8
Published in IET Communications Received on 23rd December 2013 Revised on 25th March 2014 Accepted on 1st May 2014 doi: 10.1049/iet-com.2013.1168 ISSN 1751-8628 Unequal error protection by partial superposition transmission using low-density parity-check codes Kechao Huang 1 , Chulong Liang 1 , Xiao Ma 1 , Baoming Bai 2 1 Department of Electronics and Communication Engineering, Sun Yat-sen University, Guangzhou 510275, Peoples Republic of China 2 State Key Laboratory of ISN, Xidian University, Xian 710071, Peoples Republic of China E-mail: [email protected] Abstract: In this study, the authors consider designing low-density parity-check (LDPC) coded modulation systems to achieve unequal error protection (UEP). They propose a new UEP approach by partial superposition transmission (PST) called UEP-by- PST. In the UEP-by-PST system, the information sequence is distinguished as two parts, the more important data (MID) and the less important data (LID), both of which are coded with LDPC codes. The codeword that corresponds to the MID is superimposed on the codeword that corresponds to the LID. The system performance can be analysed by using discretised density evolution. Also proposed in this study is a criterion from a practical point of view to compare the efciencies of different UEP approaches. Numerical results show that, over both additive white Gaussian noise channels and uncorrelated Rayleigh fading channels, (i) UEP-by-PST provides higher coding gain for the MID compared with the traditional equal error protection approach, but with negligible performance loss for the LID; and (ii) UEP-by-PST is more efcient with the proposed practical criterion than the UEP approach in the digital video broadcasting system. 1 Introduction In many practical communication systems such as wireless networks, control applications and interactive systems, data can be partitioned into several parts that have different degrees of signicance. For example, in wireless communication system, headers of the medium access control frame such as frame control, duration and address are more important than the frame body, because an error in the header may lead to the rejection of the frame while errors in the frame body are usually tolerable. Traditional equal error protection (EEP) approach is usually not the most efcient way to guarantee the quality of the important data. Hence unequal error protection (UEP) is required to make the best use of the resources (say bandwidth). A practical approach to achieving UEP is based on modulation. In [1], the author introduced a UEP approach based on a non-uniform arrangement of the signal constellation, also known as multiresolution modulation [2] or hierarchical modulation [3]. In such a constellation, more important bits in a constellation symbol have larger minimum Euclidian distance than less important bits. In [4], a UEP approach using uniformly spaced constellation was proposed, where different bits in a constellation symbol have different average number of nearest neighbours. However, these UEP approaches can achieve only a limited number of UEP levels for a given constellation. More recently, the authors of [5] proposed a method of achieving arbitrarily large number of UEP levels by using multiplexed hierarchical quadrature amplitude modulation (QAM) constellations. An alternative approach to achieving UEP is based on channel coding. In this approach, more powerful error-correction coding is applied to the more important data (MID) than the less important data (LID). UEP codes were rstly introduced by Masnick and Wolf [6]. In [7], the authors found all the cyclic UEP codes of odd length up to 65 by computer searching. In [8], a UEP approach using rate-compatible punctured convolutional (RCPC) codes was proposed whereby the more important bits were punctured less frequently than the less important bits. In [9], turbo codes were employed for UEP in the same way as RCPC codes. Research on UEP low-density parity-check (LDPC) codes can be found in [1013]. In [1012], UEP LDPC codes were constructed by designing the variable node degree distribution of the code in an irregular way. In [13], the authors proposed a new class of UEP LDPC codes based on Plotkin-type constructions. In order to provide more efcient UEP, error-correction coding and modulation can be jointly used [14, 15]. These methods based on channel coding and/or modulation have been widely used for image and layered video transmission [1621]. To the best of our knowledge, all the existing UEP approaches improve the performance of the MID by sacricing the performance of the LID. Another issue is that no simple criteria were mentioned in the literatures to compare the efciencies of different UEP approaches. In this paper, motivated by recent work on constructing long codes from short codes by block Markov superposition transmission [22], we propose a new approach for UEP by partial superposition transmission (referred to as UEP-by-PST www.ietdl.org 2348 & The Institution of Engineering and Technology 2014 IET Commun., 2014, Vol. 8, Iss. 13, pp. 23482355 doi: 10.1049/iet-com.2013.1168

Unequal error protection by partial superposition transmission using low-density parity-check codes

  • Upload
    baoming

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

www.ietdl.org

2&

Published in IET CommunicationsReceived on 23rd December 2013Revised on 25th March 2014Accepted on 1st May 2014doi: 10.1049/iet-com.2013.1168

348The Institution of Engineering and Technology 2014

ISSN 1751-8628

Unequal error protection by partial superpositiontransmission using low-density parity-check codesKechao Huang1, Chulong Liang1, Xiao Ma1, Baoming Bai2

1Department of Electronics and Communication Engineering, Sun Yat-sen University, Guangzhou 510275,

People’s Republic of China2State Key Laboratory of ISN, Xidian University, Xi’an 710071, People’s Republic of China

E-mail: [email protected]

