Article

A Vision for 5G Channel Coding

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Channel coding is a vital but complex component of cellular communication systems, which is used for correcting the communication errors that are caused by noise, interference and poor signal strength. The turbo code was selected as the main channel code in 3G and 4G cellular systems, but the 3GPP standardization group is currently debating whether it should be replaced by the Low Density Parity Check (LDPC) code in 5G. This debate is being driven by the requirements for 5G, which include throughputs of up to 20 Gbps in the downlink to user devices, ultra-low latencies, as well as much greater flexibility to support diverse use-cases, including broadband data, Internet of Things (IoT), vehicular communications and cloud computing. In our previous white paper, we demonstrated that flexible turbo codes can achieve these requirements with superior hardware- and energy-efficiencies than flexible LDPC decoders. However, the proponents of LDPC codes have highlighted that inflexible LDPC decoders can achieve throughputs of 20 Gbps with particularly attractive hardware- and energy- efficiencies. This white paper outlines a vision for 5G, in which channel coding is provided by a flexible turbo code for most use-cases, but which is supported by an inflexible LDPC code for 20 Gbps downlink use-cases, such as fixed wireless broadband. We demonstrate that this approach can meet all of the 5G requirements, while offering hardware- and energy-efficiencies that are significantly better than those of an LDPC-only solution. Furthermore, the proposed approach benefits from synergy with the 3G and 4G turbo code, as well as a significantly faster time-to-market for 5G. These benefits translate to a 5G that is significantly more capable, significantly easier to deploy and significantly lower cost.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Thus, the antennas used for 5G mobile communication require compact and lightweight designs with high gain, directivity, and efficiency [1]. In addition to mobile communication, 5G technology is also expected to usher in great advancements in the fields of Internet of Things (IoT), autonomous vehicles, medical devices, smart homes, etc. through intelligent use of techniques like beamforming, massive MIMO (multiple-input and multiple-output), small cells, polar and LPDC channel coding [2]. These new techniques as well as design challenges different from 4G networks have resulted in 5G antenna design becoming one of the newest topics of interest in antenna engineering among researchers. ...
... The length of the antenna has been calculated following equation (2). Where is the effective length of the patch antenna and is given by And ∆L is the length extension and can be represented as ∆L = In equations (2.1) and (2.2), some new parameters can be seen that were not presented in equation (1). ...
Conference Paper
Full-text available
In this paper, a low-profile slotted microstrip patch antenna with an operating bandwidth of 34.093GHz - 38.607GHz has been proposed. The antenna has been simulated using Computer Simulation Technology Microwave Studio (CST MWS), using annealed lossy copper for the ground and patch layers while employing lossy Rogers RT5880 as the dielectric substrate material. Antenna feeding was done through a microstrip line, and a comb-shaped slot was cut out from the conducting patch layer. The simulated results for the design report a return loss of approximately -22.13 dB at the resonant frequency of 37.18 GHz, a main lobe gain of 5.9468 dBi, and efficiency of 84.47%. Additionally, the VSWR value is 1.1698 at the resonant frequency and within the acceptable range of 0 to 2 everywhere else over the working bandwidth. Comparison of the simulation with existing literature suggests that the performance of the proposed antenna achieves the requirements for fifth-generation 5G mobile network applications
... One family of ECC that have had great impact on wireless standards is the convolutional codes (CC). Specifically, tailbiting convolutional codes (TBCC) [2] were incorporated in 4G Long-Term Evolution (LTE) standard [3], and are also considered for 5G hybrid turbo/LDPC codes based frameworks [4]. ...
... First, a forward pass of a CVA is executed on the input word , as in Eq. (4). Since all states are equiprobable, the initialization is chosen as λ 1 (s) = 0, ∀s ∈ S instead of Eq. (5). ...
... One family of ECC that have had great impact on wireless standards is the convolutional codes (CC). Specifically, tailbiting convolutional codes (TBCC) [2] were incorporated in 4G Long-Term Evolution (LTE) standard [3], and are also considered for 5G hybrid turbo/LDPC codes based frameworks [4]. ...
... First, a forward pass of a CVA is executed on the input word , as in Eq. (4). Since all states are equiprobable, the initialization is chosen as λ 1 (s) = 0, ∀s ∈ S instead of Eq. (5). ...
