The

overall information-transfer function for the outer code can be approximated by using

CHAPTER 4. COHERENT CPFSK 72

the edge-perspective degree distribution to linearly combine the component information-

transfer functions according to [76]

I(o)E (I

(o)A ) =

dv∑

d=2

λdI(o)E,d(I

(o)A ). (4.38)

Note that d = 1 does not appear in the above summation because I(o)E,1(I

(o)A ) = J (0) = 0.

This implies that degree-one variable nodes do not help the iterative decoding, and so in

our code design we always set λ1 = 0.

As with the outer code, the overall information-transfer function of the inner code

can be approximated by using the corresponding edge-perspective degree distribution to

linearly combine the component information-transfer functions I(i)E,d, resulting in

I(i)E (I

(i)A ) =

dc∑

d=1

ρdI(i)E,d(I

(i)A ). (4.39)

What remains is the calculation of the function I(i)E,d(·) for each d. Unlike the outer

code, the component information-transfer functions I(i)E,d(·) cannot be easily expressed in

integral form like (4.36)-(4.37), and therefore must be found via Monte Carlo simulation

for each d as follows. A length Nc vector c of i.u.d. binary symbols is randomly generated

and encoded into the length Nc/d vector b by the degree-d check nodes. Typically,

Nc is chosen to be large in order to reduce the influence of the initial and final states

of the CPFSK modulator trellis. The symbol labeling function (4.29) transforms b

into the length N symbol vector q which is then passed into the CPFSK modulator

to produce the modulated waveform x(t). The modulated signal is passed through an

AWGN channel and a bank of matched filters to produce the sequence yN−10 . The actual

received sequence yN−10 and a simulated a priori input sequence v are input to the

trellis-based CPFSK decoder, which produces the extrinsic output z given by (4.30). The

sequence v is created using (4.35), where each mi,j corresponds to the simulated message

received by the jth check node from the ith variable node. The mi,j’s are assumed to be

conditionally Gaussian and consistent, with variance σ2 and mean (−1)ckσ2/2, where ck

CHAPTER 4. COHERENT CPFSK 73

is the corresponding simulated bit of c. The variance σ2 is found from the information-

transfer function’s argument I(i)A by inverting (4.37). Once z is generated, (4.31) is

used to generate the messages ri,j sent from the check nodes to the variable nodes.

Finally, an estimate of I(i)E,d(·) is found for the given codeword and channel realization by

measuring the mutual information between c and the corresponding ri,j’s. The process is

repeated for many simulated codewords and channel realizations, and the sample mean

is computed.

Once the information-transfer functions for the inner and outer codes have been found,

they are drawn on the same plot. The inner-code’s information-transfer function is

drawn with I(i)A as its horizontal axis and I

(i)E as its vertical axis, while the outer-code’s

information-transfer function is drawn with I(o)E as its horizontal axis and I

(o)A as its

vertical axis. The plot showing both of these curves constitutes the system’s EXIT

chart. The code is said to converge if there is a gap between the two curves, and the

convergence threshold is the minimum SNR for which the two curves just barely touch.

The design objective is to minimize this threshold through the proper selection of the

degree distributions.

4.5.1 Degree Distribution Optimization

The convergence threshold can generally be minimized by minimizing the area between

the inner and outer EXIT curves. This property was used in [74] and [77] to design

capacity-approaching codes. We apply the same principle by first fixing the degree dis-

tribution of the inner code {ρd} and the channel SNR Es/N0, and then finding the degree

distribution of the outer code {λd} that minimizes the area between the curves. This can

be done by using linear programming. We sample the outer-code’s EXIT curve I(o)E (·)

along the I(o)A axis and the inner-code’s inverse EXIT curve I

(i)A (·) = I

(i)−1E (·) along the

I(o)E axis. Let Ii ∈ (0, 1) denote the ith sampling point and I denote the indices of the

sampling points. Convergence requires the two curves do not intersect, which implies

that I(i)A (Ii) < I

(o)E (Ii) for all i ∈ I. When there are a large number of uniformly spaced

CHAPTER 4. COHERENT CPFSK 74

sampling points, the area between the two curves can be approximated as

A ∝∑i∈I

(I

(o)E (Ii)− I

(i)A (Ii)

). (4.40)

Given that the maximum variable-node degree is dv, the area A in (4.40) can be minimized

subject to the following constraints: (1) I(i)A (Ii) < I

(o)E (Ii) for all i ∈ I; (2)

∑dv

d=2 λd = 1;

and (3) The desired coding rate r in (4.28) is attained. If a solution to the linear

programming problem is found for a particular channel SNR Es/No, then the SNR is

lowered and the process repeated until a solution can no longer be found. The final

design and the convergence threshold is found from the last successful solution to the

linear programming problem.

4.5.2 Symbol Labeling Issues

When M is greater than Q, the denominator of h, the number of edges coming out of

each state is more than the total number of states. When this occurs, there will be

parallel edges between at least one pair of starting and stopping states. This is apparent

by inspecting (4.2). For example, when M = 4 and h = 1/3 and the starting state is φi,

the symbol-wise inputs q = 0 and q = 3 share the same ending state φi+1 = φi = φi +2π.

As shown in Fig. 4.6, the symbols may be labeled according to either a Gray labeling or

a natural labeling.

The symbol labeling function has a profound effect on the shape of the inner-code’s

EXIT curve. Fig. 4.5 shows the EXIT curves for M = 4 h = 1/3 at Es/N0 = 0 dB with

Gray and natural labelings. The effect of the symbol labeling is most pronounced on the

right side of the EXIT curves. With natural labeling, the EXIT curves for codes with

degree one and two terminate in the upper right corner, i.e. the (1, 1) point. However,

with Gray labeling, when the input a priori information is perfect, the output extrinsic

information is only about 7/8. This means that even when all other bits are perfectly

known, there is still some uncertainty about the current bit. The underlying reason is

the labeling. With Gray labeling, there exist parallel transitions labeled with 00 and

10. In this case, when all the other bits are known, and the starting and ending states

CHAPTER 4. COHERENT CPFSK 75

IA(i)

I E(i)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1Natural labelingGray labeling

d=1

d=2

Figure 4.5: Inner code EXIT curves of M = 4, h = 1/3 with gray and natural labelings.Es/N0 = 0dB.

can be perfectly identified, the first bit still can not be identified for sure. For instance,

if the decoder knows that the starting and ending states are zero and that the second

bit associated with the state transition is zero, then the decoder cannot determine if the

first bit is a zero or a one. However, with natural labeling, the parallel transitions are

labeled with 00 and 11, which means either bit can be determined provided the other

one is perfectly known.

When the inner-code’s EXIT curve does not terminate in the upper right, the code

optimization technique described in the previous section will not work because I(i)A (Ii) <

I(o)E (Ii) will not be satisfied as Ii approaches unity. In addition to violating the linear

programming constraint, the code will have a high error floor due to the early crossing of

the inner-code and outer-code EXIT curves. To prevent these issues, the symbol labeling

should be chosen to assure that the inner-code EXIT curve extends to the (1, 1) point.

Thus, for the example of M = 4 and h = 1/3, natural labeling is more desirable than

Gray labeling. However, natural labeling is not universally preferred. For instance when

CHAPTER 4. COHERENT CPFSK 76

000011011 0

Gray Labeling

000011110 0

Natural LabelingFigure 4.6: Gray and natural labelings of M = 4, h = 1/3

M = 8 h = 1/4, Gray labeling is preferred over natural labeling. As a general rule, a

suitable labeling is one that assures that parallel transition pairs are labeled with at least

two distinct bits. This rule is the sufficient and necessary to force the inner-code EXIT

curve to the (1, 1) point.

4.5.3 Interleaver Design Issues

If an interleaver is drawn at random, there is a possibility that the resulting encoder will

perform a many-to-one mapping of message sequences u to codewords b. Two examples

of when this situation occurs are shown in Fig. 4.7. In the example on the left, a

particular variable node is connected to a check node by an even number d of parallel

edges. In such a case, the check node will take the modulo-2 sum of the bit at the output

of the variable node, which is always equal to zero no matter what bit is produced by

the variable node. It is as if the two nodes were not connected. If the variable node is

not connected to any other check node by an odd number of edges, then the receiver

will not be able to determine the likelihood associated with the variable node no matter

how high the SNR. For a variable node of degree d = 2, the probability of this situation

CHAPTER 4. COHERENT CPFSK 77

+=

=+

+=

Figure 4.7: Bad interleaver designs

occurring in a purely random intelerleaver is bounded by

Pbad ≤(

Nuλ2

1

) ∑dc

d=2

(Nbρd

1

)(d2

)2!(Nc − 2)!

Nc!. (4.41)

When the degree distributions are fixed, Nu and Nb are proportional to Nc. It is not hard

to see that the bound reaches some constant value when the interleaver size Nc keeps

increasing.

Another example is shown in the right side of Fig. 4.7, where two variable nodes of

degree two are linked to two check nodes of degree two in a butterfly structure. When

this occurs, the two check nodes will produce the same output value. While this output

may be used to determine the modulo-2 sum of the bits associated with the two variable

nodes, it will not reveal their individual values. The probability of this situation can be

bounded by

Pbad ≤ 16(

Nuλ2

2

)(Nbρ2

2

)(Nc − 4)!

Nc!

≈ 4(Nuλ2)2(Nbρ2)

2

N4c

. (4.42)

This approximation is a constant that does not depend on the interleaver size. However,

this constant behavior only exists for degree-two variable nodes. It is not hard to verify

that the probability of bad interleaver designs caused by variable nodes with degree

three and above decreases when the interleaver size Nc increases. This implies that

CHAPTER 4. COHERENT CPFSK 78

+=

=+

+=

+=

=

+

+=

Figure 4.8: Counter example of the lower bound on ρ1 in (4.43)

the probability of a bad interleaver can be made arbitrarily low if degree-two variable

nodes are avoided, as suggested in [67]. Otherwise, if degree-two variable nodes are

permitted, the interleaver must be carefully designed to avoid such bad designs. One

way to accomplish this is to systematically associate all the degree-two variable nodes to

degree-one check nodes, similar to the doping method of system I in [73]. However, this

requires a large ρ1, which leads to high SNR convergence threshold.

In our design methodology, degree-two variable nodes are permitted, and ρ1 is set

to a very small value just for the purpose of decoding initialization. The interleaver is

designed by first randomly linking the 2Nuλ2 outputs of the degree-two variable nodes to

distinct check nodes. Afterwards, the edges of the variable nodes of degree higher than

two are placed at random. Since there must be at least 2Nuλ2 check nodes, this requires

2Nuλ2 ≤ Nb which implies that λ2 ≤ 1/(2r). Generally, this constraint is not restrictive

except at very high code rates and was easily satisfied for all the designs presented in

this chapter.

CHAPTER 4. COHERENT CPFSK 79

A guideline given in [72] is that when the check nodes have degrees of either one or

dc, then the doping rate ρ1 should satisfy

ρ1 ≥ dc − 1

dv + dc − 1. (4.43)

This bound is suitable if only one iteration is performed. However, if multiple iterations

are permitted, ρ1 does not have to satisfy this criteria. This is illustrated by the inter-

leaver shown in Fig. 4.8 which serves as a counter-example. In the counter-example, all

variable nodes have degree two and the check nodes may have degree one or two. The

bound (4.43) would imply that at least 1/3 of the check nodes should have degree one

in order to permit successful decoding. However, in Fig. 4.8, there are only two check

nodes of degree one, and therefore ρ1 could be quite small. During each iteration of de-

coding, the information from the degree-one nodes at the top and bottom will propagate

towards the center of the graph. Thus, the system is decodable given a sufficient number

of iterations, despite not adhering to to (4.43).

This also implies that with a large maximum number of iterations allowed, ρ1 could

be made to a very small number. In this chapter, our code designs are all based on the

check nodes with degree distribution ρ1 = 0.001 and ρ2 = 0.999, because a fairly early

waterfall can be achieved using this distribution, while the decoding is still manageable

in 200 iterations.

4.6 Optimization and Simulation Results

Code optimizations were performed for the systems that achieved the information-theoretic

minimum Eb/N0 at spectral efficiency η = 0.5 bps/Hz. Three alphabet sizes were con-

sidered, M = {2, 4, 8}. As optimal choice of h and r for each M is shown in Table 4.1.

In addition, we also considered a suboptimal choice for M = 2 (with h = 2/5) and a

suboptimal choice for M = 4 (with h = 1/3). In each case, the inner-code’s degree dis-

tribution was set to ρ1 = 0.001 and ρ2 = 0.999. A very small number of degree-one check

nodes are needed to allow the iterative decoding process to start properly. Otherwise,

the decoding process always stays at the origin of the EXIT chart [72]. Setting a smaller

CHAPTER 4. COHERENT CPFSK 80

I E(i) ,I A(o)

IA(i),IE(o)Repetition codes

Combined parity-check codes and CPFSK

Eb/N0 = -0.01 dBr = 0.4865M=4, h=1/3

Natural Labeling

0 0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

Figure 4.9: Optimized EXIT curves for M = 4, h = 1/3 with natural labeling.

ρ1 could help the decoder converge in fewer iterations, but the required Eb/N0 tends to

be higher.

Having fixed the inner-code’s degree distribution, the outer-code’s degree distribution

was found using linear programming under the constraint that the maximum outer-code

degree is dv = 20. Gray labeling was used for the M = 8 system, and natural labeling

for the M = 4 system. EXIT curves for the optimized system with parameters M = 4

h = 1/3 and r = 0.4865 are shown in Fig. 4.9. From the EXIT curves, the convergence

threshold is found to be Eb/N0 = −0.01 dB, and the optimized variable node degree

distribution is λ2 = 0.0714, λ3 = 0.4926 and λ10 = 0.3417. The optimized degree

distributions and convergence thresholds are shown for all five systems in Table 4.1. The

table also lists the Eb/N0 required for an actual system to achieve a simulated bit error

probability of 10−5. For each system, Nu = 100, 000 message bits are used and 200

decoding iterations are performed. For all five systems, the simulation results are about

0.4 dB from the capacity limit.