Abstract: In this study, the authors consider designing low-density parity-check (LDPC) coded modulation systems to achieveunequal error protection (UEP). They propose a new UEP approach by partial superposition transmission (PST) called UEP-by-PST. In the UEP-by-PST system, the information sequence is distinguished as two parts, the more important data (MID) and theless important data (LID), both of which are coded with LDPC codes. The codeword that corresponds to the MID is superimposedon the codeword that corresponds to the LID. The system performance can be analysed by using discretised density evolution.Also proposed in this study is a criterion from a practical point of view to compare the efficiencies of different UEP approaches.Numerical results show that, over both additive white Gaussian noise channels and uncorrelated Rayleigh fading channels,(i) UEP-by-PST provides higher coding gain for the MID compared with the traditional equal error protection approach, butwith negligible performance loss for the LID; and (ii) UEP-by-PST is more efficient with the proposed practical criterion thanthe UEP approach in the digital video broadcasting system.

1 Introduction

In many practical communication systems such as wirelessnetworks, control applications and interactive systems, datacan be partitioned into several parts that have differentdegrees of significance. For example, in wirelesscommunication system, headers of the medium accesscontrol frame such as frame control, duration and addressare more important than the frame body, because an error inthe header may lead to the rejection of the frame whileerrors in the frame body are usually tolerable. Traditionalequal error protection (EEP) approach is usually not themost efficient way to guarantee the quality of the importantdata. Hence unequal error protection (UEP) is required tomake the best use of the resources (say bandwidth).A practical approach to achieving UEP is based on

modulation. In [1], the author introduced a UEP approachbased on a non-uniform arrangement of the signalconstellation, also known as multiresolution modulation [2]or hierarchical modulation [3]. In such a constellation, moreimportant bits in a constellation symbol have larger minimumEuclidian distance than less important bits. In [4], a UEPapproach using uniformly spaced constellation was proposed,where different bits in a constellation symbol have differentaverage number of nearest neighbours. However, these UEPapproaches can achieve only a limited number of UEP levelsfor a given constellation. More recently, the authors of [5]proposed a method of achieving arbitrarily large number ofUEP levels by using multiplexed hierarchical quadratureamplitude modulation (QAM) constellations.

An alternative approach to achieving UEP is based onchannel coding. In this approach, more powerfulerror-correction coding is applied to the more importantdata (MID) than the less important data (LID). UEP codeswere firstly introduced by Masnick and Wolf [6]. In [7], theauthors found all the cyclic UEP codes of odd length up to65 by computer searching. In [8], a UEP approach usingrate-compatible punctured convolutional (RCPC) codes wasproposed whereby the more important bits were puncturedless frequently than the less important bits. In [9],turbo codes were employed for UEP in the same way asRCPC codes. Research on UEP low-density parity-check(LDPC) codes can be found in [10–13]. In [10–12], UEPLDPC codes were constructed by designing the variablenode degree distribution of the code in an irregular way. In[13], the authors proposed a new class of UEP LDPC codesbased on Plotkin-type constructions. In order to providemore efficient UEP, error-correction coding and modulationcan be jointly used [14, 15]. These methods based onchannel coding and/or modulation have been widely usedfor image and layered video transmission [16–21].To the best of our knowledge, all the existing UEP

approaches improve the performance of the MID bysacrificing the performance of the LID. Another issue isthat no simple criteria were mentioned in the literatures tocompare the efficiencies of different UEP approaches. Inthis paper, motivated by recent work on constructing longcodes from short codes by block Markov superpositiontransmission [22], we propose a new approach for UEP bypartial superposition transmission (referred to as UEP-by-PST

IET Commun., 2014, Vol. 8, Iss. 13, pp. 2348–2355doi: 10.1049/iet-com.2013.1168

www.ietdl.org

for convenience) using LDPC codes. In the UEP-by-PSTsystem, the information sequence is distinguished as twoparts, the MID and the LID, both of which are coded withbinary LDPC codes. The codeword that corresponds to theMID is superimposed on the codeword that corresponds tothe LID. The transmitted sequence consists of two parts.One is the codeword that corresponds to the MID, and theother is the superposition of the respective codewords thatcorrespond to the MID and the LID. We then propose adecoding algorithm of the UEP-by-PST system, which canbe described as an iterative message processing/passingalgorithm over a high level normal graph. Discretiseddensity evolution is conducted to predict the convergencethresholds for the MID and the LID of the UEP-by-PST.Simulation results verify our analysis and show that, overboth additive white Gaussian noise (AWGN) channels anduncorrelated Rayleigh fading channels, UEP-by-PSTprovides higher coding gain for the MID compared with thetraditional EEP approach, but with negligible performanceloss for the LID. To compare the UEP-by-PST with otherapproaches, we propose to use as a criterion the minimumsignal-to-noise ratio (SNR) that is required to guarantee thequalities of both the MID and the LID. Simulation resultsshow that, under this practical criterion, UEP-by-PSTprovides more efficient UEP compared with the UEPapproach in the digital video broadcasting (DVB) system[16], which is referred to as UEP-by-mapping in this paper.The rest of this paper is organised as follows. We present

the encoding and decoding algorithms of the UEP-by-PSTsystem in Section 2. In Section 3, we present theasymptotic performance analysis of the UEP-by-PST.Numerical results are provided in Section 4. Section 5concludes this paper.

