Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Improving soft FEC performance for higher-order modulations via optimized bit channel mappings

Open Access Open Access

Abstract

Soft forward error correction with higher-order modulations is often implemented in practice via the pragmatic bit-interleaved coded modulation paradigm, where a single binary code is mapped to a nonbinary modulation. In this paper, we study the optimization of the mapping of the coded bits to the modulation bits for a polarization-multiplexed fiber-optical system without optical inline dispersion compensation. Our focus is on protograph-based low-density parity-check (LDPC) codes which allow for an efficient hardware implementation, suitable for high-speed optical communications. The optimization is applied to the AR4JA protograph family, and further extended to protograph-based spatially coupled LDPC codes assuming a windowed decoder. Full field simulations via the split-step Fourier method are used to verify the analysis. The results show performance gains of up to 0.25 dB, which translate into a possible extension of the transmission reach by roughly up to 8%, without significantly increasing the system complexity.

© 2014 Optical Society of America

1. Introduction

There is currently a large interest in developing practical coded modulation (CM) schemes that can achieve high spectral efficiency close to the ultimate capacity limits of optical fibers [1]. Pragmatic bit-interleaved coded modulation (BICM) in combination with low-density parity-check (LDPC) codes is one of the most popular capacity-approaching CM techniques for achieving high spectral efficiency, due to its simplicity and flexibility [2]. For a BICM system, a helpful abstraction is to think about transmitting data using a single forward error correction (FEC) encoder over a set of parallel binary-input channels, or simply bit channels, with different qualities. This is due to the fact that bits are not protected equally throughout the signal constellation. With this useful picture, an immediate problem is how to best allocate the coded bits from the encoder to these channels. As a baseline, a random or consecutive/sequential mapping is commonly used in practice. However, by optimizing the mapping strategy, one can improve the system performance, at almost no increased complexity cost. While BICM has been studied for fiber-optical communications by many authors, see e.g., [3] or [4] and references therein, to the best of our knowledge, optimized bit channel mappings have not yet been studied for such systems. In the following, we use the term “bit mapper” to denote the device that performs the bit channel mapping. We remark that other terms, e.g., “bit interleaver” or “mapping device”, are also frequently used in the literature.

In this paper, we address the bit mapper optimization for a BICM system based on LDPC codes in the context of long-haul fiber-optical communications. Our target system operates over a communication link with a lumped amplification scheme and without optical inline dispersion compensation. In general, the signal undergoes a complicated evolution and interacts with amplified spontaneous emission (ASE) noise and co-propagating signals through dispersive and nonlinear effects. For dispersion uncompensated transmission, it has been shown that an additive Gaussian noise (GN) model can be assumed, provided that dispersive effects are dominant and nonlinear effects are weak [5, 6]. We use the GN model for our analysis, which accounts for both the ASE noise from inline erbium-doped fiber amplifiers (EDFAs) and nonlinear noise due to the optical Kerr effect.

The starting point for the optimization problem is a fixed modulation format and a given error correction code, i.e., we do not consider the joint design of the modulation, bit mapper, and code. This scenario is often encountered in practice when the modulation and code have been designed separately and/or are predetermined according to some communication standard. Our focus is on protograph-based LDPC codes [7], which are very attractive from a design perspective and allow for a high-speed hardware implementation, suitable for fiber-optical communications [8]. A protograph is a (small) bipartite graph, from which the Tanner graph defining the code is obtained by a copy-and-permute procedure. As one illustrative example for protograph-based codes, we consider the AR4JA protographs developed by researchers from JPL/NASA in [9]. We also consider bit mapper optimization for protograph-based spatially coupled low-density parity-check (SC-LDPC) codes using the windowed decoder (WD) proposed in [10]. SC-LDPC codes, originally introduced as LDPC convolutional codes in [11], have attracted a lot of attention due to their capacity-achieving performance under belief propagation (BP) decoding for a variety of communication channels [12]. SC-LDPC codes can be constructed using protographs and they are considered as viable candidates for future spectrally efficient fiber-optical systems [8].

Most of the literature about bit mapper optimization deals with irregular LDPC codes that are not based on protographs, see e.g., [13, 14]. Attempts to improve the performance of BICM systems with protograph-based codes through bit mapper optimization have been previously made in [1517]. In [15], a mapping strategy inspired by the waterfilling algorithm for parallel channels called variable degree matched mapping (VDMM) is presented. This idea is extended in [16], where the authors exhaustively search over all possible nonequivalent connections between protograph nodes and modulation bits showing performance improvements over VDMM. As pointed out in [17], the above approaches are somewhat restrictive in the sense that only certain protographs can be used with certain modulation formats. A more flexible approach is proposed in [17], which is in principle suitable for any protograph structure and modulation but relies on a larger intermediate protograph.

Our optimization of the bit mapper is based on the decoding threshold over the additive white Gaussian noise (AWGN) channel similar to, e.g., [13, 14, 16], albeit assuming a fixed number of decoding iterations. The decoding threshold divides the channel quality parameter range (in our case the equivalent signal-to-noise ratio (SNR) of the GN model) into a region where reliable decoding is possible and where it is not. In the asymptotic case, i.e., assuming infinite codeword length, density evolution (DE) or one-dimensional simplifications via extrinsic information transfer (EXIT) functions can be used to find the decoding threshold for LDPC codes under BP decoding [18]. Approximate decoding thresholds of protograph-based codes assuming binary modulation can be obtained by using the protograph extrinsic information transfer (P-EXIT) analysis [19]. The approach proposed here relies on a modified P-EXIT analysis which allows for a fractional allocation between protograph nodes and modulation bits. This approach is, to the best of our knowledge, novel in the context of protograph-based codes and different from the approaches described in [1517]. In particular, a fractional allocation allows for an unrestricted matching of protographs and modulation formats and additionally does not suffer from an increased design complexity due to a larger intermediate protograph. We also discuss several ways to reduce the optimization complexity. In particular, we introduce periodic bit mappers for SC-LDPC codes with a WD, which is based on the results we previously presented in [20], where optimized bit mappers are found for (nonprotograph-based) SC-LDPC codes assuming parallel binary erasure channels (BECs) without considering the WD. The use of a WD in this paper is motivated by the reduced complexity and decoding delay with respect to full decoding. Finally, we provide a simulative verification assuming both linear and nonlinear transmission scenarios. For the latter case, we use the split-step Fourier method (SSFM) to show that the performance improvements predicted from the AWGN analysis can be achieved for a realistic transmission scenario including nonlinear effects.