Fig. 4.10 shows the BER curve of the optimized M = 4, h = 1/3 and r = 0.4865

CHAPTER 4. COHERENT CPFSK 81

Capacity

-0.2 -0.1 0 0.1 0.2 0.3

10-410-310-210-1100

Eb /N0

BER

10-5Figure 4.10: BER of optimized M = 4, h = 1/3 system. The system has uncodedbits Nu = 100, 000, and the figure shows the BERs of 50,60,70,80,90,100,150 and 200iterations from top to bottom.

system in Table 4.1. For this system, the number of degree-one and degree-two check

nodes are 411 and 205135, respectively, while the number of degree-two, degree-three,

and degree-ten variable nodes are 14661, 67433, and 17906 respectively. For coherent

detection, the Eb/N0 required to achieve a BER of 10−5 is 0.23 dB, about 0.24 dB from

the estimated threshold and 0.37 dB from the capacity limit.

4.7 Chapter Summary

Before engaging in the design of capacity-approaching codes for CPFSK modulation,

it is useful to compute the AWGN modulation-constrained capacity limits for a given

alphabet size M and modulation index h. This computation is facilitated by treating

CPFSK over AWGN channels as a finite-state Markov channel and then computing the

i.u.d. capacity using the proposed BCJR-like algorithm. In addition to serving as a

CHAPTER 4. COHERENT CPFSK 82

Table 4.1: Capacity and code optimization results for spectral efficiency η = 0.5 bps/Hz.The ith element of the labeling vector is the octal value of the bit pattern labeling symbolqi. The simulation Eb/N0 is the value for which a system with Nu = 100, 000 messagebits and 200 decoder iterations reaches a simulated BER of 10−5.

M 2 4 8h 2

535

13

25

14

r 0.5535 0.6428 0.4865 0.5410 0.4458Capacity(Eb/N0) 0.02dB −0.1dB −0.14dB −0.31dB −0.4dB

Labeling Natural Natural Natural Natural Gray[0,1] [0,1] [0,1,2,3] [0,1,2,3] [0,1,3,2,6,7,5,4]

λ2 = 0.1752 λ2 = 0.3 λ2 = 0.0714 λ2 = 0.2056 λ3 = 0.4947Variable node λ3 = 0.4315 λ3 = 0.3461 λ3 = 0.4926 λ3 = 0.3937 λ4 = 0.0577

distribution {λd} λ8 = 0.1369 λ6 = 0.2435 λ10 = 0.4360 λ9 = 0.0152 λ10 = 0.3417λ9 = 0.2564 λ7 = 0.1104 λ11 = 0.3855 λ11 = 0.1059

Check node ρ1 = 0.001 ρ1 = 0.001 ρ1 = 0.001 ρ1 = 0.001 ρ1 = 0.001distribution {ρd} ρ2 = 0.999 ρ2 = 0.999 ρ2 = 0.999 ρ2 = 0.999 ρ2 = 0.999Threshold(Eb/N0) 0.14dB 0.03dB −0.01dB −0.22dB −0.19dB

Simulation(Eb/N0) 0.35dB 0.31dB 0.23dB 0.06dB 0.01dB

benchmark to measure the effectiveness of actual coded systems, the capacity analysis

provides useful insight into the optimal selection of the parameters M and h. This is

especially important when bandwidth is constrained, in which case there will be a lower

limit on the allowable code rate r which depends on the choice of M and h. Usually,

complexity concerns requires that h = P/Q be rational with a small denominator Q.

Thus for any particular spectral efficiency, alphabet size M , and complexity limit, there

will be an optimal combination of r and h that can be found through capacity analysis.

Once the system parameters and corresponding modulation-constrained capacity are

determined, the next step in the system design is to optimize the code. This is done

with the aid of the EXIT chart. First the EXIT curve for the inner code is drawn for a

particular target-channel SNR, where the inner code is the combination of single-parity-

check codes and CPFSK modulation. The outer-code degree distribution is determined

through linear programming with the objective of minimizing the area between the inner-

code and outer-code EXIT curves. The optimal design is the one that minimizes this area

at the lowest channel SNR without allowing the two curves to cross. Results show that

this threshold SNR is between 0.1 and 0.2 dB from the value predicted by corresponding

CHAPTER 4. COHERENT CPFSK 83

capacity limit. Certain care must be taken to avoid bad interleavers and symbol labelings.

Simulation results using the actual coded system achieve a BER of 10−5 at only about

0.4 dB from the capacity with a message length of 105 and 200 decoder iterations. While

the system performed remarkably close to capacity, we made no particular attempt to

optimize the inner code. The whole process could be repeated for different inner code

designs, which could result in a design that is even closer to the corresponding capacity

limits.

Chapter 5

Noncoherent CPFSK

One of the benefits of using CPFSK is that it can be noncoherently detected. Despite

having a capacity that is lower than coherent detection, there are significant complexity

benefits to use noncoherent detection. As discussed in the previous chapter, for coherent

detection to be feasible, h must be a rational number, i.e. h = P/Q, where P and Q are

relatively prime positive integers. The number of phase states in the trellis is equal to Q

when the tilted phase representation of [78] is used. When Q is large, the complexity of

the coherent detector can be very high. However for the noncoherent detector, complexity

is independent of h, and thus it can be any real number. This allows a more flexible design,

since values of h that might be convenient for coherent detection do not necessarily achieve

capacity. Another benefit of the noncoherent detector is that it does not need to know

the initial phase or even the set Φ to which it belongs. Furthermore, the coherent receiver

requires Φ to be time invariant, while it may in fact drift due to offsets in the oscillators.

In this chapter, we first study the capacity of symbol-by-symbol noncoherent detec-

tion of CPFSK in Section 5.1. Then the capacity under spectral efficiency constraint is

analyzed in Section 5.2. This type of detector does not assume the phase stability over

continuous symbols. Therefore, we study the symbol-by-symbol noncoherent detector in

both AWGN and ergodic fading channels.

Provided the channel is AWGN, the multi-symbol block noncoherent detector can be

utilized to exploit additional gain from the phase continuity within the block. This was

originally proposed by Simon and Divsalar in [79]. While the prior work has focused

84

CHAPTER 5. NONCOHERENT CPFSK 85

on its bit error rate (BER) analysis, we evaluate its capacity and note that the capacity

approaches that of coherent detection as the block size increases. This result is analogous

to the BER analysis of [79], which shows that the BER of multi-symbol block noncoherent

detection approaches that of coherent for large block sizes. This is also consistent with

the asymptotic capacity analysis of generic noncoherent channels in [80] and [81].

In Section 5.3, the multi-symbol block noncoherent detector and its capacity are

studied. Then in Section 5.4, capacity approaching code is designed to approach this

multi-symbol block noncoherent capacity. The method is very similar to the one used for

code design for coherent detector. When designing codes for coherent CPFSK, we used

the IRA code structure with the CPFSK modulator assuming the role of the accumulator.

In Section 5.4, we also use the IRA code structure. However, an accumulator must

be explicitly placed between the parity check codes and CPFSK modulator, since the

noncoherent detector does not fully exploit the recursive nature of the phase.

5.1 Capacity of Symbol-by-symbol Noncoherent De-

tection

Consider a discrete time signal model similar to (4.4) in Chapter 4,

y = aejθ√ESx + n, (5.1)

where y, x and n are all M×1 vectors, representing the channel observation, transmitted

signal and noise respectively. Here, the fading coefficient aejθ is included, since we con-

sider ergodic fading channel in addition to AWGN for this symbol-by-symbol noncoherent

receiver. θ represents the unknown phase to the noncoherent detector.

From the derivations of coherent detector in Chapter 4, it is not hard to find

p(y|x = kν , a, θ) =1

πMNM0 det(K)

exp

(−yHK−1y + a2ES − 2a

√ESRe(e−jθyν)

N0

)

(5.2)

CHAPTER 5. NONCOHERENT CPFSK 86

Marginalizing p(y|x = kν , a, θ) over θ yields,

p(y|x = kν , a) =1

∫ 2π

0

p(y|x = ki, a, θ)dθ

=1

πMNM0 det(K)

exp− 1

N0(yHK−1y+a2ES)

I0

(2a√ES

N0

|yν |)

. (5.3)

If the fading amplitude information as well as√ES/N0 is known to the receiver, the

demodulator works exactly the same way as the orthogonal one in (2.13).

Es/No(dB)

Cap

acit

y (

bit

s)

-10 -5 0 5 10 15 20 250

0.2

0.4

0.6

0.8

1

h=1

h=0.8

h=0.6

h=0.4

h=0.2

(a) Capacity versus ES/N0

Coding Rate

min

Eb/N

o (

dB

)

0 0.2 0.4 0.6 0.8 15

10

15

20

25

h=0.2

h=0.4

h=0.6

h=0.8

h=1

(b) minimum Eb/N0 versus coding rate

Figure 5.1: Capacity of binary CPFSK

Using the Bessel metric in (5.3), we can evaluate the channel capacity through Monte

Carlo simulation, just like the orthogonal case in Chapter 2. Fig. 5.1(a) shows the binary

FSK capacity of modulation index h = 0.2, 0.4, 0.6, 0.8, 1 in AWGN channel. Fig. 5.1(b)

plots the same channel capacity in the form of minimun Eb/N0 required versus the coding

rate R, where

R = C(R log2 MEb/N0). (5.4)

From the two figures, we observe that the h = 0.8 case has very close capacity to or-

thogonal FSK h = 1, and the h = 0.6 case is only about 1dB away. If h decreases to 0.4

or even smaller, the loss is over 3dB. Also, we can see that for each choice of h, there

CHAPTER 5. NONCOHERENT CPFSK 87

is a particular value of r that minimizes the required Eb/N0. This behavior is called the

noncoherent combining penalty [39]. Unlike coherent systems, going to a lower r does

not necessarily improve energy efficiency. Furthermore, the results shown in Figs. 5.1(a)

and 5.1(b) are for the M = 2 case and would have to be repeated for all other M . As M

increases, the minimum required Eb/N0 decreases just like the orthogonal case in Chapter

2.

5.2 Capacity under Spectral Efficiency Constraint

In this section, we analyze the capacity of symbol-by-symbol noncoherent CPFSK under

spectral efficiency constraints, similar to the analysis of coherent case in Section 4.3.

To determine the fundamental tradeoff between η and Eb/N0, one must determine the

minimum value of Eb/N0 for a particular desired spectral efficiency η. The first step is to

determine the range of r that may be considered under the spectral efficiency constraint.

More specifically, for each choice of η, h, and M , there will be a threshold r′ on code rate

r′ = ηB(M, h)

log2 M(5.5)

such that r ∈ [r′, 1]. Rates r < r′ cannot be considered because for the particular h

and M , the spectral efficiency will be lower than η. This step is the same as the one for

coherent capacity in Section 4.3.

The second step is to determine the optimal r ∈ [r′, 1] where the minimum Eb/N0 can

be achieved. This is different from the coherent case. Under tight bandwidth constraints,

the optimal r is typically equal to its minimum value ηB(M, h), but in looser bandwidth

constraints the optimal r might be higher due to the noncoherent combining penalty.

For example, when M = 2 and η = 1/2 bps/Hz, the minimum values of r are

0.39, 0.55, 0.64, and 0.96 for h = 0.2, 0.4, 0.6, and 0.8, respectively. Since B(M = 2, h =

1) = 2.1309 > 1/η, no code of rate r ≤ 1 can be used at this η when h = 1 and

thus orthogonal modulation cannot be considered. Next, the minimum Eb/N0 is found

by inspecting the curve over the range of possible rates r ∈ [ηB(M,h), log2 M ]. For a

given η and M , this procedure is repeated for each value of h over a range (0, h′), where

CHAPTER 5. NONCOHERENT CPFSK 88

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 15

10

15

20

25

h

Min

imum

Eb/

No

in d

B

η = 0

η=1/3

η = 1/2

η = 1

Figure 5.2: Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarilylow error rate versus modulation index h in AWGN with M = 2 for several spectralefficiencies η = {0, 1/3, 1/2, 1}. For fixed h, the minimum Eb/N0 increases with η.

h′ = maxh≤1 : B(M,h) ≤ (log2 M)/η is a maximum modulation index. At low spectral

efficiency, h′ = 1 but at high spectral efficiency, values of h > h′ cannot be used because

the bandwidth requirement cannot be met for any code rate r ≤ log2 M . The minimum

Eb/N0 for each possible h can then be plotted as a function of h. An example is shown

in Fig. 5.2 for M = 2 in AWGN and several values of η (the η = 0 case corresponds to

having no bandwidth constraint).

As can be seen in Fig. 5.2, for each value of η there is an optimal choice of h

that minimizes Eb/N0. For the unlimited bandwidth case (η = 0), the optimal h = 1,

but as η increases, the optimal value of h decreases. The combination of η and the

Eb/N0 minimized over h is the constrained channel capacity for that value of M , channel

(AWGN), and noncoherent detection.

A plot of minimum Eb/N0 versus h for all M ≤ 64 and η = {0, 1/2} is shown in Fig.

5.3 for the AWGN channel and in Fig. 5.4 for the Rayleigh fading channel. For each of

the six values of M and two channel types, capacity curves were generated for values of

h ranging from h = 0.01 to h = 1 in increments of 0.01. Thus a total of 1, 200 capacity

CHAPTER 5. NONCOHERENT CPFSK 89

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

5

10

15

20

25

30

h

Min

imum

Eb/

No

in d

B

η = 1/2 (solid lines)η = 0 (dashed lines)

M=2

4

8

16

32

64

Figure 5.3: Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarilylow error rate versus modulation index h in AWGN for several modulation orders M ={2, 4, 8, 16, 32, 64} and spectral efficiencies η = {0, 1/2}.

CHAPTER 5. NONCOHERENT CPFSK 90

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

5

10

15

20

25

30

h

Min

imum

Eb/

No

in d

B

η = 1/2 (solid lines)

η = 0 (dashed lines)M=2

4

8

16

32

64

Figure 5.4: Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarilylow error rate versus modulation index h in Rayleigh fading for several modulation ordersM = {2, 4, 8, 16, 32, 64} and spectral efficiencies η = {0, 1/2}.