2 UEP by partial superposition transmission

2.1 Encoding algorithm

Consider a binary LDPC code C[n, k] with dimension k andlength n, which is referred to as the basic code in this paperfor convenience. Assume that the information sequence ucan be equally grouped into L + 1 blocks

u = ( u(0), u(1), . . . , u(L) ) (1)

where u(0) and ( u(1), . . . , u(L) ) are the MID of length k andthe LID of length kL, respectively. The encoding algorithm ofthe UEP-by-PST is described as follows, see Fig. 1 forreference.

Algorithm 1: Encoding of the UEP-by-PST system

Fig. 1 Encoding structure of the UEP-by-PST system

IET Commun., 2014, Vol. 8, Iss. 13, pp. 2348–2355doi: 10.1049/iet-com.2013.1168

† Encoding: For 0 ≤ ℓ ≤ L, encode u(ℓ) into v(ℓ) [ Fn2 bythe (systematic) encoding algorithm of the basic code C.† Interleaving: For 1 ≤ ℓ ≤ L, interleave v(0) by the ℓthinterleaver Pℓ of size n into w(ℓ).† Superposition: For 1 ≤ ℓ ≤ L, compute c(ℓ) = w(ℓ) ⊕ v(ℓ),where ‘⊕’ represents component-wise modulo-2 addition.† Combining: Output sequence c = ( c(0) , c(1) , . . . , c(L) )of length N, where c(0) = v(0) and N = n(L + 1).

Remarks:

† In principle, the basic code C can be chosen as any othertypes of codes, such as convolutional codes and turbo-likecodes.† The basic code C can also be chosen as a UEP code. In thiscase, the proposed UEP-by-PST system provides multilevelUEP.† It is necessary to emphasise that the superposition isimplemented in the binary field instead of the real field.Hence the proposed UEP-by-PST system is different fromthe UEP based on superposition coded modulation (SCM)in [23, 24].† For the EEP approach considered in this paper, theencoded sequences v(ℓ) for 0 ≤ ℓ ≤ L are sent directly tothe modulator.

2.2 Decoding algorithm

The proposed UEP-by-PST system can be represented by ahigh-level normal graph [25, 26]. In a general normalgraph, edges represent variables, while vertices representconstraints. As shown in Fig. 2, the normal graph of theUEP-by-PST system has four types of nodes: L + 1 nodes

of type a node of type , L nodes of type and L

nodes of type . Then the normal graphical realisation of

the UEP-by-PST system can be divided into L + 1 layers,

an MID layer and L LID layers, where the MID layer

consists of a node of type and a node of type ,

whereas each LID layer consists of a node of type , a

node of type and a node of type , see Fig. 2 forreference.A message associated with a discrete variable is defined as

its probability mass function (pmf) here. We focus on randomvariables defined over F2. For example, a message associatedwith a random variable X over F2 can be represented by a real

Fig. 2 Normal realisation of the UEP-by-PST system

2349& The Institution of Engineering and Technology 2014

www.ietdl.org

vector PX (x), x [ F2, such that PX(0) + PX(1) = 1. Let X be arandom variable corresponding to the edge connecting twovertices A and B. We use the notation P(A�B)

X (x), x [ F2[27] to indicate the direction of the message flow.To describe the algorithm more clearly, we introduce a

basic rule for message processing at an arbitrary node. LetA be a node connecting to Bj with random variables Zjdefined over F2(0 ≤ j ≤ d − 1), as shown in Fig. 3.Assume that all incoming messages are available, which are

denoted by P(Bj�A)Zj

(z), z [ F2. The node A, as a message

processor, delivers the outgoing message with respect toany given Zj by computing the likelihood function

P(A�Bj)Zj

(z)/ Pr{A is satisfied

|Zj = z}, z [ F2

(2)

Because the computation of the likelihood function is

irrelevant to the incoming message P(Bj�A)Zj

(z), we claim

that P(A�Bj)Zj

(z) is exactly the so-called extrinsic message.For simplicity, we assume that the codeword c of length N

is modulated and transmitted over a memoryless channel,resulting in a received vector y. In more general settings,we assume that the a posteriori probabilities Pr{Ci =0, 1|y}, 0≤ i <N are computable [The computation in thisstep is irrelevant to the code constraints but depends onlyon the modulation and the channel.], where Ci is the ithcomponent of C. Then, these a posteriori probabilities areused to initialise the decoding algorithm of the UEP-by-PST

P |�=( )C(0)j

(cj) = Pr{C(0)j = cj|y}, cj [ F2 (3)

for 0≤ j≤ n− 1, and

P |�+( )C(ℓ)j

(cnℓ+j) = Pr{C(ℓ)j = cnℓ+j|y}, cnℓ+j [ F2 (4)

for 0≤ j≤ n− 1 and 1 ≤ ℓ ≤ L, where ‘|→ = ’ and ‘|→ + ’are used to indicate that the messages are from the channel.The iterative decoding algorithm of the UEP-by-PST can

be described as an iterative message processing/passingalgorithm over a high-level normal graph scheduled asfollows, see Fig. 2 for reference.