Preprint
Full-text available
Tail-biting convolutional codes extend the classical zero-termination convolutional codes: Both encoding schemes force the equality of start and end states, but under the tail-biting each state is a valid termination. This paper proposes a machine-learning approach to improve the state-of-the-art decoding of tail-biting codes, focusing on the widely employed short length regime as in the LTE standard. This standard also includes a CRC code. First, we parameterize the circular Viterbi algorithm, a baseline decoder that exploits the circular nature of the underlying trellis. An ensemble combines multiple such weighted decoders, each decoder specializes in decoding words from a specific region of the channel words' distribution. A region corresponds to a subset of termination states; the ensemble covers the entire states space. A non-learnable gating satisfies two goals: it filters easily decoded words and mitigates the overhead of executing multiple weighted decoders. The CRC criterion is employed to choose only a subset of experts for decoding purpose. Our method achieves FER improvement of up to 0.75dB over the CVA in the waterfall region for multiple code lengths, adding negligible computational complexity compared to the circular Viterbi algorithm in high SNRs.
... In cellular communication systems, wireless transmissions is used to transfer data between mobile devices and structures, where the latter acts as transmission gates on the Internet and telephone networks [8]. However, the received data is usually different from the data transmitted, due to communication errors caused by noise, interference or weak signal strength. ...
... Each scheme differs from the other in several parameters and according to each use case such as block error rate (BLER)performance and computational complexity, Code construction parameters, number of iterations, and list sizes and decoding algorithms and other more [9]. However, decoding is the main concern when designing the channel code because it is more complex than the channel encoder since it must overcome the uncertainty resulting from noise, interference, and fading channel [8]. ...
Conference Paper
Full-text available
Tradeoff between high reliability and low latency communication considered one of important emerging area in 5G wireless communication. And the URLLC service is arguably the most challenging and problematic. This is mainly because URLLC should satisfy two conflicting requirements low latency and ultra-high reliability. So that some applications require latencies less than 1ms and packet, error rates as low as 10− 9 at same time. Therefore new techniques need to be devised to meet the stringent tradeoffs between latency and reliability requirements for URLLC. There are several ways to provide the requirements of this service including channel coding where it plays significant roles to guarantee requirements of ultra-high reliability and low latency in which is required to correct transmission errors that are caused by noise, interference and poor signal strength. Many coding schemes are discussed (Turbo, Polar, LDPC and convolutional codes), which can be potentially used in the next generation mobile communication systems and use to ensure the tradeoff URLLC. In this paper we will investigate the performance of LDPC code in 5G communication, and their ability to achieve the required trade-off between reliability and latency in same time by evaluates the block error rate (BLER) performance of different codes with different message length N and with different number of iterations, on an AWGN channel with BPSK modulation.
... Power domain Resource allocation [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35] Energy harvesting and transfer [36][37][38][39][40][41][42][43][44][45][46][47][48][49] Interference cancellation techniques [50][51][52][53][54][55] Sleep/wake modes [56][57][58][59][60] Code domain Sparse code multiple access (SCMA) [61,62] Space time block coding (STBC) [56,63] Polar codes [64][65][66] Low density parity check (LDPC) [67][68][69] Multi user shared access (MUSA) [70,71] Additionally, the basic principles of NOMA and energy efficient NOMA are also discussed and the recent research works and challenges incorporating green concept are revisited and the possible future directions are presented. Hence, in-depth the recent state of art for energy efficiency for NOMA based networks are presented in the proceeding section. ...
... Polar codes and LDPC have been proposed as the optimal error correction mechanisms for emerging 5G [64,67] and here we propose the research work which is useful in implementing energy efficiency under channel coding for NOMA based networks [65,66]. Energy efficient LDPC designs have been addressed in [68,69] which can be utilized for NOMA networks to enhance energy performance. ...
Article
Full-text available
Energy efficiency is a major concern in the emerging mobile cellular wireless networks since massive connectivity is to be expected with high energy requirements from the network operators. Non-orthogonal multiple access (NOMA) being the frontier multiple access scheme for 5G, there exists numerous research attempts on enhancing the energy efficiency of NOMA enabled wireless networks while maintaining its outstanding performance metrics such as high throughput, data rates and capacity maximized optimally.The concept of green NOMA is introduced in a generalized manner to identify the energy efficient NOMA schemes. These schemes will result in an optimal scenario in which the energy generated for communication is managed sustainably. Hence, the effect on the environment, economy, living beings, etc is minimized. The recent research developments are classified for a better understanding of areas which are lacking attention and needs further improvement. Also, the performance comparison of energy efficient, NOMA schemes against conventional NOMA is presented. Finally, challenges and emerging research trends, for energy efficient NOMA are discussed.
... In 3G and 4G cellular communication systems, turbo codes are used as the channel code however in 3GPP (3rd Generation Partnership Project) standardization systems it is debating of either using LDPC codes or Polar Codes. The decision will be made according to the requirements including up to 20 Gbps of throughput in the downlink (DL) comparing to 1Gbps in 4G systems, very low amount of latencies, and more flexibility in order to offer more supports regarding broadband data, Internet of Thing (IoT), vehicular communication and cloud computing [21]. ...