CHAPTER 5. NONCOHERENT CPFSK 91

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

2

4

6

8

10

12

14

16

18

η in bps/Hz

Min

imum

Eb/

No

in d

B

M=64

M=2

M=4

M=8

M=16

M=32

Figure 5.5: Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarilylow error rate versus spectral efficiency η in AWGN for several modulation orders M ={2, 4, 8, 16, 32, 64}. For fixed η the minimum Eb/N0 decreases with increasing M . Thevalues at η = 0 correspond to the orthogonal FSK capacity.

CHAPTER 5. NONCOHERENT CPFSK 92

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

2

4

6

8

10

12

14

16

18

20

22

η in bps/Hz

Min

imum

Eb/

No

in d

B

M=64

M=2

M=4

M=8M=16

M=32

Figure 5.6: Minimum Eb/N0 required for noncoherent CPFSK to achieve an arbitrarilylow error rate versus spectral efficiency η in Rayleigh fading for several modulation ordersM = {2, 4, 8, 16, 32, 64}. For fixed η the minimum Eb/N0 decreases with increasing M .The values at η = 0 correspond to the orthogonal FSK capacity.

CHAPTER 5. NONCOHERENT CPFSK 93

curves were generated and each curve was created using at least 2 million simulated

symbols per SNR point in the range of interest. Altogether, over 1 trillion symbols

were simulated, and it is estimated that this task would have taken about one year to

complete on a single PC computer. To speed the run time, simulations were executed on

a virtual private grid computer powered by the idle capacity of 30 workstations located

in the teaching laboratories at the Lane Department of Computer Science and Electrical

Engineering at West Virginia University.1. The entire simulation scenario took just two

weeks to complete on the grid computer.

From these curves, it can be seen that the minimum h decreases with increasing M .

Interestingly, the minimum Eb/N0 decreases with increasing M even when the bandwidth

is constrained. By finding the minimum value of Eb/N0 with respect to h for each M over

a wide range of η, one can finally determine the capacity of CPFSK. Capacity can now

be plotted in terms of spectral efficiency η versus the corresponding minimum Eb/N0,

as shown for several M and η ≤ 1 in Fig. 5.5 for AWGN and Fig. 5.6 for Rayleigh

fading. Note that the minimum Eb/N0 in dB increases roughly linearly with η. The

minimum Eb/N0 decreases with increasing M . The minimum Eb/N0 at η = 0 is achieved

with h = 1 for each M , and therefore these values are identical to the ones for orthogonal

FSK modulation given in Chapter 2. While there is a benefit to increasing M at very low

η, these benefits begin to disappear as η is increased. For both the AWGN and Rayleigh

fading channels, there is no benefit to using M > 16 for spectral efficiencies η > 0.3 since

the curves for M = {16, 32, 64} merge at these higher spectral efficiencies. Furthermore,

in AWGN the curves for M = {8, 16, 32, 64} begin to merge as η > 0.5, indicating that

there is no benefit to using M > 8 in AWGN when η > 0.5.

5.3 Multi-symbol Noncoherent Detection

Consider an N -symbol block noncoherent detector [79]. Let the block of modulated

symbols be xN−10 and the block of received symbols be yN−1

0 . The block noncoherent

detector computes the probability p(yN−10 |xN−1

0 ) for each of the MN possible xN−10 . If

1Job scheduling was performed online via the Global Grid Exchange (g2ex.com) which runs theFrontier Grid Platform developed by Parabon Computation (parabon.com).

CHAPTER 5. NONCOHERENT CPFSK 94

the initial phase φ0 at the start of the block is given, the conditional probability can be

represented by the chain rule as

p(yN−10 |xN−1

0 , φ0) =N−1∏i=0

p(yi|yi−10 ,xN−1

0 , φ0)

=N−1∏i=0

p(yi|xi, φi), (5.6)

where the second equality comes directly from the properties of Markov chains, and φi

is recursively updated using (4.2).

From (5.6) and (4.11), if the input to the modulator is q = [q0, ..., qN−1], then the

conditional pdf is

p(yN−10 |q, φ0) ∝ exp

(2

√Es

N0

Re{e−jφ0µ(q)

})(5.7)

where

µ(q) =N−1∑i=0

yqie−2hπ

∑i−1k=0 qk . (5.8)

The noncoherent detector assumes φ0 has a uniform distribution over [0, 2π). Marginal-

izing p(yN−10 |q, φ0) with respect to φ0 yields

p(yN−10 |q) ∝ I0

(2

√Es

N0

|µ(q)|)

, (5.9)

where I0(·) is the 0th order modified Bessel function of the first kind.

The capacity can then be calculated from

C(n)N = log2 M +

1

NE

log2

I0

(2√Es|µ(q)|

N0

)

∑q′∈Q

I0

(2√Es|µ(q′)|

N0

)

, (5.10)

where Q is the set of MN possible values of q and the expectation is taken over the

CHAPTER 5. NONCOHERENT CPFSK 95

-20 -15 -10 -5 0 5 10 15 200

0.2

0.4

0.6

0.8

1

Es/No

capa

city

CoherentNoncoherent N = 12Noncoherent N = 4Noncoherent N = 2Noncoherent N = 1

CoherentNoncoherent

symbol by symbolMSKM = 2, h = 1/2

Figure 5.7: Capacity of MSK using multi-symbol noncoherent and coherent detection.

ensemble of all possible transmitted q and received yN−10 . As in the coherent case, the

above expectation can be found using Monte Carlo integration.

As an example, Fig. 5.7 shows the capacity of multi-symbol noncoherent detection

of MSK for several different block sizes. The rightmost curve (N = 1) is the capacity

of symbol-by-symbol noncoherent detection, while the leftmost curve is the coherent ca-

pacity. By increasing N from 1 to 4, the gain at code-rate 0.5 is about 5 dB, and it is

only 3.5 dB worse than the coherent detection. When the block size N is larger, this

capacity of noncoherent detection gets closer to that of coherent detection. When N in-

creases to infinity, we conjecture that the noncoherent capacity converges to the coherent

capacity. This is consistent with the asymptotic capacity analysis [80, 81] and the BER

performance in [79]. More generally, the capacity of multi-symbol noncoherent detection

can be found for any arbitrary value of h, M , and N using the same methodology used

to generate the MSK curves shown in Fig. 5.7.

5.4 Code Design

In this section, we design channel codes to approach the noncoherent CPFSK capacity.

The method is very similar to the one used for code design for coherent detector. We still

CHAPTER 5. NONCOHERENT CPFSK 96

+=

= + Parallel/S

erial

D

+ CPFSK

Figure 5.8: Nonsystematic IRA coding structure. “=” corresponds to variable nodes and“+” corresponds to single parity-check nodes.

use the IRA code structure, but the difference is that the accumulator is placed between

the parity check codes and CPFSK modulator, as is shown in Fig. 5.8. The reason is

that CPFSK detector loses its recursive structure by doing noncoherent detection.

Fig. 5.9 shows the EXIT chart of MSK at Eb/N0 = 3.94dB. The outer code is designed

for coherent MSK at coding rate 0.5 [20]. Four different inner code EXIT curves are also

shown, corresponding to N = 1, 2, 4, 12 multi-symbol noncoherent detected MSK with

check node distribution ρ1 = 0.001, ρ2 = 0.999. Here, no accumulator is placed between

the parity-check codes and the MSK modulator. One can see that when N is larger, the

inner SISO can produce more extrinsic information output. However, when N is finite,

the inner EXIT curve always cross over the right side of the EXIT chart at some intercept

between 0 and 1. No matter how the outer code is designed, the EXIT curves of inner

and outer codes intersect at some point to the lower left of (1, 1). This predicts that

the decoding trajectory gets stuck at this point, and can not reach (1, 1), which usually

results in a high error floor.

By introducing the accumulator between parity check codes and CPFSK modulator,

the EXIT curve of noncoherent detector can gradually reach (1, 1). This is desirable

in the outer code optimization so that two EXIT curves can possibly form a narrow

tunnel between (0, 0) and (1, 1), leading to the successful decoding. Fig. 5.10 shows the

inner EXIT curve of N = 4 noncoherently detected MSK at Eb/N0 = 3.94dB, and the

matched outer code EXIT curve at coding rate 0.5. The optimization method is same as

the one in Section 4.5. The optimized threshold is about 0.24dB away from the N = 4

noncoherent capacity. The actual simulation of a 100, 000 uncoded bit frame reaches

CHAPTER 5. NONCOHERENT CPFSK 97

0 0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1Repetition codeCoherent design

Combined SPC, CPFSK noncoherent detection

Eb/N0 = 3.94 dBr = 0.5

MSK(M=2, h=½)

I E(i) ,I A(o)

IA(i),IE(o)N=1

N=2

N=4

N=12

Figure 5.9: EXIT curves of inner codes without accumulator

Table 5.1: Optimized codes for MSK at rate r = 0.5. For each of the coherent and multi-symbol noncoherent (N = 4) detectors, the degree distributions, capacity, and thresholdsare listed.

Coherent Noncoherent (N = 4)Variable λ3 = 0.570 λ3 = 0.414

Node λ7 = 0.365 λ5 = 0.439λ8 = 0.065 λ6 = 0.147

Check ρ1 = 0.001 ρ1 = 0.001Node ρ2 = 0.999 ρ2 = 0.999

Capacity(Eb/N0) 0.2 dB 3.7 dBThreshold(Eb/N0) 0.48 dB 3.94 dB

CHAPTER 5. NONCOHERENT CPFSK 98

0 0.2 0.4 0.6 0.8 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

IA(i),IE(o)

I E(i) ,I A(o)Repetition

code

Combined SPC, accumulator and

CPFSK N=4 noncoherent detection

Eb/N0 = 3.94 dBr = 0.5

MSK(M=2, h=½)

Figure 5.10: EXIT curve-matching result of N = 4 noncoherent detection of MSK

0 1 2 3 4 5

10

-410

-310

-210

-110

0

Eb/No

BER

CoherentNoncoherent N = 4

Coherent Capacity

Noncoherent N=4

Capacity

Figure 5.11: BER of MSK with rate r = 0.5 coding designed using EXIT curve-fitting.

CHAPTER 5. NONCOHERENT CPFSK 99

BER 10−5 at Eb/N0 = 4.03 dB. The capacity and optimization results are listed in Table

5.1. Also shown in the table is the capacity and optimization results of coherent MSK for

comparison. For coherent detection, the Eb/N0 required to achieve BER 10−5 is 0.63 dB,

about 0.15 dB away from the estimated threshold and 0.43 dB away from the capacity.

The BER curves are shown in Fig. 5.11.

5.5 Chapter Summary

Noncoherent demodulation is an attractive alternative to coherent demodulation. Unlike

the coherent case, the complexity of the noncoherent detector does not depend on h, which

may be any real number. This provides more design flexibility, especially in narrowband

systems that tend to require small values of h that would result in very complex coherent

detectors. Furthermore, noncoherent detection does not require knowledge of the set of

phases Φ or the initial phase, and the set of phases may evolve due to, for instance,

oscillator offsets or Doppler.

The main drawback of symbol-by-symbol noncoherent CPFSK is a very large penalty

in energy efficiency. For example, the symbol-by-symbol noncoherent capacity of MSK

at code rate r = 0.5 is 8.5 dB worse than the coherent capacity. Much of this loss

can be recovered by using multi-symbol noncoherent block detection. For instance by

performing detection over a block as small as N = 4, 5 dB of the loss relative to coherent

reception can be recovered. As in the coherent case, the capacity with multi-symbol

noncoherent block detection can be approached by using an IRA code designed with a

curve-fitting technique. However, since noncoherent demodulation destroys the memory

in the modulation, a differential precoder is required.

Chapter 6

Channel Estimation of Noncoherent

FSK

A nice property of FSK is that it can be detected noncoherently, when the phase changes

too quickly to be tracked. However, the demodulator in (2.13) or (5.3) requires knowledge

of the noise variance and the received signal amplitude. In practice, this information is not

known a priori and must be estimated at the receiver. Even for the demodulator without

CSI in (2.15) or (5.3), the SNR information and fading statistics are needed. Recently,

[82] [71] proposed a parametric free metric instead of the Bessel metric depending on

2a√ES/N0. The idea is to take the Taylor series expansion of I0(α) around α = 0.

After some manipulations, the demodulator produces the soft metric which is just the

normalized square of the channel observation. This metric has performance close to the

Bessel metric in AWGN channel. However, it induces a loss in Rayleigh fading channel

and other type of random interference channels.

In an iterative receiver, a reasonable approach is to feed back extrinsic information

from the decoder back to a channel estimator [83]. For a good overview of iterative

decoding and channel estimation, see [84] and the references therein.

It is assumed that the channel experiences block fading. Blocks of N consecutive

FSK symbols are attenuated by the same channel gain (though they could experience

different phase shifts) and are corrupted by noise that is stationary for the duration of

the block. Aside from this block fading condition, the estimator makes no assumptions

100

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 101

regarding the statistics of the channel. Both the received fading amplitude and the noise

spectral density are estimated because either one or both could change from block-to-

block due to jamming, interference, or other environmental conditions. The estimator

itself is derived using the expectation maximization (EM) algorithm [85], which iteratively

finds the maximum likelihood (ML) estimate even though an explicit form is not readily

achievable when extrinsic information is fed back to the estimator from the decoder.

EM-based estimator is derived in Section 6.1. Complexity reduction techniques are

discussed in Section 6.2 and simulation results given in 6.3. Section 6.4 discusses the

algorithmic complexity, and a summary of this chapter is given in Section 6.5.