Algorithm 2: Iterative decoding of the UEP-by-PST system

† Initialisation: All messages over the intermediate edgesare initialised as uniformly distributed variables. Initialisethe messages P |�=( )

C(0) c(0)( )

and P |�+( )C(ℓ) c(ℓ)

( )for 1 ≤ ℓ ≤ L

according to (3) and (4), respectively. Select a maximumlocal iteration number Imax > 0 and a maximum globaliteration number Jmax > 0. Set J = 0.

Fig. 3 A generic node A as a message processor

2350& The Institution of Engineering and Technology 2014

† Iteration: While J < Jmax

(1) The MID layer performs a message processing/passingalgorithm scheduled as

In the above procedure, the message processor at each nodetakes as input all available messages from connecting edgesand delivers as output extrinsic messages to connecting

edges. The node performs the sum–product algorithm[28] with maximum local iteration number Imax to computethe extrinsic messages.

(2) For 1 ≤ ℓ ≤ L, the ℓth LID layer performs a messageprocessing/passing algorithm scheduled as

(3) For 0 ≤ ℓ ≤ L, compute the full messages PV (ℓ) v(ℓ)( )

as

PV (ℓ) v(ℓ)( )/ P C�=( )

V (0) v(0)( )

P =�C( )V (0) v(0)

( ), ℓ = 0

P C�+( )V (ℓ) v(ℓ)

( )P +�C( )V (ℓ) v(ℓ)

( ), 1 ≤ ℓ ≤ L

⎧⎨⎩

(5)

then make hard decisions on v(ℓ) resulting in v(ℓ); if all v(ℓ) arevalid codewords, declare the decoding successful, output u(ℓ)

for 0 ≤ ℓ ≤ L, and exit the iteration.

(4) Increment J by one.

† Failure report: If J = Jmax, output u(ℓ) for 0 ≤ ℓ ≤ L and

report a decoding failure.

3 Asymptotic performance analysis

Density evolution, which was developed by Richardson andUrbanke [29], is an effective analysis tool for computingthe noise tolerance thresholds and optimising degreesequences [30] of LDPC codes. In this section, discretiseddensity evolution [31] is conducted to predict theconvergence thresholds for the MID and the LID of theUEP-by-PST.Assume that all-zeros codeword c is transmitted over

the AWGN channel with binary phase-shift keying (BPSK)modulation and noise variance σ2. To describe the densityevolution, it is convenient to represent the message as inits equivalent form, the so-called log-likelihood ratio(LLR). For example, the message computed in (2) can bedenoted as

L(A�Bj)Zj

D logP(A�Bj)Zj

(0)

P(A�Bj)Zj

(1)

⎛⎝

⎞⎠ (6)

IET Commun., 2014, Vol. 8, Iss. 13, pp. 2348–2355doi: 10.1049/iet-com.2013.1168

Table 1 Thresholds of the UEP-by-PST based on densityevolution

Threshold (Eb/N0) UEP-by-PST EEP

L = 1 L = 2 L = 3

MID, dB 0.80 0.61 0.47 1.11LID, dB 1.17 1.17 1.17

www.ietdl.org

The LLR messages from the channel can be computed as [32]

L(C)D logPr{C = 0|y}Pr{C = 1|y}

( )

= 2

s2y

(7)

Consider the quantised function

Q(x)D

−(2b−1 − 1) · D, x

D≤ −(2b−1 − 1)

x

D

[ ]· D, −(2b−1 − 1) ,

x

D, 2b−1 − 1

(2b−1 − 1) · D, x

D≥ 2b−1 − 1

⎧⎪⎪⎪⎪⎨⎪⎪⎪⎪⎩

(8)

where b is the quantisation bit, Δ is the quantisation intervaland [w] denotes the nearest integer to the real w.Assume that the interleaversPℓ are very large and random.

With this assumption, we can investigate the ensemble of theUEP-by-PST system.

† At node , the message updating rule is the same as

shown in [31]. After a fixed number of local iterations Imax,

we can obtain the extrinsic messages L C�=( )V (0) , L C�+( )

V (ℓ) for

1 ≤ ℓ ≤ L and their corresponding pmfs PL C�=( )V (0)

, PL C�+( )V (ℓ)

for

1 ≤ ℓ ≤ L, respectively. We can also compute the fullmessages LV (ℓ) and their corresponding pmfs PLV (ℓ)

for0 ≤ ℓ ≤ L.† At node , the message updating rule is the same as thatof the variable node in a binary LDPC code.† At node , the message updating rule is similar to that ofthe check node in a binary LDPC code. The only difference isthat the messages associated with the half edge are availablefrom the channel observations.

In summary, for a given parameter L and a local iterationnumber Imax, we can iteratively update the pmfs PLV (ℓ)

for0 ≤ ℓ ≤ L according to the decoding procedure scheduled as

Therefore, we may determine (by commonly-usedone-dimensional search) the minimum Eb/N0 such that thebit-error rate (BER) for the MID (or the LID) tends to zeroas the number of global iterations tends to infinity.