1.1. Notation

Vectors and matrices are typeset in bold font by lowercase letters a and capital letters A, respectively. Matrix transpose is denoted by (·), Hermitian transpose by (·), and the squared norm of a complex vector by ‖a2. In denotes the identity matrix of size n. Complex conjugation is denoted by (·)*. δ(t) is Dirac’s delta function, whereas δ[k] is the Kronecker delta. Convolution is denoted by *. ℕ0, ℝ, and ℂ denote the set of nonnegative integers, real numbers, and complex numbers, respectively. Random variables and vectors are denoted by capital letters and their realizations by lowercase letters. The probability density function (PDF) of a random variable Y conditioned on the realization of another random variable X is denoted by fY|X (y|x), and the expected value by 𝔼[·].

2. System model

2.1. Continuous-time channel

We consider transmission of a polarization-multiplexed (PM) signal over a standard single-mode fiber (SSMF) with a lumped amplification scheme as shown in Fig. 1. The optical link consists of Nsp spans of SSMF with length Lsp. The baseband signal in each polarization is generated via a linear pulse modulation according to sx(t) = ∑k sx,k p(tk/Rs), where sx,k ∈ ℂ are the information symbols, p(t) the real-valued pulse shape, and Rs the symbol rate. (We give expressions for polarization x only, if polarization y has an equivalent expression.) The PM signal s(t) = (sx(t), sy(t)) is launched into the fiber and propagates according to [21, Ch. 3]

v(t,z)z=αg(z)2v(t,z)jβ222v(t,z)t2+jγv(t,z)v(t,z)2+w(t,z),
where v(t, z) is the complex baseband representation of the electric field and the input to the first fiber span and the output signal are s(t) = v(t, 0) and r(t) = v(t, NspLsp), respectively. In (1), α is the attenuation coefficient, β2 the chromatic dispersion coefficient, and γ the nonlinear Kerr parameter. The terms g(z) and w(t, z) = (wx(t, z), wy(t, z)) model the amplifier gain and the generated ASE noise [22, p. 84]. Each EDFA introduces circularly symmetric complex Gaussian noise with two-sided power spectral density (PSD) NEDFA = (G − 1)snsp [1, eq. (54)] per polarization, where G = eαLsp is the amplifier gain, h is Planck’s constant, νs the carrier frequency, and nsp the spontaneous emission factor. A standard coherent linear receiver is used, consisting of an equalizer, a pulse-matched filter and a symbol-time sampler. This amounts to rx,k = rx(t) * h(t) * p(−t)|t=k/Rs, where the frequency response of the equalizer h(t) is H(f) = exp(j2β2π2f2NspLsp).

 figure: Fig. 1

Fig. 1 Block diagram of the consider fiber-optical transmission system.

Download Full Size | PDF

2.2. Discrete-time channel

An approximate discrete-time model for the received samples rk = (rx,k, ry,k) based on the transmitted symbols sk = (sx,k, sy,k) is given by rkζsk + nk + ñk, where ζ ∈ ℂ [5]. The term nk = (nx,k, ny,k) accounts for the linear ASE noise with 𝔼[NkNk]=PASEI2δ[kk] where PASE = NspNEDFARs. The term ñk = (ñx,k, ñy,k) accounts for nonlinear noise with 𝔼[N˜kN˜k]=ηP3I2δ[kk], where P=limT(TTsx(t)2dt)/(2T) is the transmit power per polarization (assumed to be equal for both polarizations). η is a function of the link parameters α, β2, γ, Lsp, Nsp and the symbol rate Rs [5, eq. (15)], and |ζ|2 = 1 −|η|P2. The conditional PDF in this model is assumed to be Gaussian according to

fRk|Sk(rk|sk)=1(πPN)2exp(rkζsk2PN),
where PN = PASE + ηP3. The equivalent SNR is defined as ρ ≜ |ζ|2P/(PASE + ηP3).

2.3. Bit-interleaved coded modulation

The transmitted symbols sk in each time instant k take on values from a discrete signal constellation 𝒳 ⊂ ℂ2. Each point in the constellation is labeled with a unique binary string of length m = log2 |𝒳|, where bi(a), 1 ≤ im, denotes the ith bit in the binary string assigned to a𝒳 (counting from left to right). Consider now the block diagram shown in Fig. 2(a), where the modulo 2 addition of di,k and multiplication by i,k = (−1)di,k is explained further below and can be ignored for now. At each time instant k, the modulator Φ takes m bits bi,k, 1 ≤ im, and maps them to one of the constellation points according to the binary labeling. We consider two product constellations of one-dimensional constellations labeled with the binary reflected Gray code (BRGC) as shown in Fig. 3, which we refer to as PM-64-QAM and PM-256-QAM. At the receiver, the demodulator Φ−1 computes soft reliability information about the transmitted bits in the form of the log-likelihood ratios (LLRs)

li,klogfRk|Bi,k(rk|0)fRk|Bi,k(rk|1)=logs𝒳i,0fRk|Sk(rk|s)s𝒳i,1fRk|Sk(rk|s),
where 𝒳i,u ≜ {a𝒳 : bi(a) = u} is the subconstellation where all points have the bit u at the ith position of their binary label.

 figure: Fig. 2

Fig. 2 (a) BICM block diagram including the channel symmetrization technique. (b) Approximate model with parallel Gaussian LLR channels.