6.1 Channel Estimator

6.1.1 Iterative Decoding, Demodulation and Channel Estima-

tion

The channel estimator uses Y and a priori information fed back to it from the decoder

to produce the ratio γ` = B`/A` of channel estimates for the `th block, where A and B

are defined in Section 2.1.2. The demapper and decoder exchange extrinsic information

in a turbo-processing loop, just like the perfect CSI case in Chapter 2. The demapper

output is a m by Nq matrix Z whose (k, i)th element is

zk,i = logp(bk,i = 1|yi, γbi/Nc,vi\vk,i)

p(bk,i = 0|yi, γbi/Nc,vi\vk,i)(6.1)

= log

q∈Q(1)k

I0

(γbi/Nc|yq,i|

) m−1∏j=0j 6=k

exp (bj(q)vj,i)

q∈Q(0)k

I0

(γbi/Nc|yq,i|

) m−1∏j=0j 6=k

exp (bj(q)vj,i)

(6.2)

where vi is the ith column of V, a m by Nq matrix output by the SISO decoder. The

conditioning in vi\vk,i implies that the extrinsic information for bit bk,i is produced

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 102

without using vk,i. The (k, i)th element of V is

vk,i = logp(bk,i = 1|Z\zk,i)

p(bk,i = 0|Z\zk,i). (6.3)

which is derived for SISO decoders in [35].

6.1.2 EM Channel Estimator

The channel estimator works on a block by block base. Since the block estimation is

independent, we temporarily drop the block index `. Following the conditional probability

in (5.3), we have

p(yi|qi = ν, a, ES, N0)

=1

πMNM0 |K|

exp

(−yH

i K−1yi + a2ES

N0

)I0

(2a√ES|yν,i|

N0

), (6.4)

The log-likelihood function with respect to ES, N0 and d can be represented as

L = log [p(Y|A,B,q)]

= −MN ln A− C

A− NB2

4A+

N−1∑i=0

ln I0

(B |yqii|

A

), (6.5)

where A = N0, B = 2a√ES and C =

∑i y

Hi K−1yi. C can be viewed as the decoupled

energy, and for the orthogonal case h = 1, C =∑

k,i |yki|2.The representation of (6.5) includes the unknown parameter q. This information is

never known to the receiver before the perfect decoding. However the extrinsic informa-

tion V from the decoder can be used as the priori of q. In order to find the ML solution,

we need to sum over all possibilities of q, by using the extrinsic information feedback

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 103

from the decoder. This results in

L = logN−1∏i=0

p(yi|A,B)

=N−1∑i=0

[log

M−1∑

k=0

p(yi|A,B, qi = k)p(qi = k)

]. (6.6)

Even though the expression can be broken down to the product of independent symbols,

the argument of the log function still contains the summation of M terms, and therefore

a direct solution is too complex to be practical.

Although a direct maximum-likelihood estimation is impractical, the EM algorithm

is an appropriate iterative approach to estimating {A, B} [85]. Let {Y,q} denote the

complete data set, which using (6.4) has log-likelihood

L(A,B) = log p(Y,q|A,B)

= log p(Y|A,B,q) + log p(q)

∼ −MN log A− C

A− NB2

4A

+N−1∑i=0

log I0

(B |yqi,i|

A

), (6.7)

where ∼ is used to indicate that the quantities are equal up to irrelevant quantities that

do not affect the maximization, namely the terms −NM log π and log p(q).

Let ξ denote the EM iteration and A(ξ), B(ξ) denote the estimates of A,B after the

ξth iteration. Iteration ξ starts with the E-step

Q(A,B) = Eq|Y,A(ξ−1),B(ξ−1) [L(A,B)] (6.8)

where the expectation is taken with respect to the unknown symbols d conditioned on Y

and the estimates A(ξ−1), B(ξ−1) from the last EM iteration. Substituting the likelihood

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 104

function (6.7) into (6.8) yields

Q(A,B) = −MN log A− C

A− NB2

4A+

N−1∑i=0

M−1∑

k=0

p(ξ−1)k,i log I0

(B |yk,i|

A

)(6.9)

where

p(ξ−1)k,i = p(qi = k|yi, A

(ξ−1), B(ξ−1))

=p(yi|qi = k, A(ξ−1), B(ξ−1))p(qi = k)

p(yi|A(ξ−1), B(ξ−1)). (6.10)

The last step uses the fact that q is independent of A and B. Applying (2.13), we obtain

p(ξ−1)k,i = α

(ξ−1)i I0

(B(ξ−1)|yk,i|

A(ξ−1)

)p(qi = k) (6.11)

where α(ξ−1)i is the normalization factor forcing

∑M−1k=0 p

(ξ−1)k,i = 1, i.e.

α(ξ−1)i =

1∑M−1

k=0 I0

(B(ξ−1)|yk,i|

A(ξ−1)

)p(qi = k)

(6.12)

and p(qi = k) is found from the a priori input vi using [86]

p(qi|vi) =

µ−1∏j=0

evj,ibj(qi)

1 + evj,i. (6.13)

The M-step is

A(ξ), B(ξ) = arg maxA,B

Q(A,B) (6.14)

which, can be found by setting the derivatives of the function Q(A,B) with respect to A

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 105

and B to zero. The solution to the corresponding system of equations is

A(ξ) =1

MN

(C − N(B(ξ))2

4

)(6.15)

B(ξ) =2

N

N−1∑i=0

M−1∑

k=0

p(ξ−1)k,i |yk,i|F

(4MNB(ξ)|yk,i|4C −N(B(ξ))2

)(6.16)

where F (x) = I1(x)/I0(x). While a closed form solution to (6.16) is difficult to obtain,

it can be found recursively [87].

To select an initial estimate for B prior to the first BICM-ID iteration, consider that in

the absence of noise, yk,i = a√ESδk,qi

ejθi , which has a magnitude of either |yk,i| = a√ES

(when k = qi) or |yk,i| = 0 (otherwise). Thus, an estimate for a√ES = B/2 can be

achieved by taking the maximum |yk,i| over any column of Y. To account for noise, the

average could be taken across all columns in the block, resulting in

B(0) =2

N

N−1∑i=0

maxk|yk,i| . (6.17)

The initial estimate of A is found from B(0) by evaluating (6.15) for ξ = 0. After the

initial values A(0) and B(0) are calculated, the initial probabilities {p(0)k,i} are calculated

using (6.11) with p(qi = k) = 1/M for all i and k. Next, B(1) is found by recursively

solving (6.16). Once the recursion is complete, A(1) can be directly found from (6.15),

which finalizes the first EM iteration. The second EM iteration then starts by calculating

p(1)k,i using (6.11) with p(qi = k) = 1/M and the newly acquired A(1) and B(1), and the

remaining steps are identical to the first EM iteration. The EM estimator will continue

to iterate until some stopping criterion is reached. In our simulations, we halted the

EM algorithm when the value of the estimate of B changed less than 10%, when the

estimate of B became very close to zero, or when a maximum number of 20 iterations

was reached. After the first BICM-ID iteration, the final value of B(ξ) from the previous

BICM-ID iteration can be used as the initial estimate of B, and the value of p(qi = k)

in (6.11) is found from the decoder output using (6.13).

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 106

6.2 Reduced Complexity Estimation

A major drawback of the proposed EM-based estimator is its complexity. In this section,

two techniques are proposed for reducing the complexity of the algorithm. One involves

a linear approximation to the F (·) function, while the other involves the hard limiting of

pk,i.

6.2.1 Linear Approximation of F (·)During each iteration of the full-complexity EM algorithm, B(ξ) is found by recursively

solving (6.16). For each step in the recursion, the nonlinear function F (x) = I1(x)/I0(x)

must be evaluated for each of the MN entries in the Y matrix, presumably by a table

look-up. The number of required table look-ups can be drastically reduced by performing

a first-order Taylor series expansion of F (x) about the point x = t, resulting in F (x) =

F (t) + F ′(t)(x − t). The expansion point t is the approximate maximum value of the

argument of F (·) in (6.16). Setting |yk,i| ≈ a√ES and C ≈ N(a2ES + MN0), we obtain

t ≈ 2a2ES/N0 = B2/(2A).

The linear approximation of the F (·) function is illustrated in Fig. 6.1. As shown,

F (x) is a monotonically increasing function with respect to x and is concave, approaching

1 when x →∞. Because the curve becomes flat when x is reasonably large, such a linear

approximation is reasonable. Assuming 4C >> N(B(ξ))2 and substituting the linear

expansion of F (·) about the point t = (B(ξ−1))2/(2A(ξ−1)) into (6.16) yields

B(ξ) ≈ [F (t)− tF ′(t)]∑N−1

i=0

∑M−1k=0 p

(ξ−1)k,i |yk,i|

N(

12− M

CF ′(t)

∑N−1i=0

∑M−1k=0 p

(ξ−1)k,i |yk,i|2

)

(6.18)

where F ′(t) = 1− F (t)t− F 2(t), as implied by equation (8.486) of [88].

With this approximation, (6.16) is replaced with (6.18), and now only a single table

look-up is required per EM iteration, instead of the MN look-ups in (6.16). Due to the

linearization, B(ξ) can be found directly from (6.18) without requiring a recursion, which

greatly simplifies the algorithm. Notice, however, that the expansion point t(q−1) must

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 107

0 1 2 3 4 5 6 7 8 9 100

0.5

1

1.5

x

F(x

)Linear

Approximation

( t , F(t) )

Figure 6.1: F (x) = I1(x)/I0(x) and its linear approximation.

be changed after each EM iteration.

The linear approximation of F (x) is tight when the expansion point is sufficiently large

and the argument of F (·) in the original EM equation (6.16) is close to the expansion

point. Since the expansion point is proportional to the estimated SNR, the approximation

gets worse with decreasing SNR. Because of the concavity of the F (·) function, the

approximation will overestimate its value, leading to an overestimation of B. However,

overestimating B is better than underestimating it, which agrees with observations made

in [89] that the SNR can be overestimated in an AWGN channel by as much as 3 dB

without significantly harming the performance of a turbo code. Even when the expansion

point is sufficiently high, the approximation will be loose when the arguments in the

linearized F (·) function are small, which occurs for those values of |yk,i| that are small.

Small values of |yk,i| occur more frequently at high SNR, since the M − 1 entries of

each vector yi that do not pertain to the transmitted symbol would all be small. While

the linear approximation is indeed poor for these small values of |yk,i|, this problem is

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 108

mitigated by the fact that every |yk,i| is weighted by its corresponding probability pk,i,

which will also be small. Thus, the contribution of the small values of |yk,i| to the overall

estimate is negligible, and the poor approximation at these values does not seriously

harm overall performance.

6.2.2 Hard Limiting of pk,i

During the ξth iteration of the full-complexity EM algorithm, each pk,i must evaluated

using (6.11). For each symbol, the normalization factor αi must also be calculated to

assure that∑M−1

k=0 pk,i = 1. The normalization factor can be avoided by setting pk,i = 1

for one particular value of k, denoted k0, and setting pk,i = 0 for all k 6= k0. The index

k0 should be the value of k that maximizes (6.11). Taking the logarithm of (6.11), which

does not change the maximization, and using (6.13) for p(qi = k) results in

k0 = arg maxk

log

[I0

(B(ξ−1)|yk,i|

A(ξ−1)

)]+

µ−1∑j=0

vj,ibj(k).

(6.19)

In addition to eliminating the need for computing the normalization factor αi, this

approximation has the additional benefit of eliminating the exponential functions in

(6.13). Complexity is further reduced when B is calculated with either (6.16) or (6.18)

because those terms for which pk,i = 0 do not need to be considered, and therefore the

summations over k are eliminated. Another benefit of this method is that it provides

a natural stopping criterion for the EM algorithm, which should halt once the pk,i’s no

longer change from one iteration to the next.

While (6.19) is a very coarse approximation to (6.11) in the normal EM algorithm,

it still uses both the decoder’s a priori information as well as the channel likelihood

based on the current estimates. This approximation tends to make (6.16) overestimate

the value of B, but the performance loss due to this approximation is small, as will be

demonstrated in the next section.

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 109

6.3 Simulation Results

To illustrate the performance of the proposed estimators, a set of simulations were run.

Note that all the results shown in this chapter are based on orthogonal FSK systems.

Since the only difference between the estimators in orthogonal and nonorthogonal FSK

systems lie in the energy calculation C, as is mentioned in Section 6.1.2, we only show

the results of coded orthogonal FSK systems in this chapter. In the next chapter, the

estimator is also applied to nonorthogonal CPFSK used in the frequency hopping appli-

cation.

The simulated system uses the turbo code from the cdma2000 specification [15] and

16-FSK modulation. The specific turbo code that was selected is a rate-1/2 code with

Nu = 1530 input bits. As the cdma2000 standard requires 12 coded tail bits, the length

of each code word is actually Nb = 2(1530) + 12 = 3072 bits or Nd = 768 FSK symbols.

The receiver executed up to 20 BICM-ID iterations. A perfect CRC check was assumed

in the simulations, so that the iterations would stop once the data is correctly decoded.

Fig. 6.2 shows the bit error rate (BER) performance of five systems over a Rayleigh

block fading channel with N = 4 symbols per block. The curve with the best performance

corresponds to the case that a√ES and N0 are known by the receiver. While not possible

in practice, this curve serves as a benchmark. The other curves correspond to four

implementations of the proposed estimator. The best performing estimator is the full-

complexity EM-based estimator. The other curves correspond to the reduced complexity

techniques described in Section 6.2. In order from best-to-worst performing, the curves

use the following complexity reduction techniques: (1) Hard limiting of pk,i (EM-H); (2)

Linear approximation of the F (·) function (EM-L); and (3) Both Hard limiting of pk,i

and a linear approximation of F (·) (EM-H/L). For this example, the full-complexity EM

estimator has a 0.55 dB loss relative to the system with known a√ES and N0. The

additional loss due to the complexity reduction techniques is about 0.05 dB for EM-H,

0.1 dB for EM-L, and 0.15 dB for EM-H/L.