4 Numerical results

In this section, we first give the thresholds of the UEP-by-PSTby using the discretised density evolution techniques. Thenwe compare the BER performance of the UEP-by-PST withthose of the traditional EEP approach over AWGN channelsand uncorrelated Rayleigh fading channels. For theuncorrelated Rayleigh fading channels, we assume that thechannel state information is available at the receiver.Finally, we compare the UEP-by-PST and theUEP-by-mapping in the DVB system from a practical pointof view.

IET Commun., 2014, Vol. 8, Iss. 13, pp. 2348–2355doi: 10.1049/iet-com.2013.1168

4.1 Thresholds of UEP-by-PST

Example 1: Consider a random (3, 6) regular LDPC code [33]with rate 1/2 for the basic code C. The local iteration numberImax for LDPC decoding process is 50. The quantisationinterval Δ = 25/512 with 10-bit quantisation. Table 1 givesthe convergence thresholds for the MID and the LID of theUEP-by-PST with BPSK signalling over AWGN channels.Also included in the table is the threshold of the traditionalEEP approach. It can be seen that the thresholds for theLID with different L (1, 2 and 3) are the same [Actually,variations can be found if five decimal places are used.].The gap of the thresholds for the MID between L = 1 andL = 2 is 0.19 dB, while that of the MID between L = 2 andL = 3 is 0.14 dB. From these thresholds, we can see that,UEP-by-PST theoretically provides higher coding gain forthe MID compared with the traditional EEP approach, butwith negligible performance loss for the LID.

4.2 Performance of UEP-by-PST

In the following examples, L random interleavers, each of sizen, are used for encoding. The iterative decoding algorithm ofthe UEP-by-PST is implemented with maximum globaliteration number Jmax = 20 and maximum local iterationnumber Imax = 50, while the iterative decoding algorithm ofthe traditional EEP approach is implemented withmaximum iteration number 100.

Example 2: Consider a random (3, 6) regular LDPC code [33]with length 1024 for the basic code C. The BER performancesof the UEP-by-PST with BPSK signalling over AWGNchannels and uncorrelated Rayleigh fading channels areshown in Figs. 4 and 5, respectively. From Figs. 4 and 5,we can see that, over both AWGN channels anduncorrelated Rayleigh fading channels, UEP-by-PSTprovides higher coding gain for the MID compared with thetraditional EEP approach, but with negligible performanceloss for the LID. For example, at BER = 10−5,

† over AWGN channels, UEP-by-PST achieves about 0.7,1.0 and 1.1 dB extra coding gain for the MID comparedwith the traditional EEP approach when L = 1, 2 and 3,respectively;† over uncorrelated Rayleigh fading channels, UEP-by-PSTachieves about 1.0, 1.3 and 1.4 dB extra coding gain for theMID compared with the traditional EEP approach whenL = 1, 2 and 3, respectively.

Example 3: Consider a random (3, 6) regular LDPC code withlength 10 000 for the basic code C. The BER performances ofthe UEP-by-PST with BPSK signalling over AWGN channelsand uncorrelated Rayleigh fading channels are shown inFigs. 6 and 7, respectively. From Figs. 6 and 7, we can seethat, over both AWGN channels and uncorrelated Rayleigh

2351& The Institution of Engineering and Technology 2014

Fig. 5 Performances of the UEP-by-PST with BPSK signallingover uncorrelated Rayleigh fading channels in Example 2. Thebasic code is a random (3, 6) regular LDPC code with length 1024

Fig. 7 Performances of the UEP-by-PST with BPSK signallingover uncorrelated Rayleigh fading channels in Example 3. Thebasic code is a random (3, 6) regular LDPC code with length 10 000

Fig. 6 Performances of the UEP-by-PST with BPSK signallingover AWGN channels in Example 3. The basic code is a random(3, 6) regular LDPC code with length 10 000

Fig. 4 Performances of the UEP-by-PST with BPSK signallingover AWGN channels in Example 2. The basic code is a random(3, 6) regular LDPC code with length 1024

www.ietdl.org

fading channels, UEP-by-PST provides higher coding gainfor the MID compared with the traditional EEP approach,but with negligible performance loss for the LID. Forexample, at BER = 10−4,

† over AWGN channels, UEP-by-PST achieves about 0.4,0.6 and 0.7 dB extra coding gain for the MID comparedwith the traditional EEP approach when L = 1, 2 and 3,respectively;† over uncorrelated Rayleigh fading channels, UEP-by-PSTachieves about 0.4, 0.7 and 0.9 dB extra coding gain for theMID compared with the traditional EEP approach whenL = 1, 2 and 3, respectively.

Example 4: Consider an IEEE 802.11n LDPC code [34] withlength 1944 and rate 1/2 for the basic code C The BERperformances of the UEP-by-PST with BPSK signallingover AWGN channels and uncorrelated Rayleigh fadingchannels are shown in Figs. 8 and 9, respectively.

2352& The Institution of Engineering and Technology 2014

From Figs. 8 and 9, we can see that, over both AWGN channelsand uncorrelated Rayleigh fading channels, UEP-by-PSTprovides higher coding gain for the MID compared with thetraditional EEP approach, but with negligible performanceloss for the LID. For example, at BER = 10−5, over bothAWGN channels and uncorrelated Rayleigh fading channels,UEP-by-PST achieves about 0.3 dB extra coding gain for theMID compared with the traditional EEP approach, but withnegligible performance loss for the LID.