Download Full Size | PDF

 figure: Fig. 3

Fig. 3 The considered signal constellations in each dimension.

Download Full Size | PDF

A useful way to think about the setup depicted in Fig. 2(a) is to imagine transmitting over a set of parallel bit channels, where one may interpret the conditional distribution of the LLR fLi,k|Bi,k (·|·) as a bit channel. In the following, we say that a bit channel fL|B(l|b) is symmetric if fL|B(l|0) = fL|B(−l|1) and the channel is referred to as an LLR channel if fL|B(l|0)el = fL|B(l|1). One can show that fLi,k|Bi,k (·|·) is an LLR channel, but not necessarily symmetric in general. Symmetry can be enforced by adding modulo 2 independent and identically distributed bits di,k to the bits bi,k and multiplying the corresponding LLR by i,k (see Fig. 2(a)) [23]. The symmetry condition is an important requirement for the analysis in Section 3.3, where one implicitly relies on the assumption that the all-zero codeword has been transmitted [24, p. 389].

To simplify the analysis, the original bit channels are replaced with parallel symmetric Gaussian LLR channels, as shown in Fig. 2(b), where an LLR channel fL|B(l|b) is called a symmetric Gaussian LLR channel with parameter σ2 if L𝒩 (σ2/2, σ2) conditioned on B = 0 and L𝒩 (−σ2/2, σ2) conditioned on B = 1. In order to find a correspondence between the LLR channels fLi,k|Bi,k (·|·) and the parameters σi2, one may match the mutual information (MI) according to σi2=J1(Ii(ρ))2, where Ii(ρ) = I(Bi,k; Li,k) is independent of k and J(σ) denotes the MI between the output of a symmetric Gaussian LLR channel and uniform input bits. As an example and to visualize the different bit channel qualities, in Fig. 4 we compare the LLR channels (solid lines, estimated via histograms) with the approximated Gaussian LLR channels (dashed lines) assuming an AWGN channel and two different values of ρ for the three distinct bit channels of PM-64-QAM (see Fig. 3(a)). It can be seen that the actual densities are clearly non-Gaussian. However, the Gaussian approximation is quite accurate for the bit mapper optimization as shown later and allows for a major simplification of the analysis, thereby justifying its use.

 figure: Fig. 4

Fig. 4 Comparison of the LLR channels for PM-64-QAM including channel symmetrization (solid lines) with the Gaussian LLR channels that have the same MI (dashed lines).

Download Full Size | PDF

Consider now the case where a binary code 𝒞 ⊂ {0, 1}n of length n and dimension d is employed and each codeword c = (c1,..., cn) is transmitted using N = n/m symbols sk. The allocation of the coded bits to the modulation bits (i.e., the different bit channels in Fig. 2(b)) is determined by a bit mapper as shown in Fig. 5, where the vectors b1, …, bm are of length N. Our goal is to find good bit mappers for a fixed code and modulation. As a baseline, we consider a consecutive mapper according to bi,k = c(k−1)m+i for 1 ≤ im, 1 ≤ kN.

 figure: Fig. 5

Fig. 5 Block diagram illustrating the purpose of the bit mapper.

Download Full Size | PDF

3. Protograph-based LDPC codes

An LDPC code of length n and dimension d is defined via a sparse parity-check matrix H = [hi,j] ∈ {0, 1}c×n, where c = nd. There exist different methods to construct “good” LDPC codes, i.e., good matrices H. One popular method is by using protographs [7]. An LDPC code can be represented by using a bipartite Tanner graph consisting of n variable nodes (VNs) and c check nodes (CNs), where the ith CN is connected to the jth VN if hi,j = 1. A protograph is also a bipartite graph defined by an adjacency matrix P=[pi,j]0c×n, called the base matrix. Given P, a parity-check matrix H is obtained by replacing each entry pi,j in P with a random binary M-by-M matrix which contains pi,j ones in each row and column. This procedure is called lifting and M ≥ maxi,j pi,j is the so-called lifting factor. Graphically, this construction amounts to copying the protograph M times and subsequently permuting edges. Parallel edges, i.e., for pi,j > 1, are permitted in the protograph and are resolved in the lifting procedure. The design rate of the code is given by R = 1 − c/n = 1 − c′/n′, where c = c′M and n = n′M.

3.1. AR4JA codes

As one example to illustrate the bit mapper optimization technique, we consider the AR4JA code family defined by the protographs in [9, Fig. 8]. The base matrix P() of the AR4JA code ensemble with parameter ∈ ℕ0 can be recursively defined via [17]

P()=(P()|003113),P(=0)=(120000311101221)
with c′ = 3 and n′ = 5 + 2. VNs corresponding to the second column of the base matrix are punctured, leading to a design rate of R = (1 − c′/n′) · n′/(n′ − 1) = ( + 1)/( + 2).

