Sunteți pe pagina 1din 13

TEN BRINK LAYOUT 8/3/06 1:27 PM Page 18

A D VA N C E S I N S M A RT A N T E N N A S

CODING OVER SPACE AND TIME FOR


WIRELESS SYSTEMS
STEPHAN TEN BRINK, REALTEK SEMICONDUCTOR CORP.

ABSTRACT Gaussian noise (AWGN) channel in the power-


limited regime, coding for the wireless channel, in
Source
In wireless communications, channel coding particular for the multiple-input multiple-output
is used to combat impairments such as noise or (MIMO) channel at high spectral efficiency, is
fading. Redundant information is added at the still an active area of research.
ode transmitter, to enable reliable detection and The time-varying nature of the wireless chan-
de Channel
de encoder
Chann
decoding of the message at the receiver. With nel requires that we exploit the concept of diver-
b the advent of multiple-antenna techniques, cod- sity: An information bit entering the channel
ing for the wireless channel has become an encoder should be mapped into all dimensions
attractive topic of research. Several original available (e.g., time, frequency, and space) to
erleaver Π schemes have been devised over the past decade achieve maximal robustness against fades and
that benefit particularly well from the added bursts of interference. Through the channel code,
-QAM spatial dimension: clever space-time diversity one information bit is “diffused” into many coded
and/or
Channel mappings, coined “space-time coding,” increase bits; through a space-time code, one such coded
apper the reliability of the wireless link, while “spatial bit is further spread over several modulation
and/or mapper
Channmultiplexing” and its corresponding demultiplex- symbols, which in turn are transmitted over sepa-
on
ing and detection algorithms achieve high data rate antennas and thus undergo different fades.
With the advent of rates at unprecedented spectral efficiencies. The There are a number of ways to achieve this; and
combination of channel coding with numerous one of the most interesting aspects is where and
multiple-antenna variations and mixtures of the above poses inter- how to add redundancy to get the most in return.
techniques, coding esting design challenges. In this article we,
admittedly, take a more channel-coding-centric
This article is organized as follows. We first
introduce capacity limits and spectrally efficient
for the wireless view of a wireless communication link, and out- modulation, followed by a brief overview of pop-
line the current state of the art as well as future ular channel coding schemes. We then discuss
channel has become trends in coding over space and time. different multiple-antenna techniques in view of
channel coding, and illustrate these concepts for
an attractive topic of the case of the wireless local area network
INTRODUCTION (WLAN) system IEEE 802.11n [2], which pro-
research. Several Channel coding, sometimes also referred to as vides a rich example of space-time processing
original schemes error control coding, is an essential requirement
for reliable information transmission in any digital
pertaining to the physical layer. We conclude by
providing an outlook on some future develop-
have been devised communication system. A channel encoder maps ments in the field.
source information bit sequences into coded bit
over the past decade sequences (codewords) that are further modulat-
CODING FOR RELIABLE COMMUNICATION
ed and transmitted over the communication chan-
that benefit nel. The code rate R is the ratio of information The AWGN channel has become for coding and
sequence length K and actually transmitted code- information theory what the fruit fly is for genet-
particularly well from word length N. Typical values range from 1/6…1/3 ic research: Its simplicity makes it accessible to
the added spatial for deep space applications, over 1/3…3/4 for
mobile communications, up to 0.86…0.93 for
analytic study, yet it models many real-world
channels, like noise in cable transmission or the
dimension. optical channels with almost no redundant infor- deep space channel, accurately enough to derive
mation being added. Shannon’s famous channel meaningful results, such as coding schemes.
coding theorem [1] states that reliable (i.e., error- Shannon showed that a channel can be character-
free) communication is possible for long codes ized by a single parameter, the capacity C, which,
provided that the code rate does not exceed the for a complex-valued AWGN channel Y = X +
capacity of the channel. The statistical properties N writes as C = log2(1 + Es/N0). The term Es/N0
of the channel determine its capacity. Coding the- denotes the signal-to-noise ratio (SNR) per chan-
ory is about finding “good” codes, that is, codes nel symbol, with Es being the power of X and N0
of reasonable complexity that can approach the the power of N. Before Shannon’s concept of
capacity limit closely. While this challenge has channel capacity, engineers assumed that to
been met for simple cases like the additive white achieve reliable communication one has to