Article
Full-text available
Improving data transmission over wireless channels has been the main obsession for many researchers for years. In this paper, we give a clear study of polar codes and channel polarization which produces these codes. Moreover extracting polar codes in three commom channels are studied. These channels are Binary Erasure Channel (BEC), Binary Symmetric Channel (BSC) and Additive White Gaussian Noise (AWGN) channel. Decoding information via polar codes is done by many methods, however we give details about four common methods. Comparing between these methods is done according to system’s complexity, Block Error Rate (BLER). Since Shannon has discovered his theorem of information transmission, a lot of work has been done to attain his limit nevertheless no one has succeeded. Polar codes are the first provably codes that arrive to near Shannon’s limits of capacity therefore they have most of researchers’ interest to be studied in 5G systems. As 5G systems require significant improvements in channel capacity, polar codes are promising technique that have ability to offer required improvements. In this study, we give details about trial system of 5G encider and decoder with polar codes.
... One family of ECC that has had great impact on wireless standards is the convolutional codes (CC). Specifically, tail-biting convolutional codes (TBCC) [2] were incorporated in the 4G Long-Term Evolution (LTE) standard [3], and they are also considered for 5G hybrid turbo/LDPC code-based frameworks [4]. ...
Article
Full-text available
Tail-biting convolutional codes extend the classical zero-termination convolutional codes: Both encoding schemes force the equality of start and end states, but under the tail-biting each state is a valid termination. This paper proposes a machine learning approach to improve the state-of-the-art decoding of tail-biting codes, focusing on the widely employed short length regime as in the LTE standard. This standard also includes a CRC code. First, we parameterize the circular Viterbi algorithm, a baseline decoder that exploits the circular nature of the underlying trellis. An ensemble combines multiple such weighted decoders, and each decoder specializes in decoding words from a specific region of the channel words’ distribution. A region corresponds to a subset of termination states; the ensemble covers the entire states space. A non-learnable gating satisfies two goals: it filters easily decoded words and mitigates the overhead of executing multiple weighted decoders. The CRC criterion is employed to choose only a subset of experts for decoding purpose. Our method achieves FER improvement of up to 0.75 dB over the CVA in the waterfall region for multiple code lengths, adding negligible computational complexity compared to the circular Viterbi algorithm in high signal-to-noise ratios (SNRs).
... etc. Moreover, LDPC codes have been proposed as a potential candidate for 5G cellular system [Mau16]. ...
Thesis
Future networks will become more dense and heterogeneous due to the inevitable increase in the number of communicated devices and the coexistence of numerous independent networks. One of the consequences is the significant increase in interference. Many studies have shown the impulsive nature of such an interference that is characterized by the presence of high amplitudes during short time durations. In fact, this undesirable phenomenon cannot be captured by the Gaussian model but more properly by heavy-tailed distributions. Beyond networks, impulsive noises are also found in other contexts. They can be generated naturally or be man-made. Systems lose their robustness when the environment changes, as the design takes too much into account the specificities of the model. The problem is that most of the communication systems implemented are based on the Gaussian assumption.Several techniques have been developed to limit the impact of interference, such as interference alignment at the physical layer or simultaneous transmission avoidance techniques like CSMA at the MAC layer. Finally, other methods try to suppress them effectively at the receiver as the successive interference cancellation (SIC). However, all these techniques cannot completely cancel interference. This is all the more true sincewe are heading towards dense networks such as LoRa, Sigfox, 5G or in general the internet of things (IoT) networks without centralized control or access to theradio resources or emission powers. Therefore, taking into account the presence of interference at the receiver level becomes a necessity, or even an obligation.Robust communication is necessary and making a decision at the receiver requires an evaluation of the log-likelihood ratio (LLR), whose derivation depends on the noise distribution. In the presence of additive white Gaussian noise (AWGN) the performance of digital communication schemes has been widely studied, optimized and simply implemented thanks to the linear-based receiver. In impulsive noise, the LLR is not linear anymore and it is computationally prohibitive or even impossible when the noise distribution is not known. Besides, the traditional linear behaviour of the optimal receiver exhibits a significant performance loss. In this study, we focus on designing a simple, adaptive and robust receiver that exhibits a near-optimal performance over Gaussian and non-Gaussian environments. The receiver must strive for universality by adapting automatically and without assistance in real conditions.We prove in this thesis that a simple module between the channel output and the decoder input allows effectively to combat the noise and interference that disrupt point-to-point (P2P) communications in a network. This module can be used as a front end of any LLR-based decoder and it does not require the knowledge of the noise distribution including both thermal noise and interference. This module consists of a LLR approximation selected in a parametric family of functions, flexible enough to be able to represent many communication contexts (Gaussian or non-Gaussian).Then, the judicious use of an information theory criterion allows to search effectively for the LLR approximation function that matches the channel state. Two different methods are proposed and investigated for this search, either using supervised learning or with an unsupervised approach. We show that it is even possible to use such a scheme for short packet communications with a performance close to the true LLR, which is computationally prohibitive. Overall, we believe that our findings can significantly contribute to many communication scenarios and will be desired in different networks wireless or wired, point to point or dense networks.