3.2. Spatially coupled LDPC codes

SC-LDPC codes have parity-check matrices with a band-diagonal structure (for a general definition see, e.g., [12]). For completeness, we briefly review the construction via protographs in [25], [10, Sec. II-B]. The base matrix P[T] of a (J, K) regular, protograph-based SC-LDPC code with termination length T can be constructed by specifying matrices Pi, 0 ≤ ims of dimension J′ by K′, where ms is referred to as the memory. The matrices are such that P=i=0msPi has column weight J and row weight K for all columns and rows, respectively. Given T and the matrices Pi, the base matrix P[T] is constructed as

P[T]=(P0P1P0PmsP1Pms)Ttimes.
From the dimensions of P[T] one can infer a design rate of R(T) = 1 − (T + ms)J′/(TK′). As T grows large, the rate approaches R(∞) = 1 − J′/K′.

Since our goal is not to optimize the code, we rely on base matrices that have been proposed elsewhere in the literature, in particular in combination with a WD which we discuss below. We consider P0 = (2, 2, 2) and P1 = (1, 1, 1) according to [10, Design rule 1], where J′ = 1, K′ = 3, ms = 1, and R(∞) = 2/3.

3.3. Decoding and asymptotic EXIT analysis

We use a modified version of the P-EXIT analysis as a tool to predict the iterative BP performance behavior of the protograph-based codes [19]. A detailed description of this tool for binary modulation is available in [19] and [24, Algorithm 9.2]. Here, we only describe the necessary modifications to account for the WD and the nonbinary modulations. We start with the former and explain the latter in the next section.

We employ the WD scheme developed in [10]. WD helps to alleviate the long decoding delays and high decoding complexity of SC-LDPC codes under full BP decoding by exploiting the fact that two VNs are not involved in the same parity-check equation if they are at least (ms + 1)K′ columns apart [10]. The WD restricts message updates to a subset of VNs and CNs in the entire graph. After a predetermined number of decoding iterations, this subset changes and the decoding window slides to the next position. Pseudocode for the modified P-EXIT analysis of SC-LDPC codes accounting for the WD is presented in Algorithm 1. The main difference with respect to BP decoding is the window size parameter W, which specifies the number of active CNs in the protograph considered in each window as a multiple of J′. The P-EXIT analysis for the standard BP decoder can be recovered from Algorithm 1 by setting T = 1, W = 1, J′ = c′, and K′ = n′.

Tables Icon

Algorithm 1:. P-EXIT analysis of the WD for a (J, K) regular SC-LDPC protograph.

4. Bit mapper optimization

4.1. Asymptotic bit mapper model

Each VN in the protograph represents M VNs in the lifted Tanner graph. Since a VN corresponds to one bit in a codeword, the n′ VNs in the protograph give rise to n′ different classes of coded bits that are treated as statistically equivalent in the P-EXIT analysis. In particular, for binary modulation, each protograph VN is assigned with one input variance, corresponding to either a punctured bit or the Gaussian LLR channel (see lines 2 and 3 in Algorithm 1). For nonbinary modulations, VNs in the same class can in principle have different input densities. Assume for example that a given protograph is lifted with an even lifting factor M and coded bits are mapped consecutively to a 4-ary modulation. Then, M/2 VNs in each class are allocated to the first modulation bit and M/2 to the second.

We model the bit mapper by specifying the assignment of VN classes to the bit channels via a matrix A = [ai,j] ∈ ℝm×n′, where ai,j, 0 ≤ ai,j ≤ 1 ∀i, j denotes the proportional allocation of VNs from the jth class (corresponding to the jth column in the base matrix) allocated to the ith bit in the signal constellation. The approaches in [1517] can be recovered by considering only nonfractional assignments, i.e., ai,j ∈ {0, 1}. In that case, VNs of the original protograph [15,16] or an intermediate protograph [17] are directly assigned to the modulation bits.

We point out that, instead of interpreting ai,j as a deterministic fraction of VNs in a particular class allocated to a particular channel, one should interpret ai,j as a probability, and study the bit mapper as a probabilistic mapping device that assigns coded bits randomly to channels, similar to [26]. Under this assumption, one may argue that the VNs belonging to a certain class “see” an equivalent bit channel which is the average of the original bit channels fLi,k|Bi,k (l|b), weighted according to the probabilities ai,j. The MI of each equivalent bit channel is a weighted average of the original channels’ MI as shown in the following lemma.

Lemma 1: Let {fLi|Bi (l|b) : 1 ≤ im} be a collection of symmetric LLR channels. Consider a new channel fL|B(l|b), where transmission takes place over the ith channel in the collection with probability αi andi αi = 1. Then I(L; B) = ∑i αiI(Li; Bi) for uniform input bits.

Proof. The channel fL|B(l|b) is a symmetric LLR channel. The claim then follows from fL|B(l|b) = ∑i αi fLi|Bi (l|b) and the fact that the MI between the output of a symmetric LLR channel fL|B(l|b) and uniform input bits is I(L;B)=1fL|B(l|0)log2(1+el)dl.

If we collect the MI corresponding to the original m symmetric LLR channels in a vector I(ρ) = (I1(ρ),..., Im(ρ)), then, multiplying I(ρ) by A leads to a vector (Ĩ1, Ĩ2,..., Ĩn′) with the MIs corresponding to the averaged bit channels as seen by the n′ VN classes. These averaged bit channels are modeled as symmetric Gaussian LLR channels with parameters ( σ12,,σn2). In particular, the P-EXIT analysis for nonbinary modulation is obtained by changing the initialization step in line 3 of Algorithm 1 and assigning σi2=J1(I˜i)2, where the algorithm takes A as an additional input to compute Ĩi as described.

In order to have a valid probabilistic assignment, all columns in A have to sum to one and all rows in A have to sum to n′/m, i.e., we have mn′ equality constraints in total. The first condition ensures that, asymptotically, all VNs are assigned to a channel, while the second condition ensures that all parallel channels are used equally often. The set of valid assignment matrices is denoted by 𝒜m×n′ ⊂ ℝm×n′. In the case of punctured VNs, the corresponding columns in A are removed and n′ is interpreted as the number of unpunctured VNs.