18 1536-1284/06/$20.00 © 2006 IEEE IEEE Wireless Communications • August 2006


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 19

6 6

64-QAM
64-QAM

5 5

ayleigh)
Unattainable

it (R
region

Spectral efficiency (bandpass-signal) (b/s/Hz)

N)
capacity lim

WG
N)
16-QAM 16-QAM

WG

it (A
4 4
Channel capacity C (bits)

it (A

y li m
lim

acit
MIMO 4x4
y
acit

Cap
Cap

64-QAM
3 3 turbo

16-QAM
QPSK limit turbo QPSK
2 2
Uncoded Uncoded

R = 1/2
convolutional
Repetition code code Repetition code
R = 1/2 R = 1/2
1 1

1/3 8 Memory 2 1/3


QPSK
turbo
1/8 1/8
0 0
-4 0 4 8 12 16 20 24 -2 0 2 4 6 8 10 12 14 16 18
Es/N0 (dB) Eb/N0 (dB)

■ Figure 1. Capacity, spectral efficiency, and coding realizations.

increase the transmit power Es (i.e., increase the


SNR) or repeat the message. There seemed to be which a bit error rate (BER) of 10–5 is achieved.
an unavoidable trade-off between reliability and Obviously, repetition coding allows us to operate
the information rate of the transmission. at lower SNR, Es/N0. However, plotting the spec-
Shannon proved this assumption to be wrong. tral efficiency chart (Fig. 1, right) using the rate-
Instead, arbitrarily reliable communication is normalized SNR (per information bit) Eb/N0 =
possible as long as the information rate R ⋅ M is (Es/N0)/(RM) reveals that a repetition code does
smaller than the capacity C of the channel. R not bring us any closer to capacity. There is no
stands for the code rate, and M for the number coding gain; that is, there is no improvement in
of coded bits conveyed per channel use. In other power efficiency with respect to an uncoded sys-
words, the noise on the channel does not com- tem. Moreover, we lose spectral efficiency. We
promise the quality of the transmission, as long should therefore use repetition coding carefully.
as R ⋅ M < C is fulfilled. The way to get close to
capacity is channel coding, which needs to add POWER-LIMITED REGIME
just enough redundancy to the transmitted mes- At low SNR or low spectral efficiency, the trans-
sage to satisfy the above condition. mit power is the limited resource. In wireless
The left chart in Fig. 1 shows the Gaussian communications the deep space channel and
capacity limit and several information limits for ultrawideband channel (3.1–10.6 GHz) fall into
modulation schemes with a finite number of this category. Several useful insights can be gained
amplitude levels (i.e., that convey a maximal from the figure: Uncoded communication is more
number of M bits per channel use). There are than 9 dB away from the capacity limit at a BER
several reasons that the maximal constellation of 10–5, leaving plenty of room for improvement
size is limited in a practical system implementa- through coding. Binary antipodal modulation
tion: stringent constraints on transmit amplifier ± Es
linearity, finite digital-to-analog/analog-to-digital
converter (DAC/ADC) resolution, or restrictions (binary phase shift keying, BPSK, per real-dimen-
in detection complexity, to mention just a few. sion, i.e., quadrature phase shift keying, QPSK,
The effect of repeating symbols is also shown in over bandpass channels) thus, binary coding is
the figure, with a marker plotted at the SNR at sufficient to get cand lose to the limit. One sym-