Remarks:

† From Figs. 4 and 6, we can see that the extra coding gainsat BER = 10−5 for the MID are similar to those at BER→ 0 aspredicted in Table 1 by the discretised density evolution. Wecan also see that the performance loss for the LID isnegligible, again as predicted by the discretised densityevolution.

IET Commun., 2014, Vol. 8, Iss. 13, pp. 2348–2355doi: 10.1049/iet-com.2013.1168

Fig. 9 Performances of the UEP-by-PST with BPSK signallingover uncorrelated Rayleigh fading channels in Example 4. Thebasic code is an IEEE 802.11n LDPC code with length 1944 and

Fig. 8 Performances of the UEP-by-PST with BPSK signallingover AWGN channels in Example 4. The basic code is an IEEE802.11n LDPC code with length 1944 and rate 1/2

www.ietdl.org

rate 1/2

4.3 Comparison between UEP-by-PST andUEP-by-mapping

In the following example, we consider a 16-QAM mappingscheme used in the DVB system [16]. The mapping and its

Fig. 10 16-QAM mapping and the corresponding bit patterns

IET Commun., 2014, Vol. 8, Iss. 13, pp. 2348–2355doi: 10.1049/iet-com.2013.1168

corresponding bit patterns are shown in Fig. 10. In thismapping, if the transmitted signal has a label whose mth bitis ‘0’, then an error occurs in the mth bit if the receivedsignal falls in the shaded region. As pointed out byAydınlık and Salehi [15], in such a 16-QAM mappingscheme, the average number of nearest neighbours for bit 0,1, 2 and 3 are 0.5, 0.5, 1.0 and 1.0, respectively. The firsttwo bits are more protected than the last two bits.Apparently, this 16-QAM mapping can provide two levelsof UEP. In the UEP-by-mapping, u(ℓ) for 0 ≤ ℓ ≤ L areencoded into c(ℓ) by the encoding algorithm of the basiccode C and then sent to the modulator.Assume that L = 3. In the UEP-by-PST, only the partial

superposition transmission contributes to UEP. Bits of thecodeword c(0) and those of the codewords ( c(1) , . . . , c(L) )are transmitted in separate signalling intervals. That is, inthe UEP-by-PST system, one 16-QAM signal point carrieseither four bits from the codeword c(0) or four bits fromthe codewords ( c(1) , . . . , c(L)). In contrast, in theUEP-by-mapping used in the DVB system [16], only themapping contributes to UEP. That is, a bit of the codewordc(0) and three bits of the codewords ( c(1) , . . . , c(L)) aremapped into one 16-QAM signal point, using the first bitposition and the last three bit positions, respectively.

Example 5: Consider the same random (3, 6) regular LDPCcode with length 1024 used in Example 2 for the basic codeC. The BER performances of the UEP approaches(UEP-by-PST and UEP-by-mapping) with 16-QAM overAWGN channels and uncorrelated Rayleigh fading channelsare shown in Figs. 11 and 12, respectively. The curvelabelled ‘EEP’ shows the performance of the traditional EEPapproach. From Figs. 11 and 12, we can see that, over bothAWGN channels and uncorrelated Rayleigh fading channels,

† UEP-by-PST provides higher coding gain for the MIDcompared with the traditional EEP approach while causesnegligible performance loss for the LID;† UEP-by-mapping provides higher coding gain for the MIDcompared with the traditional EEP approach but degrades theperformance of the LID.

For example, at BER = 10−5, over both AWGN channels anduncorrelated Rayleigh fading channels,

† UEP-by-PST achieves about 1.5 dB extra coding gain forthe MID compared with the traditional EEP approach, butwith negligible performance loss for the LID;† UEP-by-mapping achieves about 2.4 dB extra coding gainfor the MID compared with the traditional EEP approach bysacrificing about 1.0 dB coding gain for the LID.

2353& The Institution of Engineering and Technology 2014

Fig. 12 Simulation results of the UEP-by-PST andUEP-by-Mapping with 16-QAM over uncorrelated Rayleigh fadingchannels in Example 5. The basic code is a random (3, 6) regularLDPC code with length 1024. The parameter L = 3

Table 2 Minimum SNR’s required by the UEP approaches

Minimum SNR EEP UEP-by-mapping UEP-by-PST

AWGN, dB 5.4 4.9 3.9Rayleigh, dB 7.9 7.0 6.4

Fig. 11 Simulation results of the UEP-by-PST andUEP-by-mapping with 16-QAM over AWGN channels in Example5. The basic code is a random (3, 6) regular LDPC code withlength 1024. The parameter L = 3

www.ietdl.org

From Figs. 11 and 12, we can see that, UEP-by-PST isbetter than UEP-by-mapping in terms of the LID, but worsethan UEP-by-mapping in terms of the MID. An interestingissue (but rarely mentioned in the literatures [In [23, 24], acriterion based on superposition gain was proposed tocompare UEP based on time-division-coded modulation andUEP based on SCM. However, this criterion cannot beapplied here directly since UEP-by-PST implements thesuperposition in the coded symbol field instead of thecoded signal field.]) is how to compare different UEPapproaches in terms of efficiency. To address this issue, wepropose the following criterion from a practical perspective.Assume that (ε0, ε1) are the error performance

requirements by the MID and the LID, respectively. Wedenote the minimum SNR required for the MID and theLID by SNR(ε0) and SNR(ε1), respectively. Thus, the