4.2. Optimization

For a given bit mapper, i.e., for a given assignment matrix A, an approximate decoding threshold ρ*(A) can be found using Algorithm 1 as follows. Fix a certain precision δ, target bit error probability ptar, and maximum number of iterations lmax. Starting from some SNR ρ where Algorithm 1 converges to a successful decoding, S = 1, iteratively decrease ρ by δ until the decoding fails. The smallest ρ for which S = 1 is declared as the decoding threshold ρ*(A). For any ρρ*(A), we denote the number of iterations until successful decoding by ls(A, ρ).

We are interested in optimizing A in terms of the decoding threshold for a given protograph and modulation format. The optimization problem is thus

Aopt=argminA𝒜m×nρ*(A),
where the baseline system realizes a mapping of coded bits to modulation bits such that ai,j = 1/m, ∀i, j, resulting in identical variances σi2 for the equivalent bit channels of all VN classes. The corresponding assignment matrix is denoted by Auni. The search space 𝒜m×n′ can be regarded as a convex polytope 𝒫 in p = (m − 1)(n′ − 1) dimensions by removing the last row and column in A, replacing the equality constraints with inequality constraints, and writing the matrix elements in a vector x ∈ ℝp according to the prescription x(i−1)n′+j = ai,j for 1 ≤ im − 1 and 1 ≤ jn′ − 1. While the search space is convex, one can show by simple examples that the objective function is nonconvex in 𝒫. In the following, we discuss ways to obtain good bit mappers with reasonable effort. We also remark that some of the optimization approaches proposed previously in the context of bit mapper optimization for irregular LDPC codes are not necessarily appropriate in our case due to the higher number of VN classes, i.e., they can be too complex (for example the iterative grid search in [13]) or do not explore the search space efficiently (simple hill climbing approaches as in [14]).

First, as an alternative to directly optimizing the decoding threshold, we iteratively optimize the convergence behavior in terms of the number of iterations until successful decoding as follows. Initialize ρ to the decoding threshold for the baseline bit mapper, i.e., ρ = ρ*(Auni). Find A* such that it minimizes the number of decoding iterations until convergence for the given ρ, i.e.,

A*=argminA𝒜m×nls(A,ρ).
For the found optimized A*, calculate the new decoding threshold ρ*(A*). If the threshold did not improve, stop. Otherwise, set ρ = ρ*(A*) and repeat the optimization. The above iterative approach was already used by the authors to find good bit mappers for SC-LDPC codes in [20] for parallel BECs. This approach is largely based on the ideas presented in [27, Sec. IV], where optimized degree distributions for irregular LDPC codes are found. The computational complexity can be significantly reduced compared to the threshold minimization (6). However, it is not guaranteed to be equivalent to a true threshold optimization, i.e., in general AoptA*. We employ differential evolution [28] to solve the optimization problem in (7), which has been previously applied by many authors in the context of irregular LDPC codes [24, p. 396]. Differential evolution is a solver for unconstrained optimization problems and we briefly indicate how the algorithm is modified to account for the constrained search space. First, since 𝒜m×n′ can be regarded as a convex polytope, it is straightforward to take uniformly distributed points for the initial population via standard random walk procedures [29]. Second, if the algorithm generates a trial point xt that lies outside the polytope, we apply the following randomized bounce-back strategy. Let be the line segment connecting xt and a random point inside the polytope, and let xi be the intersecting point of and the boundary of 𝒫. We replace xt with a point taken randomly from , such that it lies in 𝒫 and has at most a distance d from xi, where d is the distance between xi and xt. For a detailed description of the algorithm itself and some guidelines regarding the optimization parameter choice, we refer the reader to [28].

The optimization complexity is further reduced by constraining the maximum number of iterations lmax. Practical systems commonly operate with a relatively small number of BP iterations. For example, in Sec. 5, we assume 50 BP iterations, and hence the decoding thresholds are optimized for the same number of iterations. In the simulative verification, we have observed that the performance of the finite-length codes assuming 50 BP iterations is generally better using a bit mapper that is also optimized for lmax = 50 compared to, say, lmax = 1000, although the differences were small.

Additionally, for SC-LDPC codes, we take advantage of the structure of the optimized bit mappers for parallel BECs [20], which show a certain form of periodicity. The optimization complexity can then be reduced by assuming that the optimal solution lies in a lower-dimensional subspace of 𝒫, defined by assignment matrices that take on a periodic form as A = (A′, A″, A″,···, A″, A′″), with m × V matrices A′, A″, and A′″, where V is the periodicity factor. If V is chosen small enough, the dimensionality of the search space (i.e., (m − 1)(3V − 1)) can be substantially reduced, which generally improves the convergence speed of the differential evolution algorithm.

The methods and complexity reduction techniques described above have been selected to obtain a good trade-off between final performance and design complexity. In certain cases, for example the considered AR4JA code in the next section, it could be possible to further improve the performance at the expense of a higher design complexity by directly targeting the decoding threshold optimization (6) without the need for the iterative optimization (albeit we expect the improvements to be incremental). On the other hand, for the considered SC-LDPC code, the iterative optimization and periodicity assumptions were critical to maintain a reasonable design complexity, which is mainly due to the very large number of protograph VNs.

5. Results and discussion

In this section, we present and discuss numerical results, and illustrate the performance gains that can be achieved by employing optimized bit mappers. For the baseline systems, we use a consecutive mapping of coded bits to modulation bits. Alternatively, one may use a uniformly random mapping, which has the same expected performance.