IEEE Wireless Communications • August 2006 19


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 20

bol on the channel corresponds to one coded bit Multilevel Coding — In MLC the QAM symbol
The choice of the (per real dimension). The detection at the receiv- channel is partitioned into M parallel bit chan-
er is trivial, using a matched filter that directly nels, implicitly defined by the bit labeling of the
right channel feeds its soft information output to the outer 2M–QAM constellation. For each bit channel, a
channel decoder. The ultimate Shannon limit is at maximal information rate can be derived; more-
interface, i.e., the E b/N 0 = –1.59 dB, and no matter how low of a over, it can be shown that the sum of the indi-
coding rate we use, we will not be able to achieve vidual information rates is equal to the maximal
mapping of binary reliable communication below that Eb/N0. For ref- information rate of the corresponding QAM
codes to the erence, the performance of several coding
schemes is plotted at a BER of 10–5. Binary con-
channel. Thus, channel coding is reduced to cod-
ing over M binary channels with appropriately
communication volutional codes are characterized by the memory chosen code rates. This strategy can approach
of the code; increasing the memory from 2 to 8, capacity; however, the handling of different cod-
channel, and the as shown in the figure, improves the coding gain, ing rates appears to be inconvenient in practice.
but the decoder complexity grows exponentially.
corresponding With the discovery of turbo codes [3] in 1993 it Bit-Interleaved Coded Modulation — Figure 2 depicts
became possible to approach the AWGN capacity a communication link using BICM. The output
demapping strategy very closely by concatenating simple component of a single channel encoder is bit-interleaved and
at the receiver, codes and using an iterative decoding strategy. mapped onto a QAM constellation. The bit inter-
leaving can be thought of as performing an aver-
is a central BANDWIDTH-LIMITED REGIME aging over different bit channels defined by the
At high SNR or high spectral efficiency, the constellation labeling, resulting in a single effec-
question in digital bandwidth is the precious resource, as usually is tive information rate. Each codeword experiences
the case in wireless cellular systems. For the a maximal number of possible states of the chan-
communications, power-limited case, we were able to simply map nel, approaching the desirable case of an ergodic
the binary coded sequence to antipodal signals. channel, which ensures robust performance. It
even more so when Now, to achieve higher spectral efficiency per can be shown that BICM can operate close to
communicating using transmitted symbol we need to use a larger signal
alphabet, based on either nonbinary codes or
the capacity limit provided that Gray labeling is
used. With Gray labeling, neighboring constella-
multiple antennas. grouping several coded bits of a binary code into tion points differ by only one binary digit. Thanks
one symbol on the channel. Typically, using bina- to the bit interleaver, BICM performs quite well
ry codes is the preferred way, as several efficient over fading channels, which makes it a popular
hardware architectures for encoding and decod- choice for wireless communications. In fact, most
ing are readily available. With multi-amplitude cellular systems as well as satellite and wireless
modulation like pulse amplitude modulation networking systems employ BICM.
(PAM) for real and quadrature amplitude modu- All of the above modulation strategies can be
lation (QAM) for complex (bandpass) signals, we combined with MIMO techniques. As we will
can communicate M b/symbol using 2M/2 ampli- see, BICM in particular is very easy to extend to
tude levels per real dimension (“spectrally effi- the MIMO channel. A first hint of the potential
cient modulation”). The mapping of the binary capacity increase of communicating using multi-
code to the multi-signal-level channel input is not ple antennas (four transmit and receive anten-
straightforward, and several approaches have nas) is given in Fig. 1.
been devised, such as trellis-coded modulation
(TCM), multilevel coding (MLC), and bit-inter- ADAPTIVE MODULATION AND RATE TABLE
leaved coded modulation (BICM) [4, references
therein]. While demapping was trivial for the With impairments such as fading, multiuser
BPSK/QPSK case, there might be several ways of interference, and bursts of noise, the wireless
demapping the signal at the receiver when using communication channel is a much more chal-
multiple amplitude levels, with different complex- lenging transmission medium than cable or the
ity/performance trade-offs. The choice of the idealized AWGN channel. To account for the
right channel interface (i.e., the mapping of binary time- and location-varying behavior of the wire-
codes to the communication channel) and the less channel, many wireless systems support rate
corresponding demapping strategy (also referred control by adaptive modulation — the most sim-
to as detection) at the receiver is a central ques- ple form of feedback. A modulation/coding
tion in digital communications, even more so scheme table (MCS, also referred to as rate
when communicating using multiple antennas. table) defines different combinations of code
rate and modulation rate, with different SNR
Trellis-Coded Modulation — In TCM, channel coding requirements. Depending on the current channel
and modulation are viewed as a single entity, with condition, as reported back from the receiver,
dedicated bit labelings and encoders that generate the transmitter chooses the appropriate MCS
multilevel signals, separating codewords in entry. From Fig. 1 we can infer a few guidelines
Euclidean space rather than in Hamming space as for the design of an MCS table:
is most relevant for binary antipodal (BPSK) trans- • For coding rates of less than about 3/4, the
mission. The added redundancy simply expands QAM input-constrained mutual information
the constellation size to achieve coding gain; thus, limit incurs hardly any loss compared to the
spectral efficiency is increased at no bandwidth capacity limit.
expansion. TCM has turned out to be a highly suc- • A high modulation rate (e.g., 64-QAM) should
cessful technique, and is widely used in voiceband not be used in combination with a low coding
modem standards ITU-T V.32–V.34. It is consid- rate (e.g., rate 1/3), as this would unnecessari-
ered to be the first successful application of chan- ly increase the complexity of the detection, as
nel coding to spectrally efficient modulation. well as put more demanding constraints on