Fig. 6.3 shows BER results in Rayleigh block fading for several values of block length

N . For each value of N , two curves are shown. The curve on the left (dashed line) is

for the case that a√ES and N0 are known by the receiver, while the curve on the right

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 110

4.5 5 5.5 6 6.5 7 7.510

−5

10−4

10−3

10−2

10−1

100

Eb/No(dB)

BER

EM−H/L

EM−L

EM−H

EM

Known a2

Es and No

Figure 6.2: BER comparison of the different estimators in block Rayleigh fading with N =4 symbols per block. The system uses 16-FSK modulation and the rate 1/2 cdma2000turbo code (Nu = 1530 input bits). Shown from left to right is performance with:(1) a

√ES and N0 known for each block; (2) The full-complexity EM estimator; (3)Estimator EM-H, which makes hard decisions on pk,i; (4) Estimator EM-L, which usesa linear approximation to the F (·) function; and (5) Estimator EM-H/L, which makeshard decisions on pk,i and uses a linear approximation to F (·).

shows performance of Estimator EM-H/L. As the value of N decreases, performance of

both systems improves due to increasing diversity. However, the gap between the two

curves widens with decreasing N due to increasing estimation error. Results were also

produced for N = 1 (not shown to keep the plot uncluttered), but the performance of

the EM-H/L estimator with N = 1 is about 0.5 dB worse than when N = 4 and nearly

2 dB worse than when a√ES and N0 are known.

To better illuminate the effect of block length on estimator performance, Fig. 6.4

shows simulation results for the same cdma2000 turbo code and 16-FSK in an unfaded,

AWGN channel. While the fading is a constant a = 1, the estimator runs assuming a

block length of N symbols. When N = 4, the performance of the estimator is about 0.3

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 111

5 6 7 8 9 10

N=32

N=16

N=8

N=4

Eb/No(dB)

BER

10−5

10−4

10−3

10−2

10−1

100

Figure 6.3: Influence of the block length N on the BER performance in block Rayleighfading. For each value of N = {4, 8, 16, 32}, two curves are shown. The left curve(dashed line) shows performance when a

√ES and N0 are known for each block; the rightcurve (solid line) shows performance with Estimator EM-H/L. The system uses 16-FSKmodulation and the rate 1/2 cdma2000 turbo code (Nu = 1530 input bits).

dB away from when ES and N0 are known. The performance improves with increasing

N , and when N = 32 it is only 0.03 dB away from the performance with known ES and

N0

6.4 Complexity Comparison

Table 6.1 shows the number of operations required for the four versions of the proposed

estimator that were used to generate the results shown in Fig. 6.2. As all four estimators

use (6.15) to compute A, they differ only in how pk,i and B are computed. Estimator

EM-L benefits from not having to perform a table look-up for each received symbol and

by not requiring a recursion on (6.16). Estimator EM-H benefits from not needing to

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 112

2.6 2.8 3 3.2 3.4 3.6

N=4

N=8

N=16

N=32

known Es and No

10−5

10−4

10−3

10−2

10−1

100

Eb/No(dB)

BER

Figure 6.4: Performance in AWGN as a function of block length N . The performance withknown ES and N0 (dashed lines) is compared against the performance with EstimatorEM-H/L. Modulation is 16-FSK. The code is the rate 1/2 cdma2000 turbo code withNu = 1530.

compute the normalization factor (6.12), by computing (6.13) in the log-domain, and not

needing to sum over k in (6.16). EM-L/H combines the benefits of EM-L and EM-H.

The overall complexity also depends on the average number of EM iterations per

BICM-ID iteration. For the simulation that produced the BER results shown in Fig.

6.2, the average number of full EM iterations (per BICM-ID iteration) was approximately

1.1 for EM-H, 1.4 for both EM and EM-L/H, and 1.5 for EM-L. These values are small

primarily as a consequence of the loose stopping criterion for the EM algorithm (if B

changes less than 10%, it will halt). A tighter stopping criterion (e.g. halting when B

changes less than 1%) will induce more EM iterations (about 3 for the EM estimator), but

will not significantly improve the BER performance. Longer blocks generally required

fewer iterations, on average. The higher value for EM-L suggests that the approximation

for F (·) caused it to converge more slowly.

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 113

Table 6.1: Number of operations required for each type of estimator to execute one EMiteration per block of N symbols. M is the modulation order and R is the number ofrecursions used to solve (6.16).

(a) Operations required to compute pk,i

Algorithm Additions Multiplications Look-Ups

EM N(M − 1) 3NM NMEM-L N(M − 1) 3NM NMEM-H MN MN MN

EM-L/H MN MN MN

(b) Operations required to compute B.Algorithm Additions Multiplications Look-Ups

EM RNM NM + R(2NM + 5) RNMEM-L 2(NM − 1) + 4 2MN + 7 1EM-H RN R(2N + 5) RM

EM-L/H 2(N − 1) + 4 3N + 7 1

In addition to counting operations, another way to assess complexity is to count CPU

cycles in an actual implementation. We did this for the four estimators (implemented in

the C language) during the simulation that produced Fig. 6.2. As expected, the original

EM estimator required the most CPU cycles, and in fact required more than that used

for the turbo decoder. Estimator EM-L had a complexity of about 1/4 that of Estimator

EM, making it only a little more complex than the demapper. Estimator EM-L/H is 1/3

the complexity of Estimator EM-L, making its complexity negligible compared to the

decoder and demapper. Given the slight loss in performance, Estimator EM-L/H is an

attractive solution.

6.5 Chapter Summary

The proposed robust noncoherent system has been shown to withstand the severe chan-

nel conditions of fast fading, unknown fading attenuation, unknown fading statistics, and

unknown noise-power spectral density. The channel-state estimator is based on the Ex-

pectation Maximization algorithm and exploits extrinsic information produced after each

decoding iteration of the turbo code. Each updated channel-state estimate is applied to

CHAPTER 6. CHANNEL ESTIMATION OF NONCOHERENT FSK 114

the next decoder iteration. Simulation results indicate that if the fading coherence time

exceeds four channel symbols, then the performance is close to what could be obtained

with perfect channel-state information. Although the estimator using the exact EM al-

gorithm has a high complexity, the linear approximation of F (·) and the hard limiting of

pk,i can be applied to reduce the complexity with minor loss in BER performance.

Chapter 7

Application of CPFSK to Frequency

Hopping Networks

Spread Spectrum (SS) is a technique involving the transmission of information over a

bandwidth larger than the data rate. This technique has the advantage of resisting

narrowband interference and supporting multiuser access simultaneously on the same

band, known as code division multiple access (CDMA). There are two different types

of SS, direct sequence SS (DSSS) and frequency hopping SS (FHSS). In DSSS, each

user’s signal is multiplied by a spreading sequence, resulting in a larger bandwidth than

the original signal. The DSSS technique is now widely used in many systems, such

as wideband CDMA (WCDMA) [90], CDMA2000 system [15], IEEE 802.11b wireless

local area networks (WLANs) [91] and IEEE 802.15.4 wireless personal area networks

(WPANs) [92], also known as ZigBee. In FHSS, the total band is divided into a number

of frequency channels. Each user transmits its signal through a single frequency channel

at a time, but periodically changes the frequency channel in a pseudorandom fashion.

One popular application of FHSS is the Bluetooth system [93].

In Section 7.1, we introduce frequency hopping (FH) networks by showing a simple

example using capacity approaching Gaussian signaling. From this simple example, we

show that there is a fundamental tradeoff between the number of frequency channels

and the bandwidth per channel. Given a fixed bandwidth, increasing the number of

frequency channels reduces the probability of interference, but leads to lower data rate

115

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 116

due to the smaller bandwidth per channel. Decreasing the number of frequency channels

induces more interference but offers higher data rate. by showing the tradeoff between

the number of frequency channels and and discuss its throughput under multiple access

interference. From Section 7.2, we use noncoherent CPFSK in FH networks, whose

parameters are optimized using the results given in Section 5.2. The performances of

the designed systems under partial band jamming and multiple access interferences are

evaluated in Section 7.3 and Section 7.4, respectively.

7.1 Frequency Hopping Networks

Recently, [94] showed that in wireless ad hoc networks, FHSS is superior to DSSS in terms

of transmission capacity, which reinforced the early work by Pursley and Taipale [95],

who studied SS systems from the perspective of error rate. While FH-CDMA and DS-

CDMA could have identical or close performance in cellular systems assuming perfect

power control, such assumption is impossible in wireless ad hoc networks because of

the random locations of the transmitters and receivers. When the path loss exponent is

greater than 2, which is always true in practice, it is better to avoid interference with

FHSS rather than suppressing the interference with DSSS. Here, the path loss exponent

α means that the transmission power decays at at rate of dα, where d is the distance to

the transmitter. Although the transmission capacity defined in [94] allows the outage

probability to be nonzero, the outage threshold is set to an arbitrary fixed number,

and the rate and the number of frequency channels are not optimized. We consider a

simple FH network, where each user transmits a capacity-approaching Gaussian signal.

The throughput is optimized over the transmission rate and the number of frequency

channels.

In this example, we consider J transmitters and only one receiver. The receiver can

hear its desired transmitter, and the other J−1 transmitters as well. The total spectrum

available to the network occupies a bandwidth of W , and it is equally divided into Q

frequency channels, each with probability 1/Q being selected by a particular transmitter.

Although path loss is not considered in this simple example, each of the J received signals

experience independent Rayleigh fading, i.e. the transmitted symbol is multiplied by a

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 117

fading gain drawn from a complex Gaussian distribution with zero mean and variance

1/2 on both dimensions. The average received signal to noise ratio (SNR) is assumed to

be same for the desired signal and the J − 1 interfering signals.

It is straightforward to see that the probability of each interfering transmitter selecting

the same frequency channel as the desired transmitter is 1/Q. As a result, the probability

of n interfering signals colliding with the desired signal is,

Pc[n] =

(J

n

)(1

Q

)n (1− 1

Q

)J−n

. (7.1)

Assuming each transmitter uses capacity-approaching Gaussian signalling, the outage

probability is defined as

PO , Pr

[W

Qlog2 (1 + SINR) < R

], (7.2)

where SINR is the signal to interference and noise ratio. The left side of the inequality

can be viewed as Gaussian capacity spanning 2W/Q dimensions [7]. Using the theorem

on total probability, the outage probability can be expressed as,

PO =J−1∑n=0

Pr

[W

Qlog2 (1 + SINR) < R

∣∣∣∣ n

]Pc[n]. (7.3)

The SINR with n interfering signals is

SINR =Pa2

0

N0WQ

+∑n

i=1Pa2i

, (7.4)

where P is the power of the transmitter, a0 is the fading amplitude of the desired signal,

and ai’s are those of the interference signals.

When the fading coefficients are independent and identically distributed (i.i.d.) Rayleigh,

the outage probability given n interference signals is shown in Appendix A to be

Pr

[W

Qlog 2 (1 + SINR) < R

∣∣∣∣n

]= 1− exp

[−WN0

QP (2RQ/W − 1)

]2−nQR/W . (7.5)

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 118

Substituting (7.5) and (7.1) back into (7.3), we get

PO = 1− exp

[−WN0

QP (2RQ/W − 1)

](Q− 1 + 2−RQ/W

Q

)J−1

. (7.6)

Thus, the throughput of the desired transmission is

T = R(1− PO), (7.7)

which could be achieved by hybrid automatic repeat request (ARQ) protocol [96]. A

more meaningful metric would be the throughput efficiency T/W . Letting P = REb and

defining the normalized transmission rate r = R/W , the throughput efficiency can be

written as

T

W= r exp

(− N0

QrEb

(2Qr − 1)

)(Q− 1 + 2−Qr

Q

)J−1

. (7.8)

Given J and Eb/N0, the throughput efficiency can be maximized over r and Q. The

optimization step is not given in this section. Instead, we show in Fig. 7.1 the throughput

efficiency at Eb/N0 = 3dB and J = 20 transmitters. The optimal throughput efficiency

is around 0.024 bits/s/Hz, and it is achieved at Q = 14 and r = 0.124 bits/s/Hz.

7.2 CPFSK-FH Networks

Frequency hopping with coded binary orthogonal FSK has been examined in [97]. To

improve the energy efficiency, the modulation alphabet size M can be increased. However,

this comes at the expense of a decrease in the bandwidth efficiency. Given a fixed

bandwidth W , the number of frequency channels is reduced, which makes the system more

vulnerable to both multiple access frequency hopping signals and multitone jamming [33].

Aiming at reducing the bandwidth of each channel without losing much performance, we

consider frequency hopping using the nonorthogonal FSK discussed in Chapter 5. [45]

and [98] analyzed frequency hopping with M-ary PSK, iterative decoding, and channel

estimation. The proposed system with noncoherent, nonorthogonal CPFSK has the

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 119

00.1

0.20.3

0.4

0

10

20

300

0.005

0.01

0.015

0.02

0.025

r (bits/s/Hz)Q

T/W

(bi

ts/s

/Hz)

Figure 7.1: Throughput Efficiency of FH network in Rayleigh fading environment,Eb/N0 = 3dB, J = 20 transmitters

following primary advantages relative to the existing systems with differential detection

or orthogonal modulation.

1. No extra reference symbol and no estimation of the phase offset in each dwell

interval are required.

2. It is not necessary to assume that the phase offset is constant throughout a dwell

interval.

3. The channel estimators are much more accurate and can estimate an arbitrary

number of interference and noise spectral density levels.

4. The compact spectrum during each dwell interval allows more frequency channels

and, hence, enhances performance against multiple-access interference and multi-

tone jamming.

From Fig. 5.3 and 5.4, we can see a gain by increasing the modulation alphabet size

M even when there is a bandwidth limit. However, when M > 8, such gain diminishes,

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 120

but the receiver complexity increases rapidly. Therefore, we limit our choice of M to be

4 and 8.1

For M = 4 in Fig. 5.4, h = 0.46 is the approximate optimal value when BmaxTu = 2,

and the corresponding coding rate is approximately r(o) = 16/27. For M = 8, h = 0.32

is the approximate optimal value when BmaxTu = 2 and the corresponding code rate is

approximately r(o) = 8/15. At the optimal values of h, the plots indicate that the loss

is less than 1.5 dB for the AWGN channel and less than 3 dB for the Rayleigh channel

relative to what could be attained with the same value of M , h = 1 (orthogonal CPFSK),

and an unlimited bandwidth.