In order to show the flexibility of the technique, we consider four different scenarios, combining both modulation formats with one code based on the AR4JA protographs and one SC-LDPC code, where the lifting factor is M = 3000 in all cases. For simplicity, the codes are randomly generated without further consideration of the graph structure. The protograph lifting procedure can in principle be combined with standard techniques to avoid short graph cycles that may potentially lead to high error floors [24, Ch. 6.3]. Alternatively, an additional outer algebraic code may be assumed, which removes remaining errors to achieve a required target BER of 10−15. A rate R = 2/3 code based on the AR4JA protograph for = 1 is used, which is denoted by 𝒞AR4JA. For the spatially coupled case with T = 30, a code based on the protograph described in Sec. 3.2 is used, which is denoted by 𝒞SC. For the given value of T, the design rate is R(30) = 0.656. For the AR4JA code, standard BP decoding is assumed with lmax = 50, while for the SC-LDPC codes, we employ a WD with W = 5 and lmax = 10, which again amounts to a total of 50 iterations per decoded bit. We also tried other combinations of W and lmax with a similar total number of iterations and this combination gave the best performance. For the bit mapper optimization and in particular the P-EXIT analysis, we use the same values for lmax and W, and additionally ptar = 10−5. The finite-length bit mappers are obtained via the rounded matrix MA* from which the index assignment of coded bits to modulation bits is determined.

Notice that in all four scenarios, the approaches in [1517] are either not possible (due to a mismatch between the number of protograph VNs and the number of modulation bits) or not feasible (due to the large complexity of the resulting optimization). As an example, the protograph corresponding to 𝒞SC has 90 VNs and can be directly connected to the three distinct bit channels of PM-64-QAM. This leads, however, to a very large number of possible (nonfractional) connections between protograph VNs and modulation bits.

5.1. Linear transmission

We start by providing a verification of the proposed optimization technique assuming an AWGN channel. This case is obtained when nonlinear effects are ignored, i.e., γ = 0. In this case, the channel PDF (2) is valid without approximations.

In Fig. 6(a), the predicted bit error rate (BER) of the AR4JA code via the P-EXIT analysis is shown together with Monte Carlo simulations by the dashed and solid lines, respectively. Performance curves for the baseline bit mappers are shown in red and for the optimized ones in blue. As a reference, we also plot the BER-constrained [24, p. 17] generalized mutual information (GMI) for the corresponding spectral efficiency in each figure (the GMI is also referred to as the BICM capacity [30]). For both scenarios, it can be observed that the optimized bit mappers lead to a significant performance improvement. The gains that can be achieved at a BER of 10−5 are approximately 0.19 and 0.25 dB for PM-64-QAM and PM-256-QAM, respectively.

 figure: Fig. 6

Fig. 6 Comparison of the optimized bit mappers (blue) with the baseline bit mappers (red) for the linear transmission scenario. Dashed lines correspond to P-EXIT analysis and solid lines to simulation results. In (b), solid green lines correspond to the P-EXIT analysis for V = 6.

Download Full Size | PDF

The predicted gains from the P-EXIT analysis for the same BER is slightly less, i.e., 0.12 and 0.19 dB, respectively. The deviation of the asymptotic analysis from the actual simulation results is to be expected due to the Gaussian approximation of the LLR densities and the finite lifting factor and, hence, finite block lengths of the codes. However, it is important to observe that, even though the optimization was carried out assuming a cycle-free graph structure, the predicted performance gains for the finite-length codes is well preserved.

Similarly, the performance of the SC-LDPC code is shown in Fig. 6(b). The periodicity factor for the bit mapper optimization was set to V = 3. The observed gains at a BER of 10−5 are approximately 0.20 dB for PM-64-QAM and 0.25 dB for PM-256-QAM. We also show the predicted P-EXIT performance obtained for bit mappers that are optimized assuming a larger periodicity factor of V = 6 by the solid green curves. It can be seen that for both modulation formats, the additional gains are incremental, i.e., for PM-64-QAM the predicted performance curves virtually overlap, while for PM-256-QAM, the difference is roughly 0.01 dB. This suggests that a full optimization of A will be only marginally better than with V = 3.

From Fig. 6, it appears that the P-EXIT analysis consistently underestimates the finite-length performance improvement for the AR4JA code, while it overestimates the improvement for the SC-LDPC code. This observation does, however, not apply in general and seems to be coincidental. In particular, we also optimized the bit mapper for AR4JA codes of different code rates (results not shown), and the P-EXIT analysis may also underestimate the true performance improvements in that case. Moreover, we would like to stress that a direct comparison between the two codes is difficult, because of the slightly different code rates (and hence spectral efficiencies) and different decoding complexities and delays. Fair comparisons between SC-LDPC codes and LDPC block codes is an active area of research and beyond the scope of this paper.

5.2. Nonlinear transmission

In this section, we consider a transmission scenario including nonlinear effects, i.e., γ ≠ 0, where the assumed channel PDF (2) is only approximately valid. In particular, we study the potential increase in transmission reach that can be obtained by employing the optimized bit mappers.

We consider a single channel transmission scenario to keep the simulations within an acceptable time. In the simulation model, we assume perfect knowledge about the polarization state, and perfect timing and carrier synchronization. All chosen system parameters are summarized in Table 1. Additionally, we use a root-raised cosine pulse p(t) with a roll-off factor of 0.25. In order to solve (1), we employ the symmetric SSFM with two samples per symbol and a fixed step size of Δ=(104LD2LNL)1/3, where LD=1/(|β2|Rs2) and LNL = 1/(γP) is the dispersive and nonlinear length, respectively. The input power that maximizes ρ according to the GN model varies between −2.2 dBm for Nsp = 10 and −2.6 dBm for Nsp = 40. For simplicity, the input power per polarization is fixed to P = −2.5 dBm for all values of Nsp.