20 IEEE Wireless Communications • August 2006


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 21

Discovered by
Source Sink P. Elias in 1954,
convolutional codes
Video decoder
Convolutional code
or turbo code Channel Channel or iterative turbo became the
encoder decoder decoder or iterative
or LDPC code Channel as seen
by channel code
LDPC decoder workhorses of
channel coding
Iterative detection
Π–1
Bit interleaver Π Π and decoding for wireless
QAM or vector-QAM
and/or
QAM communications:
Channel Channel with ZF, MMSE,
space/time mapper
and/or mapper demapper APP SMX and/or
space/time-combiner
they operate from
Channel as seen
subset selection by channel interface and/or subset
selection and/or deep space, increase
MRC
the reliability of
Matrix cellular radio,
channel +
H and allow us to
Additive connect to the
NT NR noise
Internet through
■ Figure 2. Communication link with channel coding and different channel interfaces.
WLAN/WPAN.
RF linearity than actually required for com- most prominent results of this effort are the
munication at the respective information rate. codes discovered by I. S. Reed and G. Solomon,
In WLAN IEEE 802.11a, which is a single-anten- with the corresponding algebraic decoding algo-
na system, the MCS table has only eight entries rithm by E. R. Berlekamp and J. L. Massey.
[5]. Obviously, with the inclusion of MIMO tech- Most properties of linear block codes were well
niques, the MCS table has to grow with the num- understood at the beginning of the 1970s.
ber of different antenna modes possible. And
indeed, the high-rate successor system 802.11n [2], CONVOLUTIONAL CODES
which uses MIMO techniques, has more than 100 Discovered by P. Elias in 1954, convolutional
entries, varying from simple non-MIMO/single- codes became the workhorses of channel coding
antenna modes to four spatial streams (transmit for wireless communications: they operate from
antennas), even supporting a different modulation deep space, increase the reliability of cellular
rate per antenna — a complexity increase that has radio — Global System for Mobile Communica-
to be taken into account in system design. tions (GSM), code-division multiple access
(CDMA), Universal Mobile Telecommunicaitons
System (UMTS) — and allow us to connect to
CHANNEL CODES AND THEIR DECODERS the internet through WLAN/WPAN. The encoder
LINEAR BLOCK CODES is a simple shift register with ν memory elements.
The optimal maximum likelihood decoding algo-
Binary linear block codes were the first error rithm was introduced by A. Viterbi in 1967, using
correcting codes, introduced by R. W. Hamming 2ν states per information bit, efficiently organized
in 1950 to improve the reliability of electrome- in a trellis structure. In view of the fact that
chanical computing machines [6]. They can be decoding of linear block codes was dominated by
described by a generator matrix G of dimension hard decision decoding at that time, the availabili-
K × N having binary entries, characterizing the ty of low-complexity soft-input decoding using the
encoding process, or a parity check matrix H of Viterbi algorithm did mean a big step forward.
dimension (K – N) × N, more naturally repre- With the new soft decoding paradigm, no hard
senting the decoding process. A codeword vector decisions need to be made after the demapper,
c is generated by c = uG, and for all codewords but soft values are passed on to the decoder,
c we have HcT = 0, and thus GHT = 0. A linear improving performance by 2–3 dB. The Viterbi
block code is characterized by the minimum algorithm offers an excellent performance/com-
Hamming distance d min, which corresponds to plexity trade-off when no close-to-capacity perfor-
the minimum number of differing digits between mance is required. The performance can be
any two codewords. Large d min means good improved by increasing the memory of the code;
asymptotic error correcting performance, and however, the decoding complexity grows exponen-
the early coding research of the 1950s and ’60s tially in the memory ν, making codes with big
almost exclusively focused on finding codes with memory unattractive for implementation. Table 1
large dmin. Linear block codes are based on sim- provides some further properties of convolutional
ple algebraic descriptions, lending themselves to codes and compares them to iteratively decodable
algebraic hard decision decoding. One of the codes, discussed in the following.