... A protograph is a Tanner graph which is repeat to make a bigger graph. Protograph [7] construction is way of constructing parity check matrix. First de ne the base matrix or photo matrix which is expanded to get the actual parity check. ...
Preprint
Full-text available
Modern error controlling codes, like a Low-Density Parity Check (LDPC) codes, assume a significant job in a next-generation wireless system like 5G for improved channel error controlling ability. Execution of Turbo codes(3G), Polar codes(4G) and LDPC (5G) codes are near to Shannon’s limit channel codes and in this manner are being utilized in next-generation wireless communication systems. This paper emphasis around modern cellular cell network, LDPC codes and their performance using EXIT chart is presented. Likewise, a similar exhibition assessment of LDPC codes and the decisions of error controlling codes for the future generation cell systems are talked about in the paper. Such an investigation will be helpful in the choice of legitimate LDPC codes for the next-generation wireless communication system.
... For instance, they have been adopted in several recent communication standards, such as 802.11n (Wi-Fi) [44], 802.11ad (WiGig) [43], 802.16e (WiMAX) [46], 802.15.3c (WPAN) [45], and DVB-S2 [31], and are being considered for a range of application areas, from optical networks to digital storage [50]. Moreover, LDPC codes have been proposed as a potential candidate for 5G cellular system [68]. ...
Thesis
Full-text available
The increasing demand of massive data rates in wireless communication systems will require significantly higher processing speed of the baseband signal, as compared to conventional solutions. This is especially challenging for Forward Error Correction (FEC) mechanisms, since FEC decoding is one of the most computationally intensive baseband processing tasks, consuming a large amount of hardware resources and energy. The conventional approach to increase throughput is to use massively parallel architectures. In this context, Low-Density Parity-Check (LDPC) codes are recognized as the foremost solution, due to the intrinsic capacity of their decoders to accommodate various degrees of parallelism. They have found extensive applications in modern communication systems, due to their excellent decoding performance, high throughput capabilities, and power efficiency, and have been adopted in several recent communication standards.This thesis focuses on cost-effective, high-throughput hardware implementations of LDPC decoders, through exploiting the robustness of message-passing decoding algorithms to computing inaccuracies. It aims at providing new approaches to cost/throughput optimizations, through the use of imprecise computing and storage mechanisms, without jeopardizing the error correction performance of the LDPC code. To do so, imprecise processing within the iterative message-passing decoder is considered in conjunction with the quantization process that provides the finite-precision information to the decoder. Thus, we first investigate a low complexity code and decoder aware quantizer, which is shown to closely approach the performance of the quantizer with decision levels optimized through exhaustive search, and then propose several imprecise designs of Min-Sum (MS)-based decoders. Proposed imprecise designs are aimed at reducing the size of the memory and interconnect blocks, which are known to dominate the overall area/delay performance of the hardware design. Several approaches are proposed, which allow storing the exchanged messages using a lower precision than that used by the processing units, thus facilitating significant reductions of the memory and interconnect blocks, with even better or only slight degradation of the error correction performance.We propose two new decoding algorithms and hardware implementations, obtained by introducing two levels of impreciseness in the Offset MS (OMS) decoding: the Partially OMS (POMS), which performs only partially the offset correction, and the Imprecise Partially OMS (I-POMS), which introduces a further level of impreciseness in the check-node processing unit. FPGA implementation results show that they can achieve significant throughput increase with respect to the OMS, while providing very close decoding performance, despite the impreciseness introduced in the processing units.We further introduce a new approach for hardware efficient LDPC decoder design, referred to as Non-Surjective Finite-Alphabet Iterative Decoders (FAIDs). NS-FAIDs are optimized by Density Evolution for regular and irregular LDPC codes. Optimization results reveal different possible trade-offs between decoding performance and hardware implementation efficiency. To validate the promises of optimized NS-FAIDs in terms of hardware implementation benefits, we propose three high-throughput hardware architectures, integrating NS-FAIDs decoding kernels. Implementation results on both FPGA and ASIC technology show that NS-FAIDs allow significant improvements in terms of both throughput and hardware resources consumption, as compared to the Min-Sum decoder, with even better or only slightly degraded decoding performance.