Tables Icon

Table 1. System parameters

In Fig. 7, the simulated BER of the PM systems using 𝒞AR4JA and 𝒞SC is shown as a function of the number of fiber spans Nsp by the dashed and solid lines, respectively. Again, curves corresponding to the baseline bit mappers are shown in red, while curves corresponding to the optimized bit mappers are shown in blue. Notice that the SNR decrease (in dB) is not linear with increasing number of spans, hence the different slopes compared to the curves shown in Fig. 6. For PM-256-QAM, the transmission reach can be increased by roughly one additional span for both codes, at the expense of a slightly increased BER. For example, for 𝒞SC, the transmission reach can be increased from 12 to 13 spans, while the BER slightly increases from 10−5 to 3 · 10−5. For PM-64-QAM, the increase is roughly 1 span for 𝒞AR4JA and roughly 2 spans for 𝒞SC. In fact, these gains can be approximately predicted also from the GN model. For example, for the chosen input power and system parameters, the GN model predicts an SNR decrease of roughly 0.3 dB from Nsp = 12 to Nsp = 13 and 0.15 dB from Nsp = 34 to Nsp = 35, i.e., one would expect the performance improvements in the linear transmission scenario to translate into roughly one additional span for PM-256-QAM and one to two additional spans for PM-64-QAM. This estimate corresponds to an increase of the transmision reach by 3–8%, which is well in line with the simulation results presented in Fig. 7.

 figure: Fig. 7

Fig. 7 Comparison of the optimized bit mappers (blue) with the baseline bit mappers (red) for the nonlinear transmission scenario.

Download Full Size | PDF

6. Conclusion

In this paper, we studied the bit mapper optimization for a PM fiber-optical system. Focusing on protograph-based codes, an optimization approach was proposed based on a fractional allocation of protograph bits to modulation bits via a modified P-EXIT analysis. Extensive numerical simulations were used to verify the analysis for a dispersion uncompensated link assuming both linear and nonlinear transmission regimes. The results show performance improvements of up to 0.25 dB, translating into a possible extension of the transmission reach by up to 8%.

Acknowledgments

This work was partially funded by the Swedish Research Council under grant #2011-5961 and by the European Community’s Seventh’s Framework Programme (FP7/2007–2013) under grant agreement No. 271986. The simulations were performed in part on resources provided by the Swedish National Infrastructure for Computing (SNIC) at C3SE.

References and links

1. R.-J. Essiambre, G. Kramer, P. J. Winzer, G. J. Foschini, and B. Goebel, “Capacity limits of optical fiber networks,” J. Lightw. Technol. 28, 662–701 (2010). [CrossRef]  

2. D. J. Costello and G. D. Forney Jr., “Channel coding: The road to channel capacity,” Proc. IEEE 95, 1150–1177 (2007). [CrossRef]  

3. B. Smith and F. R. Kschischang, “A pragmatic coded modulation scheme for high-spectral-efficiency fiber-optic communications,” J. Lightw. Technol. 30, 2047–2053 (2012). [CrossRef]  

4. I. B. Djordjevic, M. Arabaci, and L. L. Minkov, “Next generation FEC for high-capacity communication in optical transport networks,” J. Lightw. Technol. 27, 3518–3530 (2009). [CrossRef]  

5. L. Beygi, E. Agrell, P. Johannisson, M. Karlsson, and H. Wymeersch, “A discrete-time model for uncompensated single-channel fiber-optical links,” IEEE Trans. Commun. 60, 3440–3450 (2012). [CrossRef]  

6. A. Carena, V. Curri, G. Bosco, P. Poggiolini, and F. Forghieri, “Modeling of the impact of nonlinear propagation effects in uncompensated optical coherent transmission links,” J. Lightw. Technol. 30, 1524–1539 (2012). [CrossRef]  

7. J. Thorpe, “Low-density parity-check (LDPC) codes constructed from protographs,” IPN Progress Report 42-154, JPL (2005).

8. L. Schmalen, A. J. de Lind van Wijngaarden, and S. ten Brink, “Forward error correction in optical core and optical access networks,” Bell Labs Tech. J 18, 39–66 (2013). [CrossRef]  

9. D. Divsalar, C. Jones, S. Dolinar, and J. Thorpe, “Protograph based LDPC codes with minimum distance linearly growing with block size,” in “Proc. IEEE Glob. Communication Conf. (GLOBECOM),” (St. Louis, Missouri, 2005).

10. A. R. Iyengar, M. Papaleo, P. H. Siegel, J. K. Wolf, A. Vanelli-coralli, and G. E. Corazza, “Windowed decoding of protograph-based LDPC convolutional codes over erasure channels,” IEEE Trans. Inf. Theory 58, 2303–2320 (2012). [CrossRef]  

11. A. J. Felström and K. S. Zigangirov, “Time-varying periodic convolutional codes with low-density parity-check matrix,” IEEE Trans. Inf. Theory 45, 2181–2191 (1999). [CrossRef]  

12. S. Kudekar, T. Richardson, and R. Urbanke, “Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC,” IEEE Trans. Inf. Theory 57, 803–834 (2011). [CrossRef]  

13. T. Cheng, K. Peng, J. Song, and K. Yan, “EXIT-aided bit mapping design for LDPC coded modulation with APSK constellations,” IEEE Commun. Lett. 16, 777–780 (2012). [CrossRef]  

14. G. Richter, A. Hof, and M. Bossert, “On the mapping of low-density parity-check codes for bit-interleaved coded modulation,” in “Proc. IEEE Int. Symp. Information Theory (ISIT),” (Nice, Italy, 2007).