IEEE Wireless Communications • August 2006 21


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 22

ITERATIVE DECODING OF other decoder by their a posteriori decoding


result — a mechanism akin to a turbo engine.
CONCATENATED CODES
Code concatenation is a way to construct long Parallel Concatenated Codes — The encoder for paral-
powerful codes that can achieve big coding gains lel concatenated turbo codes uses two or more
while keeping the decoding complexity manage- convolutional codes of small memory, which are
able. It was first introduced by D. Forney in connected through a (pseudo-)random inter-
1966 for the case of serially concatenated codes leaver. The coded bit output of each encoder is
(SCCs), with an “inner” and an “outer” code multiplexed together with the information bit,
used in cascade. Inner and outer codes are comprising the codeword sent. Optimal decoding
decoded separately, resulting in much lower can be achieved by maximum likelihood decoding
complexity than maximum likelihood decoding of the concatenated code. However, due to the
of the entire concatenated code. The discovery random interleaver, the code loses its simple
of parallel concatenated codes (PCCs) and the structure, and the resulting trellis representation
corresponding iterative “turbo” decoding algo- would have a prohibitively large number of states.
rithm by C. Berrou et al. [3] in 1993 was the An easy way out is to use iterative decoding,
breakthrough of this technique; it started a new which is a suboptimal decoding strategy but much
era in error control coding. The component less complex. Each component code is decoded
decoders work individually on the received separately using a soft output decoder (APP or
noise-corrupted channel data; with each itera- BCJR decoding algorithm, see [7] for further ref-
tion, they exchange reliability information and erences). Soft reliability (extrinsic) information is
update the a priori knowledge of the respective exchanged between the component decoders.

Turbo codes (parallel, serial Low-density parity-check codes and


Convolutional codes
concatenation) repeat-accumulate codes

1953 P. Elias 1966 D. Forney (concatenated coding)


1962 R. G. Gallagher
Discovered 1967 A. Viterbi (efficient 1993 C. Berrou, A. Glavieux (turbo
Rediscovered 1995
decoding) code, iterative decoder)

Compact, by generator Compact, by generator polynomials, Sparse parity-check matrix (compact nota-
Code definition
polynomials interleaving rule tion possible through a “protograph”)

Encoder Linear (two shift registers, one


Linear (shift register) Quadratic (repeat-accumulate codes; linear)
complexity interleaver)

Decoder
Linear (BCJR algorithm), iterative
complexity over Linear (Viterbi algorithm) Linear (message passing), iterative decoding
decoding
message length

Simple puncturing of Optimized patterns, or simple pseudo- Simple puncturing results in performance
Different code
single mother code using random puncturing achieves good degradation; best complete parity-check
rates
optimized patterns performance matrix redesign

Less flexible; simple shortening, repetition


Different block Flexible, any length, requires change
Very flexible, any length may result in performance degradation;
length of interleaver
best: complete parity-check matrix redesign

Efficient, serial; or parallel Efficient, serial; or parallel through


Hardware Can be fully parallelized; most flexible
through windowing and windowing and overlapped
implementation area/clock rate trade-off
overlapped processing processing

AWGN 3 dB away from capacity < 1 dB from capacity for big block < 1 dB from capacity for big block lengths
performance for reasonable complexity lengths (104 or higher) (104 or higher)

Iterative Possible; LDPC code can be tuned to match


detection and Possible Possible detector behavior for improved
decoding performance