2354& The Institution of Engineering and Technology 2014

minimum SNR required for the UEP approach can becalculated as

SNRUEP = max SNR(10), SNR(11){ }

(9)

which specifies the minimum SNR required to guarantee thequalities of both the MID and the LID. Hence, it can be takenas a criterion to compare different UEP approaches.Assume that ε0≃ 10−5. From Figs. 11 and 12, we can see

that, over both AWGN channels and uncorrelated Rayleighfading channels, SNRUEP-by-PST > SNRUEP-by-mapping whenε1 > 1.0 × 10−1, whereas SNRUEP-by-PST < SNRUEP-by-mapping

when ε1 < 1.0 × 10−1. Suppose that we have an applicationthat requires ε0≃ 1.0 × 10−5 and ε1≃ 5.0 × 10−2. Table 2gives the minimum SNRs required by the UEP approachessuch that the error performance requirements (ε0, ε1) aresimultaneously satisfied. Also included in the table is theminimum SNR required by the traditional EEP approach.From Table 2, we can see that, for these parameters,

† UEP-by-PST performs 1.5 dB better than the traditionalEEP approach over both AWGN channels and uncorrelatedRayleigh fading channels;† UEP-by-PST performs 1.0 and 0.6 dB better thanUEP-by-mapping over AWGN channels and uncorrelatedRayleigh fading channels, respectively.

In summary, from a practical point of view, UEP-by-PST isan efficient approach to achieving UEP.

5 Conclusion

We have proposed a new UEP approach by partialsuperposition transmission using LDPC codes. Thepotential coding gain for the MID can be predicted bythe discretised density evolution, which also shows that theperformance loss is negligible for the LID. Simulationresults verified our analysis and showed that, over bothAWGN channels and uncorrelated Rayleigh fadingchannels, UEP-by-PST can provide higher coding gain forthe MID compared with the traditional EEP approach, butwith negligible performance loss for the LID. This isdifferent from the traditional UEP approaches that usuallydegrade the performance of the LID while improving theperformance of the MID. Simulation results also showedthat UEP-by-PST is more efficient than UEP-by-mapping inthe DVB system from a practical perspective by taking as acriterion the minimum SNR required to satisfysimultaneously the error performance requirements for boththe MID and the LID.

6 Acknowledgments

The authors would like to thank Mr. Shancheng Zhao fromSun Yat-sen University for useful discussions.

IET Commun., 2014, Vol. 8, Iss. 13, pp. 2348–2355doi: 10.1049/iet-com.2013.1168

www.ietdl.org

7 References

1 Wei, L.F.: ‘Coded modulation with unequal error protection’, IEEETrans. Commun., 1993, 10, (41), pp. 1439–1449

2 Ramchandran, K., Ortega, A., Uz, K.M., Vetterli, M.: ‘Multiresolutionbroadcast for digital HDTV using joint source/channel coding’, IEEEJ. Sel. Areas Commun., 1993, 1, (11), pp. 6–23

3 Morimoto, M., Okada, M., Komaki, S.: ‘A hierarchical imagetransmission system for multimedia mobile communication’. Proc.First Int. Workshop on Wireless Image/Video Communications,Loughborough, UK, September 1996, pp. 80–84

4 Morelos-Zaragoza, R., Fossorier, M., Lin, S., Imai, H.: ‘Multilevelcoded modulation for unequal error protection and multistagedecoding – Part I: Symmetric constellations’, IEEE Trans. Commun.,2000, 2, (48), pp. 204–213

5 Chang, S.-H., Rim, M., Cosman, P.C., Milstein, L.B.: ‘Optimizedunequal error protection using multiplexed hierarchical modulation’,IEEE Trans. Inf. Theory, 2012, 9, (58), pp. 5816–5840

6 Masnick, B., Wolf, J.: ‘On linear unequal error protection codes’, IEEETrans. Inf. Theory, 1967, 4, (3), pp. 600–607

7 Lin, M.-C., Lin, C.-C., Lin, S.: ‘Computer search for binary cyclic UEPcodes of odd length up to 65’, IEEE Trans. Inf. Theory, 1990, 4, (36),pp. 924–935

8 Hagenauer, J.: ‘Rate-compatible punctured convolutional codes (RCPCcodes) and their applications’, IEEE Trans. Commun., 1988, 4, (36),pp. 389–400

9 Barbulescu, A.S., Pietrobon, S.S.: ‘Rate compatible turbo codes’,Electron. Lett., 1995, 7, (31), pp. 535–536

10 Rahnavard, N., Fekri, F.: ‘Unequal error protection using low-densityparity-check codes’. Proc. IEEE Int. Symp. on Information Theory,Chicago, USA, June 2004, pp. 452

11 Rahnavard, N., Pishro-Nik, H., Fekri, F.: ‘Unequal error protection usingpartially regular LDPC codes’, IEEE Trans. Commun., 2007, 3, (55),pp. 387–391