15. D. Divsalar and C. Jones, “Protograph based low error floor LDPC coded modulation,” in “Proc. IEEE Military Communications Conf. (MILCOM),” (Atlantic City, NJ, 2005).

16. Y. Jin, M. Jiang, and C. Zhao, “Optimized variable degree matched mapping for protograph LDPC coded modulation with 16QAM,” in “Proc. Int. Symp. Turbo Codes and Iterative Information Processing (ISTC),” (Brest, France, 2010).

17. T. Van Nguyen, A. Nosratinia, and D. Divsalar, “Threshold of protograph-based LDPC coded BICM for Rayleigh fading,” in “Proc. IEEE Glob. Communication Conf. (GLOBECOM),” (Houston, TX, 2011).

18. T. Richardson and R. Urbanke, “The capacity of low-density parity-check codes under message-passing decoding,” IEEE Trans. Inf. Theory 47, 599–618 (2001). [CrossRef]  

19. G. Liva and M. Chiani, “Protograph LDPC codes design based on EXIT analysis,” in “Proc. IEEE Glob. Communication Conf. (GLOBECOM),” (Washington, DC, 2007).

20. C. Häger, A. Graell i Amat, A. Alvarado, F. Brännström, and E. Agrell, “Optimized bit mappings for spatially coupled LDPC codes over parallel binary erasure channels,” in “Proc. IEEE Int. Conf. Communications (ICC),” (Sydney, Australia, 2014).

21. G. P. Agrawal, Lightwave Technology: Telecommunication Systems (Wiley-Interscience, 2005). [CrossRef]  

22. M. Secondini and E. Forestieri, “The nonlinear Schrödinger equation in fiber-optic systems,” Riv. Mat. Univ. Parma 8, 69–98 (2008).

23. J. Hou, P. H. Siegel, L. B. Milstein, and H. D. Pfister, “Capacity-approaching bandwidth-efficient coded modulation schemes based on low-density parity-check codes,” IEEE Trans. Inf. Theory 49, 2141–2155 (2003). [CrossRef]  

24. W. Ryan and S. Lin, Channel Codes Classical and Modern (Cambridge University, 2009). [CrossRef]  

25. D. G. M. Mitchell, M. Lentmaier, and D. J. Costello Jr., “AWGN channel analysis of terminated LDPC convolutional codes,” in “Proc. Information Theory and Applications Workshop (ITA),” (La Jolla, CA, 2011).

26. R. Liu, P. Spasojevic, and E. Soljanin, “Reliable channel regions for good binary codes transmitted over parallel channels,” IEEE Trans. Inf. Theory 52, 1405–1424 (2006). [CrossRef]  

27. T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, “Design of capacity-approaching irregular low-density parity-check codes,” IEEE Trans. Inf. Theory 47, 619–637 (2001). [CrossRef]  

28. R. Storn and K. Price, “Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces,” J. Global Opt. 11, 341–359 (1997). [CrossRef]  

29. D. Kaufman and R. Smith, “Direction choice for accelerated convergence in hit-and-run sampling,” Operations Research 46, 84–95 (1998). [CrossRef]  

30. G. Caire, G. Taricco, and E. Biglieri, “Bit-interleaved coded modulation,” IEEE Trans. Inf. Theory 44, 927–946 (1998). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (7)

Fig. 1
Fig. 1 Block diagram of the consider fiber-optical transmission system.
Fig. 2
Fig. 2 (a) BICM block diagram including the channel symmetrization technique. (b) Approximate model with parallel Gaussian LLR channels.
Fig. 3
Fig. 3 The considered signal constellations in each dimension.
Fig. 4
Fig. 4 Comparison of the LLR channels for PM-64-QAM including channel symmetrization (solid lines) with the Gaussian LLR channels that have the same MI (dashed lines).
Fig. 5
Fig. 5 Block diagram illustrating the purpose of the bit mapper.
Fig. 6
Fig. 6 Comparison of the optimized bit mappers (blue) with the baseline bit mappers (red) for the linear transmission scenario. Dashed lines correspond to P-EXIT analysis and solid lines to simulation results. In (b), solid green lines correspond to the P-EXIT analysis for V = 6.
Fig. 7
Fig. 7 Comparison of the optimized bit mappers (blue) with the baseline bit mappers (red) for the nonlinear transmission scenario.

Tables (2)

Tables Icon

Algorithm 1: P-EXIT analysis of the WD for a (J, K) regular SC-LDPC protograph.

Tables Icon

Table 1 System parameters

Equations (7)

Equations on this page are rendered with MathJax. Learn more.

v ( t , z ) z = α g ( z ) 2 v ( t , z ) j β 2 2 2 v ( t , z ) t 2 + j γ v ( t , z ) v ( t , z ) 2 + w ( t , z ) ,
f R k | S k ( r k | s k ) = 1 ( π P N ) 2 exp ( r k ζ s k 2 P N ) ,
l i , k log f R k | B i , k ( r k | 0 ) f R k | B i , k ( r k | 1 ) = log s 𝒳 i , 0 f R k | S k ( r k | s ) s 𝒳 i , 1 f R k | S k ( r k | s ) ,
P ( ) = ( P ( ) | 0 0 3 1 1 3 ) , P ( = 0 ) = ( 1 2 0 0 0 0 3 1 1 1 0 1 2 2 1 )
P [ T ] = ( P 0 P 1 P 0 P m s P 1 P m s ) T times .
A opt = argmin A 𝒜 m × n ρ * ( A ) ,
A * = argmin A 𝒜 m × n l s ( A , ρ ) .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.