Convergence Not applicable Typically fast, eight iterations Typically more than 12 iterations

Ubiquitous for voice, data;


Popular for data communications; 3G
Real world examples include GSM,
cellular (UMTS, CDMA2000), satellite DVB-S2, WLAN 802.11n, WiMAX 802.16e,
wireless UMTS, IS-95, CDMA2000,
(DVB-RCS/RCT, Inmarsat, Eutelsat), next deep space CCSDS standard
applications DAB, DVB, WLAN 802.11,
deep space CCSDS
WPAN UWB, …

■ Table 1. Properties of channel codes for wireless communications.

22 IEEE Wireless Communications • August 2006


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 23

Turbo codes exhibit excellent error correction


capabilities, and allow operating close to the Iterative decoder
capacity limits for medium error probabilities, dv = 2
provided that large interleavers are used. + dc = 3

+ +
Serially Concatenated Codes — The classic serially con-
catenated code is composed of an inner convolu- +
tional code and an outer Reed-Solomon code, From +
connected by an interleaver. The interleaver channel +
breaks up bursts of errors at the Viterbi decoder (or demapper)
output, and the Reed-Solomon decoder tries to +
+
clean up any remaining errors. With the success of
+
iterative decoding of parallel concatenated codes,
similar schemes using inner and outer convolu- + +
tional codes were investigated. It quickly became
clear that many components in a digital communi- + dc = 4
cation system can be thought of as serial concate- dv = 1 Edge interleaving
nations, including processing elements such as
equalizers for intersymbol interference channels, N = 8 variable nodes N – K = 4 check nodes
or multiuser detectors. Using an appropriate itera- (repetition codes) (parity check codes)
tive decoding algorithm at the receiver (e.g., iter-
ating over an equalizer and a channel decoder) Parity check matrix
allows further performance improvement. 1 0 1 0 1 0 0 0

0 1 0 1 1 1 0 0
H(N–K)×N =
LOW-DENSITY PARITY-CHECK CODES 1 1 0 0 0 1 1 0
A low-density parity-check (LDPC) code [8, ref-
erences therein] is a linear block code described 0 0 1 1 0 0 1 1
by a parity-check matrix that is sparse (i.e., has
only a few entries set to one). Apart from special Concatenated encoder
subclasses, the code itself does not quite qualify K
as a concatenated code. However, due to the
sparseness of the parity-check matrix, LDPC + +
codes can be decoded efficiently using iterative
decoding, with a structure reminiscent of an iter- K + + N–K
ative decoder for serially concatenated codes. A + +
toy example for K = 4 is shown in Fig. 3. An
inner variable node decoder comprising N vari- + +
able nodes (which can be thought of decoders
for repetition codes) and an outer single parity- ■ Figure 3. Decoder of low-density parity-check (LDPC) code, parity-check
check node decoder performing N – K parity matrix, and encoder for repeat-accumulate (RA) codes, a subclass of LDPC
checks are connected through an edge inter- codes with linear encoding complexity.
leaver, exchanging soft reliability (extrinsic)
information to recover the transmitted message.
Code design is done by choosing variable node eral that it poses a serious design burden for
and check node degree distributions (i.e., a mix- implementation with respect to interconnection
ture of repetition code rates and single parity- network routing and memory size. Luckily, there
check code rates) governing the convergence of are plenty of parity-check matrices to choose
the iterative decoder. This can be accomplished from that describe codes with similar properties
using density evolution [8] or extrinsic informa- — so we can be picky, and select structures that
tion transfer (EXIT) charts [12]. For a regular simplify implementation while hardly degrading
LDPC code with variable node degree dν, corre- performance. For a protograph notation, the par-
sponding to a repetition code of rate 1/d ν, and ity-check matrix H is composed of square matri-
check node degree dc, corresponding to a single ces of dimension P × P. A typical value for P is
parity-check code of rate (dc – 1)/dc, the parity- 50. Each square matrix is either a “permutation
check matrix H has d ν ones per column and d c matrix” Ps, which is obtained from the identity
ones in each row. For an irregular LDPC code, matrix by s consecutive cyclic shifts, or a null
the values for dν and dc follow a certain distribu- matrix. Obviously, the corresponding protograph
tion obtained from code design to optimize the matrix H p provides a P-times more compact
convergence behavior of the iterative decoder. notation: For each permutation matrix only the
cyclic shift index s, with s = 0, …, P – 1, needs
Protograph Notation — The many degrees of free- to be stored. Dedicated hardware architectures
dom in designing LDPC codes, as well as a flexi- have been developed that can efficiently exploit
ble silicon-area vs. clock-frequency trade-off are the parallelism inherent to the protograph struc-
amongst the main reasons why they have attract- ture. An iterative decoding schedule that walks
ed a lot of interest in standardization groups along the rows or columns of Hp, while decoding
over the past few years. An LDPC decoder can P single parity check codes or repetition codes in
be fully parallelized in hardware. However, the parallel, was found to be particularly convenient.
description by a parity-check matrix H is so gen- This is sometimes referred to as “layered decod-