7.3 Partial Band Jamming

Simulation experiments were conducted to assess the performance of frequency hopping

systems with 4-ary CPFSK and 8-ary CPFSK under the bandwidth constraint BmaxTu =

2. The approximate optimal values of h and R determined from the bandwidth constraint

and information theory are used. The interfering signal is modelled as partial-band noise

interference that introduces It0/µ additional interference spectral density in an interfered

frequency channel, where µ is the fraction of the hopping band with interference and It0

is the spectral density when µ = 1. Thus, the total interference power is conserved as

µ varies. The simulated system uses the turbo code from the UMTS specification [16]

with 2048 information bits and the specified code rate matching algorithm. The receiver

executes no more than 20 iterations, as an early halting routine stops the iterations once

the data is correctly decoded. The figures display the minimum value of Eb/N0 necessary

to obtain a bit error probability equal to 10−3 versus µ for Rayleigh fading, Rician fading

with factor K = 10dB, and the AWGN channel. A block coincides with a dwell interval,

and the parameter A, previously defined as the noise spectral density N0 in Section 2.1.2,

now represents the spectral density due to the noise and the interference during a dwell

interval. The symbols of a dwell interval undergo the same fading amplitude, and the

1For a given h, M = 4 FSK performs better than M = 2 FSK, while the bandwidths of the twosystems are roughly the same.

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 121

µ

Eb/N

o (

dB

)

Rayleigh

Rician K = 10dB

AWGN

0 0.2 0.4 0.6 0.8 15

10

15

20

25

EM estimation

Perfect CSI

Figure 7.2: Minimum Eb/N0 required for frequency hopping system to achieve BER at10−3 versus fraction of partial band interference µ, Eb/It0 = 10dB, 32 hops per codeword,4-ary CPFSK, h = 0.46, Rayleigh fading, Rician fading K = 10dB, AWGN channel fromtop to bottom. UMTS turbo code is used, with Nu = 2048 information bits and rater(o) = 16/27.

fading amplitudes are independent from block to block, which models the frequency-

selective fading that varies after each hop. The bandwidth is assumed to be sufficiently

small that the fading is flat within each frequency channel.

Fig. 7.2 and 7.3 plot the results for 4-ary CPFSK and 8-ary CPFSK, respectively,

when there are 32 hops per codeword and 64 information bits per hop, and Eb/It0 = 10dB.

For 4-ary CPFSK, there are 3456 code bits in a codeword, 108 code bits per hop, and

54 code symbols per hop. For 8-ary CPFSK, there are 3840 code bits in a codeword,

120 code bits per hop, and 40 code symbols per hop. For 4-ary CPFSK, h = 0.46 and

R = 16/27, whereas for 8-ary CPFSK, h = 0.32 and R = 8/15. Comparison of these

two figures indicates that 8-ary CPFSK has a nearly 2 dB advantage in Eb/N0 relative to

4-ary CPFSK for Rician fading and AWGN, and much more for Rayleigh fading. Both

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 122

µ

Eb

/No (

dB

)

Rayleigh

Rician K = 10dB

AWGN

0 0.2 0.4 0.6 0.8 15

10

15

20

25

EM estimation

Perfect CSI

Figure 7.3: Minimum Eb/N0 required for frequency hopping system to achieve BER at10−3 versus fraction of partial band interference µ, Eb/It0 = 10dB, 32 hops per codeword,8-ary CPFSK, h = 0.32, Rayleigh fading, Rician fading K = 10dB, AWGN channel fromtop to bottom. UMTS turbo code is used, with Nu = 2048 information bits and rater(o) = 8/15.

figures indicate that µ = 1 or interference over the entire hopping band is the worst case

for Rayleigh and Rician fading. For the AWGN channel, a smaller value of µ is worst.

The use of the EM channel estimators is shown to produce a negligible loss relative to

noncoherent detection with perfect CSI.

If the hop rate increases, the increase in the number of independently fading dwell

intervals per codeword implies that more diversity is available in the processing of a

codeword. However, the shortening of the dwell interval makes the channel estimation

less reliable by providing the estimator with fewer samples. Fig. 7.4 and 7.5 show the

results for 4-ary CPFSK and 8-ary CPFSK, respectively, when the hop rate is varied

so that there are 16, 32, or 64 hops per codeword. Independent Rayleigh fading occurs

during each dwell interval, Eb/It0 = 13dB, and the information bit rate is maintained.

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 123

µ

Eb/N

o (

dB

)

16 hops,

8 coded symbols/hop

32 hops,

54 coded symbols/hop

64 hops,

27 coded symbols/hop

0 0.2 0.4 0.6 0.8 110

15

20

25

EM estimation

Perfect CSI

Figure 7.4: Minimum Eb/N0 required for frequency hopping system to achieve BER at10−3 versus fraction of partial band interference µ, Eb/It0 = 13dB, Rayleigh fading, 4-aryCPFSK(M = 4), h = 0.46, 16,32,64 hops per codeword from top to bottom. UMTSturbo code is used, with Nu = 2048 information bits and rate r(o) = 16/27.

For 4-ary CPFSK, there are N = 108, 54, or 27 code symbols per hop. For 8-ary CPFSK,

there are N = 80, 40, or 20 code symbols per hop. For 4-ary CPFSK, h = 0.46 and

R = 16/27, whereas for 8-ary CPFSK, h = 0.32 and R = 8/15. Comparison of these

two figures indicates that for Rician fading and AWGN, 8-ary CPFSK maintains its

nearly 2 dB advantage in Eb/N0 relative to 4-ary CPFSK. Despite the slow decline in the

accuracy of the EM channel estimates, the diversity improvement is sufficient to produce

an improved performance as the hop rate increases.

7.4 Asynchronous Multiple Access Interference

Multiple-access interference may occur when two or more frequency-hopping signals share

the same physical medium or network, but the hopping patterns are not coordinated. A

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 124

µ

Eb/N

o (

dB

)

16 hops,

80 coded symbols/hop

32 hops,

40 coded symbols/hop

64 hops,

20 coded symbols/hop

0 0.2 0.4 0.6 0.8 110

15

20

25

EM estimation

Perfect CSI

Figure 7.5: Minimum Eb/N0 required for frequency hopping system to achieve BER at10−3 versus fraction of partial band interference µ, Eb/It0 = 13dB, Rayleigh fading, 8-aryCPFSK(M = 8), h = 0.32, 16,32,64 hops per codeword from top to bottom. UMTSturbo code is used, with Nu = 2048 information bits and rate r(o) = 8/15.

collision occurs when two or more signals using the same frequency channel are received

simultaneously. Since the probability of a collision in a network is decreased by increasing

the number of frequency channels in the hopset, a spectrally compact modulation is highly

desirable.

Simulation experiments were conducted to compare the effect of the number of users

of a peer-to-peer network on systems with different values of h and modulation type. All

network users have asynchronous, statistically independent, randomly generated hopping

patterns. All users use the same type of modulation, either 4-ary CPFSK or 8-ary

CPFSK. Let Tq denote the random variable representing the relative transition time of

frequency hopping interfering signal m or the start of its new dwell interval relative to

that of the desired signal. The ratio Tq/TS is uniformly distributed over the integers in

[0, N − 1]. For simplicity, it is assumed that the switching time between dwell intervals

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 125

is negligible. Let Q denote the number of frequency channels in the hopset shared by all

users. Since two different carrier frequencies are used by each interfering signal during

the dwell interval of the desired signal, the probability is 1/Q that the interfering signal

collides with the desired signal before Tq. Similarly, the probability is 1/Q that the

interfering signal collides with the desired signal after Tq. Each interfering signal uses a

particular symbol with probability 1/M , where M is the modulation alphabet size and

the number of CPFSK tones. The response of each matched filter to an interference

symbol is given by the same equations used for the desired signal. The soft-decision-

metrics sent to the decoder are generated in the usual manner but are degraded by the

multiple-access interference.

The transmit power of the interference and the desired signals are the same. All the

interference sources are located within the circle whose radius is 4 times the distance of

the desired-signal source. All signals experience a path loss with an attenuation power

law equal to 4 and independent Rayleigh fading. The interfering signals also experience

independent shadowing with a shadow factor equal to 8 dB. The hopping band has

the bandwidth W = 2000/Tu, and the nonorthogonal CPFSK signals have bandwidths

Bmax = 2/Tu. Thus, 1000 frequency channels are available for nonorthogonal CPFSK. For

M = 4 or M = 8, orthogonal CPFSK with h = 1, and unlimited bandwidth, the optimal

code rate is approximately R = 1/4 for the Rayleigh fading channel. However, we assume

R = 1/3 because it is nearly optimal and requires less bandwidth. Orthogonal CPFSK

with M = 4 and R = 1/3 requires a bandwidth Bmax = 6.31/Tu, which implies that 315

frequency channels are available. Orthogonal CPFSK with M = 8 and R = 1/3 requires

a bandwidth B = 8.21/Tu, which implies that 244 frequency channels are available. The

reduced number of frequency channels available for orthogonal CPFSK leads to more

collisions and degraded performance relative to nonorthogonal CPFSK.

Since the amount of multiple-access interference varies during each dwell interval, one

might introduce new interference parameters to be estimated by the channel estimator.

Instead of this very complex procedure, the receiver processes the multiple-access in-

terference in a similar way as partial-band interference, which entails using a block that

coincides with a dwell interval. The parameter A, previously defined as the noise spectral

density N0 in Section 2.1.2, is now interpreted as the equivalent average spectral density

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 126

Users

Eb/N

o (

dB

)

0 10 20 30 40 506

8

10

12

14

16

18

20

22

24

8CPFSK h = 1

4CPFSK h = 1

8CPFSK h = 0.32

4CPFSK h = 0.46

Figure 7.6: Minimum Eb/N0 required for frequency hopping system to achieve BER at10−4 in multiples access interference, Rayleigh fading, 32 hops per codeword. UMTSturbo code is used, with Nu = 2048 information bits, rate r(o) = 1/3 for orthogonal caseand r(o) = 16/27 and 8/15 for nonorthogonal 4CPFSK and 8CPFSK respectively.

due to the noise and the interference during a dwell interval. The estimate A is used in

the soft metric applied to the decoder.

Fig. 7.6 plots the minimum required value of Eb/N0 to achieve a bit error probability

equal to 10−4 as a function of the number of network users. Independent Rayleigh

fading during each dwell interval is assumed. The figure indicates that 4-ary and 8-

ary nonorthogonal CPFSK have nearly the same capability of accommodating a large

number of users. 4-Ary orthogonal CPFSK is clearly preferable to 8-ary because of the

larger number of frequency channels available for the former. The figure illustrates the

great advantage of nonorthogonal CPFSK relative to orthogonal CPFSK. For example,

if M = 4 and Eb/N0 = 18dB, 10 users can be accommodated by a frequency-hopping

system with orthogonal CPFSK, but 26 users can be accommodated if nonorthogonal

CPFSK with h = 0.46 is the modulation.

CHAPTER 7. APPLICATION OF CPFSK TO FH NETWORKS 127

7.5 Chapter Summary

A noncoherent frequency-hopping system with nonorthogonal CPFSK has been designed

to be highly robust in environments including frequency-selective fading, partial-band

interference, multitone jamming, and multiple-access interference. The robustness is due

to the iterative turbo decoding and demodulation, the channel estimator based on the

expectation maximization algorithm, and the spectrally compact modulation.

Chapter 8

Summary and Future Work

In previous chapters, we have studied the information theoretic limits of coded CPFSK

systems as well as some receiver design issues. In this chapter, an overall summary of

this dissertation is given in Section 8.1, and a few open problems for future work are

addressed in Section 8.2.

8.1 Summary

When the modulation index h = 1, CPFSK becomes orthogonal FSK, one type of orthog-

onal modulation. The capacity of orthogonal modulation was first studied in Chapter 2.

Both coherent and noncoherent detection are considered in AWGN and ergodic fading

channels. Due to the symmetry property of the constellation, BICM capacity is shown

to have a performance loss relative to the CM capacity, and the BICM-ID receiver is

presented and shown to close the gap between BICM and CM capacities. The gain is

shown from the simulation results of turbo coded systems.

The convergence behavior can be analyzed by using EXIT chart. In Chapter 2, the

convergence thresholds of turbo coded orthogonal modulation systems were accurately

predicted. Another important characteristic of coded systems is the asymptotic error rate

performance. This was investigated in Chapter 3. The tool of union bound was utilized.

Although this is an upper bound for ML detection, it is still asymptotically tight for a

suboptimal iterative detector at mid-high SNR range. In order to lower the error floor of

128

CHAPTER 8. SUMMARY AND FUTURE WORK 129

convolutionally coded orthogonal modulation system, a recursive structure can be applied

as an inner code to the modulator. Among all recursive structures, the accumulator is

the simplest one. The simulation results showed that convolutionally coded orthogonal

modulation can more closely approach the capacity than the turbo coded system, while

its error floor can be made arbitrarily low when the frame size is large enough.

While orthogonal FSK improves energy efficiency, its spectral efficiency is low when

the modulation alphabet size M is large. In order to acquire higher bandwidth efficiency,

nonorthogonal CPFSK is studied in Chapter 4 and Chapter 5. In Chapter 4, the i.u.d.

capacity of coherent CPFSK in AWGN was found by using the properties of FSMC.

Coherent trellis detection of CPFSK requires h to be a rational number, and the number

of trellis states equals Q, the denominator of h. The main drawbacks of coherent detection

are that it needs to know the phase set Φ, and the choice of h is limited due to complexity

concerns. These can be overcome by using noncoherent detection. In Chapter 5, the

capacities of symbol-by-symbol and multi-symbol noncoherent detection are evaluated.

When the block size increases, the capacity of multi-symbol noncoherent detection gets

closer to the coherent capacity. By directly matching the EXIT curves of an inner

code with an outer code, we can design channel codes that approach CPFSK capacities.

The IRA code structure is used. For coherent systems, the recursive CPFSK structure

assumes the role of the accumulator, while for noncoherent systems an accumulator must

be explicitly included as a precoder. The simulation results show that the convergence

thresholds are within 0.5 dB from the capacities, when the frame size is long enough.

The drawback is that the transmitter must know the detector type to decide whether the

accumulator is actually utilized. This point is raised as a potential for the future work

in Section 8.2.