Article
Full-text available
Apariția tehnologiilor 5G a inaugurat o nouă eră a conectivității, promițând viteze mai rapide, latență mai mică și posibilități fără precedent pentru diverse industrii și viața de zi cu zi. Fiind a cincea generație de tehnologie wireless, 5G reprezintă un salt înainte semnificativ față de predecesorii săi, 4G și 3G. Evoluția tehnologiei a fost marcată de salturi transformatoare, iar tehnologia 5G este o dovadă a acestui progres continuu. 5G promite să revoluționeze modul în care ne conectăm, comunicăm și desfășurăm afaceri. Acest eseu analizează complexitățile tehnologiei 5G, caracteristicile cheie, beneficiile, provocările și implicațiile tehnologiilor 5G, explorând impactul său potențial asupra diferitelor sectoare și abordând unele dintre provocările și preocupările asociate cu implementarea acesteia.
Article
Security is a critical issue in Internet of Things (IoT) networks and it has been under investigation by researchers worldwide. Different from other wireless networks, IoT networks suffer from conventional security mechanisms due to complexity and resource consumption which cannot be tolerated in IoT networks. Among the recently proposed security schemes for IoT networks is the tag-embedding message authentication scheme in which a tag is embedded to the modulated message and concurrently sent over the same channel. Although it has avoided significant resource expenditure, its performance still requires improvement especially in terms of immunity against nearby eavesdroppers. In this article, a novel scheme is proposed that is able to enhance the authentication rate and the tag confidentiality without inducing any extra requirements. The proposed scheme implies performing tag puncturing at the transmitter side where only a part of the tag is embedded to the message based on the instantaneous channel phase. The performance of the proposed scheme is mathematically analyzed where the authentication failure probability is derived in closed-form expression, and compared to the conventional tag-embedding scheme.
Article
Full-text available
In the near future, i.e, beyond 4G, some of the prime objectives or demands that need tobe addressed are increased capacity, improved data rate, decreased latency, and betterquality of service. To meet these demands, drastic improvements need to be made incellular network architecture. This paper presents the results of a detailed survey on thefifth generation (5G) cellular network architecture and some of the key emergingtechnologies that are helpful in improving the architecture and meeting the demands ofusers. In this detailed survey, the prime focus is on the 5G cellular network architecture,massive multiple input multiple output technology, and device-to-device communication(D2D). Along with this, some of the emerging technologies that are addressed in thispaper include interference management, spectrum sharing with cognitive radio, ultra-dense networks, multi-radio access technology association, full duplex radios, millimeterwave solutions for 5G cellular networks, and cloud technologies for 5G radio accessnetworks and software defined networks. In this paper, a general probable 5G cellularnetwork architecture is proposed, which shows that D2D, small cell access points,network cloud, and the Internet of Things can be a part of 5G cellular network architecture.A detailed survey is included regarding current research projects being conducted indifferent countries by research groups and institutions that are working on 5Gtechnologies (PDF) Effects of Environment for using 5G (5G Electromagnetic Radiation) Prepare by. Available from: https://www.researchgate.net/publication/359742917_Effects_of_Environment_for_using_5G_5G_Electromagnetic_Radiation_Prepare_by [accessed Apr 05 2022].
Chapter
Turbo Codes and Tail Biting Convolutional Codes are used for channel coding in LTE, but these codes are not pertinent in 5G. For Channel coding, advanced error correction techniques are required for the 5G. Polar codes are adopted for control information and LDPC codes are required for Data information for the 5G. Various coding techniques such as LDPC codes, Quasi Cyclic (QC)-LDPC codes, Non-Binary (NB)-LDPC codes, Spatially Coupled (SC)-LDPC codes, Irregular Repeat Accumulate (IRA) codes, Polar codes, Distributed CRC Aided (DCA) codes, and Fountain codes are illustrated. For Decoding Min-Sum Algorithm and Belief Propagation are used for LDPC codes. Min-Sum, OMS, NMS, BP methods are applied in QC-LDPC codes. SC, SCL, FSCL, CASCL, BP algorithms implemented for Polar codes. Simulation of QC-LDPC codes, Polar codes, and LDPC codes are generated by using MATLAB Software. The performance of all channel coding techniques with consideration to BER and BLER is mentioned.
ResearchGate has not been able to resolve any references for this publication.