12 Chen, X., Lau, F.C.M.: ‘Optimisation of low-density parity-check codeswith deterministic unequal error protection properties’, IET Commun.,2011, 11, (5), pp. 1560–1565

13 Kumar, V., Milenkovic, O.: ‘On unequal error protection LDPC codesbased on Plotkin-type constructions’, IEEE Trans. Commun., 2006, 6,(54), pp. 994–1005

14 Aydınlık, M.: ‘Unequal error protecting turbo coded modulation:structure, design and performance bounds’, PhD thesis, NortheasternUniversity, 2004

15 Aydınlık, M., Salehi, M.: ‘Turbo coded modulation for unequal errorprotection’, IEEE Trans. Commun., 2008, 4, (56), pp. 555–564

16 ETSI EN 300 744 V1.5.1: ‘Digital Video Broadcasting (DVB); Framingstructure, channel coding and modulation for digital terrestrialtelevision’, 2004

17 Barmada, B., Ghandi, M.M., Jones, E.V., Ghanbari, M.: ‘Prioritizedtransmission of data partitioned H.264 video with hierarchical QAM’,IEEE Signal Process. Lett., 2005, 8, (12), pp. 577–580

IET Commun., 2014, Vol. 8, Iss. 13, pp. 2348–2355doi: 10.1049/iet-com.2013.1168

18 von Deetzen, N., Henkel, W.: ‘Unequal error protection multilevel codesand hierarchical modulation for multimedia transmission’. Proc. IEEEInt. Symp. on Information Theory, Toronto, Canada, July 2008,pp. 2237–2241

19 Khan, M.A., Moinuddin, A.A., Khan, E., Ghanbari, M.: ‘Reliabletransmission of wavelet-based scalable video over wireless networksusing cross-layer approach’, IET Commun., 2010, 11, (4),pp. 1325–1336

20 Chung, W.-H., Paluri, S., Kumar, S., Nagaraj, S., Matyjas, J.D.:‘Unequal error protection for H.264 video using RCPC codes andhierarchical QAM’. Proc. IEEE Int. Conf. on Communications, CapeTown, South Africa, May 2010, pp. 1–6

21 Zhang, W., Shao, X., Torki, M., HajShirMohammadi, A., Bajic, I.V.:‘Unequal error protection of JPEG2000 images using short blocklength turbo codes’, IEEE Commun. Lett., 2011, 6, (15), pp. 659–661

22 Ma, X., Liang, C., Huang, K., Zhuang, Q.: ‘Obtaining extra coding gainfor short codes by block Markov superposition transmission’. Proc.IEEE Int. Symp. on Information Theory, Istanbul, Turkey, July 2013,pp. 2054–2058

23 Gadkari, S., Rose, K.: ‘Time-division versus superposition codedmodulation schemes for unequal error protection’, IEEE Trans.Commun., 1999, 3, (47), pp. 370–379

24 Pellenz, M.E., Portugheis, J.: ‘On the analysis of the performance ofcoded modulation schemes for unequal error protection’, IEEE Trans.Commun., 2002, 8, (50), pp. 1205–1208

25 Forney, G.D.Jr.: ‘Codes on graphs: normal realizations’, IEEE Trans.Inf. Theory, 2001, 2, (47), pp. 520–548

26 Ma, X., Ping, L.: ‘Coded modulation using superimposed binary codes’,IEEE Trans. Inf. Theory, 2004, 12, (50), pp. 3331–3343

27 Ma, X., Zhang, K., Chen, H., Bai, B.: ‘Low complexity X-EMSalgorithms for nonbinary LDPC codes’, IEEE Trans. Commun., 2012,1, (60), pp. 9–13

28 Kschischang, F.R., Frey, B.J., Loeliger, H.-A.: ‘Factor graphs and thesum-product algorithm’, IEEE Trans. Inf. Theory, 2001, 2, (47),pp. 498–519

29 Richardson, T.J., Urbanke, R.L.: ‘The capacity of low-densityparity-check codes under message-passing decoding’, IEEE Trans. Inf.Theory, 2001, 2, (47), pp. 599–618

30 Richardson, T.J., Shokrollahiand, M.A., Urbanke, R.L.: ‘Design ofcapacity-approaching irregular low-density parity-check codes’, IEEETrans. Inf. Theory, 2001, 2, (47), pp. 619–637

31 Chung, S.-Y., Forney, G.D.Jr., Richardson, T., Urbanke, R.: ‘On thedesign of low-density parity-check codes within 0.0045 dB of theShannon limit’, IEEE Commun. Lett., 2001, 2, (5), pp. 58–60

32 Moon, T.K.: ‘Error correction coding: mathematical methods andalgorithms’ (Wiley-Interscience, New Jersey, 2005)

33 Gallager, R.G.: ‘Low-density parity-check codes’ (MIT Press,Cambridge, MA, 1963)

34 IEEE P802.11n/D10: ‘Draft IEEE standard for local metropolitannetworks-specific requirements-Part 11: Wireless LAN medium accesscontrol (MAC) and physical layer (PHY) specifications:Enhancements for higher throughput’, 2006

2355& The Institution of Engineering and Technology 2014