In practical systems, channel estimation is an important issue in the receiver design.

Although not requiring the phase information, the noncoherent detector does need to

know instantaneous or average SNR to compute decoding metrics. Chapter 6 derived

the channel estimator for noncoherent CPFSK based on the a priori information from

the decoder. The estimator uses the expectation maximization (EM) algorithm, and

works jointly with the demodulator and decoder. In Chapter 7, we applied turbo coded

noncoherent CPFSK to FH networks. By using the results in Chapter 5, the system

CHAPTER 8. SUMMARY AND FUTURE WORK 130

parameters, including coding rate, modulation index and number of frequency tones were

optimized with respect to a certain spectral efficiency. The derived channel estimator was

adopted, and the simulation results show good performance against both partial band

jamming and multiple access interference.

8.2 Future Work

In practical systems, there are still some open problems that need to be solved, to which

the future work might extend.

1. For coherent and noncoherent CPFSK, we have used IRA codes to approach the

capacities. However, the accumulator was not adopted for coherently detected CPFSK.

This leads to the drawback that the transmitter must know the detector type to decide

whether the accumulator is utilized. In the future work, it will be desirable that a

consistent transmitter can be applied, not depending upon the detector type. In this case,

the code could be designed to approach the capacity of coherent detection. This coherent

capacity can be approached by using multi-symbol noncoherent detector over long blocks.

However, the computation complexity for long block multi-symbol noncoherent detectors

needs to be reduced before it could become practical. This could be possibly done by

making use of the trellis structure in multi-symbol noncoherent detection when h is

rational.

2. We have derived the channel estimator in Chapter 6 for noncoherent CPFSK.

Another important part of the receiver is symbol timing. Although the phase information

is not required for noncoherent detector, the receiver front end still needs to know when

a CPFSK symbol starts. Without accurate symbol timing, the instantaneous SNR at

the matched filter outputs is not maximized, which might lead to poor performance,

especially when the number of frequency tones M ≥ 8 [99].

3. In Chapter 7, noncoherent CPFSK was applied to FH networks under multiple ac-

cess interference. The channel estimator simply treats all the multiple access interference

as Gaussian noise with covariance matrix K (could be scaled). Although the performance

is good, this assumption is usually not correct. This indicates that an improvement can

be made by making use of the characteristics of multiple access interference.

CHAPTER 8. SUMMARY AND FUTURE WORK 131

4. This dissertation is concerned solely with CPFSK, which is full response and rect-

angular pulse shaped CPM. Additional savings in bandwidth can be obtained by using

partial response phase forms, such as Gaussian and Raised Cosine. However, the addi-

tional intersymbol-interference created by using partial response signaling may make the

performance of symbol-by-symbol noncoherent detection too poor to be practical. Multi-

symbol noncoherent detection could be suitable for this case, although its computational

complexity must be reduced.

Appendix A

Outage Probability of Interference

Channels

Given n interfering signals, the SINR can be written as,

SINR =Pa0

2

N0WQ

+∑n

i=1Pai2

=2a0

2

2N0WPQ

+ 2∑n

i=1 ai2, (A.1)

where a0 and ai’s are i.i.d Rayleigh fading amplitudes. Thus, it is obvious that 2a02 and

2∑n

i=1 ai2 have Chi square distribution with 2 and 2n degrees of freedom respectively.

Let’s first consider the cumulative distribution function (cdf) and pdf of the random

variable (R.V.) V = X/(t + Y ), where X and Y are R.V.s of Chi square distribution

with 2 and 2n degrees of freedom respectively, and t is a fixed real positive number.

Pr(V ≤ v) = Pr(X ≤ tv + Y v)

=

∫ ∞

0

∫ tv+yv

0

pX(x)dxpY (y)dy, (A.2)

132

APPENDIX A. OUTAGE PROBABILITY OF INTERFERENCE CHANNELS 133

where

pX(x) =1

2e−x/2u(x) (A.3)

pY (y) =yn−1e−y/2

(n− 1)!2nu(y), (A.4)

and u(·) is the Heaviside step function. Substituting (A.3) and (A.4) into (A.2), we get

Pr(V ≤ v) =

[1− e−tv/2

∫ ∞

0

e−vy/2 yn−1e−y/2

(n− 1)!2ndy

]u(v)

=

(1− e−tv/2

(v + 1)n

)u(v), (A.5)

where the second equality comes directly from the integral of a Chi square pdf when

treating (v + 1)y as a single variable. Taking the derivative of Pr(V ≤ v), we get the pdf

of V as

pV (v) = e−tv/2

[n

(1

v + 1

)n+1

+t

2

(1

v + 1

)n]

u(v). (A.6)

Now we are able to compute the outage probability using the cdf of V ,

Pr

[W

Qlog2 (1 + SINR) < R

∣∣∣∣n

]

= Pr

[2a0

2

2N0WPQ

+ 2∑n

i=1 ai2

< 2QR/W − 1

]

= 1− exp

[−WN0

QP (2RQ/W − 1)

]2−nQR/W (A.7)

The last equality comes from (A.5) with t = 2N0W/(PQ) and v = 2QR/W − 1.

Appendix B

Minimum Value of Φ∆(δ) of

noncoherent detection

We prove that Φ∆(δ) in (3.27) achieves its minimum at δ = 1/2, when h = 1. It will be

straightforward to see the relationship holds for any weight h. Let α = y0 and β = y1.

α and β are both independent complex Gaussian variables with variance N0/2 in each

direction, but β has a zero mean, while the mean of α is√ESejθ, where θ is uniform

distributed in [0, 2π). Therefore,

E

[(I0

(2√ES |α|

N0

))−δ]

=

α

θ

(I0

(2√ES |α|

N0

))−δ1

πN0

e− |α−

√ESejθ|2N0

1

2πdθdα

(B.1)

Replacing the argument α = |α|ejθ′ , it is easy to get,

E

[(I0

(2√ES |α|

N0

))−δ]

= e− ES

N0

∫ ∞

0

(I0

(2√ES |α|

N0

))1−δ

e− |α|2

N0 2|α|d|α| (B.2)

134

APPENDIX B. MINIMUM VALUE OF Φ∆(δ) OF NONCOHERENT DETECTION 135

Note that now the right side of the integral has a Rayleigh pdf format, and we can write

the right side of (B.2 ) in the expectation term taken over the Rayleigh variable |αR|,

E

[(I0

(2√ES |α|

N0

))−δ]

= e− ES

N0 E

[(I0

(2√ES |αR|

N0

))1−δ]

(B.3)

Let

V = I0

(2√ES |αR|

N0

)(B.4)

W = I0

(2√ES |β|

N0

). (B.5)

V and W are i.i.d variables now. The laplace transform, when h = 1, can be represented

as,

Φ∆(δ) = e−γE(V 1−δ)E(W δ) (B.6)

Since the characteristic function of any pdf is convex, the laplace transform Φ∆(δ) is

also a convex function in the real range. V and W i.i.d, and are exchangeable in (B.6).

Therefore, Φ∆(δ) achieves its minimum when δ = 1/2.

In Rayleigh fading channel with noncoherent detection with CSI, since the Φ∆(δ) is

just (B.6) averaged over the fading levels, and this rule still applies.

References

[1] C. Berrou, A. Glavieux, and P. Thitimasjshima, “Near Shannon limit error-

correcting coding and decoding: Turbo-codes(1),” in Proc. IEEE Int. Conf. on

Commun. (ICC), Geneva, Switzerland, May 1993, pp. 1064–1070.

[2] R. G. Gallager, “Low-density parity-check codes,” Ph.D. dissertation, Massachusetts

Institute of Technology, Cambridge, MA, 1960.

[3] D. J. C. MacKay and R. M. Neal, “Near Shannon limit performance of low density

parity check codes,” Electronics Letters, vol. 32, pp. 1645–1646, Aug. 1996.

[4] C. Shannon, “A mathematical theory of communication,” Bell Sys. Tech. Journal,

vol. 27, pp. 379–423,623–656, 1948.

[5] A. Feinstein, “A new basic theorem of information theory,” IEEE Trans. Inform.

Theory, vol. 4, pp. 2–22, Sept. 1954.

[6] R. Gallager, Information Theory and Reliable Communication. Wiley, 1968.

[7] T. M. Cover and J. A. Thomas, Elements of Information Theory. Wiley, 1991.

[8] A. J. Viterbi, “Error bounds for convolutional codes and an asymptotically optimum

decoding algorithm,” IEEE Trans. Inform. Theory, vol. 13, pp. 260–269, Apr. 1967.

[9] L. Bahl, J. Cocke, F. Jelinek, and J. Raviv, “Optimal decoding of linear codes for

minimizing symbol error rate,” IEEE Trans. Inform. Theory, vol. 20, pp. 284–287,

Mar. 1974.

136

REFERENCES 137

[10] S. Benedetto, G. Montorsi, D. Divsalar, and F. Pollara, “Soft-input soft-output

modules for the construction and distributed iterative decoding of code networks,”

European Trans. on Telecommun., vol. 9, pp. 155–172, Mar.-Apr. 1998.

[11] J. Hagenauer, E. Offer, and L. Papke, “Iterative decoding of binary block and con-

volutional codes,” IEEE Trans. Commun., vol. 42, pp. 429–, Mar. 1996.

[12] R. Y. Shao, S. Lin, and M. P. C. Fossorier, “Two simple stopping criteria for turbo

decoding,” IEEE Trans. Commun., vol. 47, no. 8, pp. 1117–1120, Aug 1999.

[13] A. Matache, S. Dolinar, and F. Pollara, “Stopping rules for turbo decoders,” the

Telecommunications and Mission Operations (TMO) Progress Report, JPL, vol. 42-

142, Aug. 2000.

[14] Y. Wu, B. D. Woerner, and W. J. Ebel, “A simple stopping criterion for turbo

decoding,” IEEE Commun. Letters, vol. 4, no. 8, pp. 258–260, Aug 2000.

[15] Third Generation Partnership Project 2 (3GPP2), “Physical layer standard for

CDMA2000 spread spectrum systems, release C,” 3GPP2 C.S0002-C Version 1.0,

May 28 2002.

[16] European Telecommunications Standards Institute, “Universal mobile telecommuni-

cations system (UMTS): Multiplexing and channel coding (FDD),” 3GPP TS 25.212

version 3.4.0, Sept. 23 2000.

[17] M. C. Valenti and S. Cheng, “Iterative demodulation and decoding of turbo coded

M -ary noncoherent orthogonal modulation,” IEEE J. Select. Areas Commun.,

vol. 23, pp. 1738–1747, Sept. 2005.

[18] S. Cheng and M. C. Valenti, “Bit-interleaved turbo-coded noncoherent orthogonal

modulation with iterative demodulation and decoding: Capacity limits and con-

vergence analysis,” in Proc. Asilomar Conf. Signals, Systems, Computers, Pacific

Grove, CA, Nov. 2004.

REFERENCES 138

[19] ——, “Union bound analysis of bit interleaved coded orthogonal modulation with

differential precoding,” in Proc. IEEE Int. Symp. on Inform. Theory (ISIT), Seattle,

WA, July 2006.

[20] S. Cheng, M. C. Valenti, and D. Torrieri, “Coherent and multi-symbol noncoher-

ent CPFSK: Capacity and code design,” in Proc. IEEE Military Commun. Conf.

(MILCOM), Orlando, FL, Oct. 2007.

[21] R. I. Seshadri, S. Cheng, and M. Valenti, “The BICM capacity of coherent

continuous-phase frequency shift keying,” in Proc. IEEE Vehicular Tech. Conf.

(VTC), Baltimore, MD, Oct. 2007.

[22] S. Cheng, R. I. Seshadri, M. Valenti, and D. Torrieri, “The capacity of noncoher-

ent continuous-phase frequency shift keying,” in Proc. Conference on Information

Sciences and Systems (CISS), Baltimore, MD, March 2007.

[23] S. Cheng, M. C. Valenti, and D. Torrieri, “Turbo-NFSK: iterative estimation, nonco-

herent demodulation, and decoding for fast fading channels,” in Proc. IEEE Military

Commun. Conf. (MILCOM), Atlantic City, NJ, Oct. 2005.

[24] ——, “Robust iterative noncoherent reception of coded FSK over block fading chan-

nels,” IEEE Trans. Wireless Comm., vol. 6, no. 9, pp. 3142–3147, 2007.

[25] D. Torrieri, S. Cheng, and M. C. Valenti, “Robust frequency-hopping system for

channels with interference and frequency-selective fading,” in Proc. IEEE Int. Conf.

on Commun. (ICC), Glasgow, Scotland, June 2007.

[26] ——, “Robust frequency hopping for interference and fading channels,” IEEE Trans.

Commun., 2006, revised and submitted.

[27] S. Cheng and M. C. Valenti, “Macrodiversity packet combining for the IEEE 802.11a

uplink,” in IEEE Wireless Commun. and Networking Conf., New Orleans, LA, Mar.

2005.

REFERENCES 139

[28] M. C. Valenti, S. Cheng, and R. Iyer Seshadri, “Turbo and LDPC codes for digi-

tal video broadcasting,” in Turbo Code Applications: A Journey form a Paper to

Realization, K. Sripimanwat, Ed. Springer, 2005, ch. 12.

[29] G. Caire, G. Taricco, and E. Biglieri, “Bit-interleaved coded modulation,” IEEE

Trans. Inform. Theory, vol. 44, pp. 927–946, May 1998.

[30] X. Li and J. A. Ritcey, “Bit-interleaved coded modulation with iterative decoding,”

IEEE Commun. Letters, vol. 1, pp. 169–171, Nov. 1997.

[31] A. Chindapol and J. A. Ritcey, “Design, analysis, and performance evaluation of

BICM-ID with square QAM constellations in Rayleigh fading channels,” IEEE J.

Select. Areas Commun., vol. 19, pp. 944–957, May 2001.

[32] J. Proakis, Digital Communications, 4th ed. New York, NY: McGraw-Hill, Inc.,

2001.

[33] D. Torrieri, Principles of Spread-Spectrum Communication Systems. Springer, 2004.

[34] R. Knopp and P. A. Humblet, “On coding for block fading channels,” IEEE Trans.

Inform. Theory, vol. 46, no. 1, pp. 189–205, Jan. 2000.

[35] S. Benedetto, D. Divsalar, G. Montorsi, and F. Pollara, “A soft-input soft-output

APP module for iterative decoding of concatenated codes,” IEEE Commun. Letters,

vol. 1, no. 1, pp. 22–24, Jan. 1997.

[36] A. J. Viterbi, “An intuitive justification and a simplified implemetation of the MAP

decoder for convolutional codes,” IEEE J. Select. Areas Commun., vol. 16, no. 2,

pp. 260–264, Feb. 1998.

[37] J. Tan and G. L. Stuber, “Analysis and design of symbol mappers for iteratively

decoded BICM,” IEEE Trans. Wireless Comm., vol. 4, pp. 662 – 672, Mar. 2005.

[38] X. Li, A. Chindapol, and J. A. Ritcey, “Bit-interleaved coded modulation with

iterative decoding and 8-PSK signaling,” IEEE Trans. Commun., vol. 50, pp. 1250–

1257, Aug. 2002.

REFERENCES 140

[39] W. E. Stark, “Capacity and cutoff rate of noncoherent FSK with nonselective Rician

fading,” IEEE Trans. Commun., vol. 33, pp. 1153–1159, Nov. 1985.

[40] S. ten Brink, “Convergence of iterative decoding,” Electronics Letters, vol. 35, pp.

806–808, May 13, 1999.

[41] ——, “Convergence behavior of iteratively decoded parallel concatenated codes,”

IEEE Trans. Commun., vol. 49, pp. 1727–1737, Oct. 2001.

[42] R. J. McEliece and W. E. Stark, “Channels with block interference,” IEEE Trans.

Inform. Theory, vol. 30, pp. 44–53, Jan. 1984.

[43] S. Benedetto, D. Divsalar, D. Montorsi, and F. Pollara, “Serial concatenation of in-

terleaved codes: Performance analysis, design, and iterative decoding,” IEEE Trans.

Inform. Theory, vol. 44, no. 3, pp. 909–926, May 1998.

[44] K. R. Narayanan and G. L. Stuber, “A serial concatenation approach to iterative

demodulation and decoding,” IEEE Trans. Commun., vol. 47, no. 7, pp. 956–961,

Jul. 1999.

[45] ——, “Performance of trellis-coded CPM with iterative demodulation and decod-

ing,” IEEE Trans. Commun., vol. 49, pp. 676–687, Apr. 2001.

[46] P. Hoeher and J. Lodge, “Turbo DPSK: Iterative differential PSK demodulation and

channel decoding,” IEEE Trans. Commun., vol. 47, no. 6, pp. 837–843, June 1999.

[47] F. Fagnani and F. Garin, “Analysis of serial concatenation schemes for non-binary

modulations,” in Proc. IEEE Int. Symp. on Inform. Theory (ISIT), Adelaide, Aus-

tralia, Sept. 2005, pp. 745–749.

[48] E. R. Berlekamp, “The technology of error-correction codes,” Proc. IEEE, vol. 68,

no. 5, pp. 564–593, May 1980.

[49] H. Herzberg and G. Poltyrev, “Techniques of bounding the probability of decoding

error for block coded modulations structures,” IEEE Trans. Inform. Theory, vol. 40,

no. 3, pp. 903–911, May 1994.

REFERENCES 141

[50] G. Poltyrev, “Bounds on the decoding error probability of binary linear codes via

their spectra,” IEEE Trans. Inform. Theory, vol. 40, no. 4, p. 1284C1292, July 1994.

[51] H. Herzberg and G. Poltyrev, “The error probability of m-ary PSK block coded

modulation schemes,” IEEE Trans. Commun., vol. 44, no. 4, pp. 427–433, Apr.

1996.

[52] I. Sason and S. Shamai, “Improved upper bounds on the ml decoding error prob-

ability of parallel and serial concatenated turbo codes via their ensemble distance

spectrum,” IEEE Trans. Inform. Theory, vol. 46, pp. 24–47, Jan. 2000.

[53] D. Divsalar, “A simple tight bound on error probability of block codes with ap-

plication to turbo codes,” the Telecommunications and Mission Operations (TMO)

Progress Report, JPL, vol. 42-139, pp. 1–35, Nov. 1999.

[54] R. G. Gallager, “A simple derivation of the coding theorem and some applications,”

IEEE Trans. Inform. Theory, vol. 11, no. 1, pp. 3–18, Jan. 1965.

[55] T. Duman and M. Salehi, “New performance bounds for turbo codes,” IEEE Trans.

Commun., vol. 46, no. 6, pp. 717–723, June 1998.

[56] T. Duman, “Turbo codes and turbo coded modulation systems: Analysis and per-

formance bounds,” Northeastern University, Boston, MA, P.h.D. Dissertation, May

1998.

[57] E. Biglieri, G. Caire, G. Taricco, and J. Ventura, “Simple method for evaluating

error probabilities,” IEE Electronics Letters, vol. 32, pp. 191–192, Feb. 1996.

[58] M. K. Simon and M. S. Alouini, “A unified approach to the performance analysis of

digital communication over generalized fading channels,” Proc. IEEE, vol. 86, no. 9,

pp. 1860–1877, Sept. 1998.

[59] J. B. Anderson, T. Aulin, and C. E. Sundberg, Digital Phase Modulation (Applica-

tions of Communications Theory). Springer, 1986.

REFERENCES 142

[60] R. Iyer Seshadri, “A capacity-based parameter optimization for energy and band-

width efficient CPM,” West Virginia Univ., Morgantown, West Virginia, Disserta-

tion, Aug. 2007.

[61] S. Shamai, L. H. Ozarow, and A. D. Wyner, “Information rates for a discrete-time

Gaussian channel with intersymbol interference and stationary inputs,” IEEE Trans.

Inform. Theory, vol. 37, no. 11, pp. 1527–1539, Nov. 1991.

[62] D. Arnold, H.-A. Loeliger, P. Vontobel, A. Kavcic, and W. Zeng, “Simulation-based

computation of information rates for channels with memory,” IEEE Trans. Inform.

Theory, vol. 52, no. 8, pp. 3498 – 3508, Aug. 2006.

[63] H. Pfister, J. Soriaga, and P. Siegel, “On the achievable information rates of finite

state ISI channels,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), San

Anotonio, TX, Nov. 2001.

[64] P. Moqvist and T. Aulin, “Serially concatenated continuous phase modulation with

iterative decoding,” IEEE Trans. Commun., vol. 49, no. 11, pp. 1901–1915, Nov.

2001.

[65] K. Narayanan, I. Altunbas, and R. Narayanaswami, “Design of serial concatenated

MSK schemes based on density evolution,” IEEE Trans. Commun., vol. 51, no. 8,

pp. 1283–1295, Aug. 2003.

[66] H. Jin, A. Khandekar, and R. McEliece, “Irregular repeat-accumulate codes,” in

Proc. Int. Symp. on Turbo Codes and Related Topics, Brest, France, Sept. 2000, pp.

1–8.

[67] S. ten Brink, G. Kramer, and A. Ashikhmin, “Design of low-density parity-check

codes for modulation and detection,” IEEE Trans. Commun., vol. 52, no. 4, pp.

670–678, Apr. 2004.

[68] A. Roumy, S. Guemghar, G. Caire, and S. Verdu, “Design methods for irregular

repeat-accumulate codes,” IEEE Trans. Inform. Theory, vol. 50, no. 8, pp. 1711 –

1727, Aug. 2004.

REFERENCES 143

[69] S. Y. Chung, G. D. Forney, T. J. Richardson, and R. Urbanke, “On the design

of low-density parity-check codes within 0.0045 dB of the shannon limit,” IEEE

Commun. Letters, vol. 5, pp. 58–60, Feb. 2001.

[70] M. Ardakani and F. Kschischang, “A more accurate one-dimensional analysis and

design of irregular LDPC codes,” IEEE Trans. Commun., vol. 52, no. 12, pp. 2106–

2114, Dec. 2004.

[71] A. Guillen i Fabregas and A. Grant, “Capacity approaching codes for the non-

coherent FSK channel,” in Proc. 2006 Australian Communications Theory Work-

shop, Perth, Feb. 2006.

[72] M. Xiao and T. Aulin, “Irregular repeat continuous phase modulation,” IEEE Com-

mun. Letters, vol. 9, pp. 723–725, Aug. 2005.

[73] ——, “On analysis and design of low density generator matrix codes for continuous

phase modulation,” IEEE Trans. Wireless Comm., vol. 6, no. 9, pp. 3440–3449,

Sept. 2007.

[74] A. Guillen i Fabregas and A. Grant, “Capacity approaching codes for non-coherent

orthogonal modulation,” IEEE Trans. Wireless Comm., vol. 6, no. 11, pp. 4004–

4013, Nov. 2007.

[75] F. Kschischang, B. Frey, and H.-A. Loeliger, “Factor graphs and the sum-product

algorithm,” IEEE Trans. Inform. Theory, vol. 47, no. 2, pp. 498 – 519, Feb. 2001.

[76] S. ten Brink and G. Kramer, “Design of repeat-accumulate codes for iterative detec-

tion and decoding,” IEEE Trans. Signal Proc., vol. 51, no. 11, pp. 2764–2772, Nov.

2003.

[77] M. Tuechler, “Design of serially concatenated systems depending on the block

length,” IEEE Trans. Commun., vol. 52, no. 2, pp. 209–218, Feb. 2004.

[78] B. Rimoldi, “A decomposition approach to CPM,” IEEE Trans. Inform. Theory,

vol. 34, no. 2, pp. 260 – 270, Mar. 1988.

REFERENCES 144

[79] M. K. Simon and D. Divsalar, “Maximum-likelihood block detection of noncoherent

continuous phase modulation,” IEEE Trans. Commun., vol. 41, no. 1, pp. 90–98,

Jan. 1993.

[80] Y. Liang and V. Veeravalli, “Capacity of noncoherent time-selective rayleigh-fading

channels,” IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3095 – 3110, Dec. 2004.

[81] M. Katz and S. Shamai, “On the capacity-achieving distribution of the discrete-time

noncoherent and partially coherent AWGN channels,” IEEE Trans. Inform. Theory,

vol. 50, no. 10, pp. 2257 – 2270, Oct. 2004.

[82] A. Guillen i Fabregas and A. Grant, “Parameter free iterative decoding metrics for

non-coherent orthogonal modulation,” IEE Electronics Letters, vol. 42, no. 18, pp.

57–58, Aug. 2006.

[83] M. Sandell, C. Luschi, P. Strauch, and R. Yan, “Iterative channel estimation using

soft decision feedback,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM),

Sydney, Australia, Nov. 1998.

[84] M. Nissila and S. Pasupathy, “Adaptive Bayesian and EM-based detectors for

frequency-seletive fading channels,” IEEE Trans. Commun., vol. 51, pp. 1325–1336,

Aug. 2003.

[85] G. J. McLachlan and T. Krishnan, The EM Algorithm and Extentions. Willey,

1997.

[86] M. C. Valenti, E. Hueffmeier, B. Bogusch, and J. Fryer, “Towards the capacity of

noncoherent orthogonal modulation: BICM-ID for turbo coded NFSK,” in Proc.

IEEE Military Commun. Conf. (MILCOM), Monterey, CA, Nov. 2004.

[87] S. C. Chapra and R. Canale, Numerical Methods for Engineers, Fourth Edition.

New York: McGraw-Hill, 2002.

[88] I. Gradshteyn, I. Ryzhik, A. Jeffrey, and D. Zwillinger, Tables of Integrals, Series

and Products, 6th ed. Academic Press.

REFERENCES 145

[89] M. Jordan and R. Nichols, “The effects of channel characteristics on turbo code

performance,” in Proc. IEEE Military Commun. Conf. (MILCOM), McLean, VA,

Oct. 1996, pp. 17–21.

[90] European Telecommunications Standards Institute, “Spreading and modulation

(FDD),” 3GPP TS 25.213 version 2.0.0, Apr. 1999.

[91] LAN/MAN Standards Committee of the IEEE Computer Society, “Standard for

part 11: Wireless LAN medium access control (MAC) and physical layer (PHY)

specifications, higher-speed physical layer extension in the 2.4 ghz band,” 1999.

[92] ——, “Draft standard for part 15.4: Wireless medium access control (MAC) and

physical layer (PHY) specifications for low rate wireless personal area networks (LR-

WPANs),” Draft P802.15.4/D18, Feb. 2003.

[93] Bluetooth SIG, “Specification of the bluetooth system,” Core Version 2.0, Nov.

2004.

[94] S. Weber, X. Yang, and J. Andrews, “Transmission capacity of wireless ad hoc

networks with outage constraints,” IEEE Trans. Inform. Theory, vol. 51, no. 12, pp.

4091–4102, Dec. 2005.

[95] M. Pursley and D. Taipale, “Error probabilities for spread-spectrum packet radio

with convolutional codes and viterbi decoding,” IEEE Trans. Commun., vol. 35,

no. 1, pp. 1–12, Jan. 1987.

[96] G. Caire and D. Tuninetti, “The throughput of hybrid-ARQ protocols for the Gaus-

sian collision channel,” IEEE Trans. Inform. Theory, vol. 47, no. 5, pp. 1971–1988,

July 2001.

[97] Q. Zhang and T. Le-Ngoc, “Turbo product codes for FH-SS with parital band in-

terference,” IEEE Trans. Wireless Comm., vol. 1, no. 3, pp. 513–520, July 2002.

[98] W. Phoel, “Iterative demodulation and decoding of frequency hopped PSK in partial

band jamming,” IEEE J. Select. Areas Commun., vol. 23, no. 5, pp. 1026–1033, May

2005.

REFERENCES 146

[99] C. Brown and P. J. Vigneron, “Coarse and fine timing sychronisation for partial

response CPM in a frequency hopped tactical network,” in Proc. IEEE Military

Commun. Conf. (MILCOM), Orlando, FL, Oct. 2007.