IEEE Wireless Communications • August 2006 23


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 24

The transmission ing.” Still, the definition of LDPC codes requires


much more ink and paper than convolutional
based on a simple feedback signal from the
receiver, indicating those antennas that con-
in wireless codes or turbo codes, as each code rate and tribute most to the received signal. Selecting one
block length require their own separate proto- or a subset of transmit/receive antennas does not
communication graph matrix definition. achieve gains over a multiple antenna AWGN
test channel. On fading channels, however, the
systems is typically Repeat-Accumulate Codes — The encoding operation typical gains range from 1 to 3 dB.
of LDPC codes c = uG is of quadratic complexi-
organized in packets, ty, as G is not sparse. Repeat-accumulate (RA) MAXIMUM RATIO COMBINING
with a training codes are a special subclass of LDPC codes with
linear encoding complexity. Their parity-check
For 1 × NR-situations, maximum ratio combining
(MRC) takes the NR received signals and performs
sequence at the matrix has a section with lower staircase structure, a coherent superposition, corresponding to optimal
which allows us to write the encoder as a concate- maximum likelihood detection. The rationale
beginning of the nation of an outer repetition code stage, an edge behind MRC is that the NR signals fade differently,
interleaver, a parity-check stage, and an inner and the probability of all being in a deep fade
packet, to allow for accumulator (differential encoder). It is, thus, not becomes smaller with increasing number of receive
surprising that most if not all LDPC codes that antennas. MRC requires full RF chains, with LNA,
channel estimation have been presented in standards so far are, in mixer, and ADC stage. The combination of the
and coherent fact, repeat-accumulate codes. Note that the
example in Fig. 3 is a repeat-accumulate code.
received signals is done in digital baseband, using
separate channel estimation for the respective sig-
detection at The field of channel coding has evolved over nal paths, resulting in coherent superposition of
more than 50 years, since the initial works of wanted signal, and noncoherent superposition of
the receiver. Shannon and Hamming. Powerful codes have the unwanted noise components. For NR = 2, the
been found that can approach the capacity limits gain on an AWGN test channel is 3 dB, going up
closely, and several viable methods of connecting to about 5 to 7 dB on fading channels.
binary codes with spectrally efficient modulation
are at the designer’s disposal. All we need to do SPATIAL MULTIPLEXING
in the subsequent sections is to apply these tech- In spatial multiplexing (SMX) [9–11], different
niques to the multiple antenna channel. information is transmitted simultaneously over
N T transmit antennas, increasing the data rate
at short distance, providing high spectral effi-
MULTIPLE ANTENNA TECHNIQUES ciency similar to increasing the constellation
The transmission in wireless communication sys- size, but without suffering from a power penal-
tems is typically organized in packets, with a train- ty. Spatial multiplexing is sometimes also
ing sequence (preamble) at the beginning of the referred to as direct transmission or simply
packet, to allow for channel estimation and coher- MIMO. The receiver has to decouple the N T
ent detection at the receiver. When the transmit- spatial streams to recover the transmitted infor-
ter is unaware of the channel and the receiver mation. Optimal detection tends to be complex,
does not feed back detailed phase and magnitude and several suboptimal low-complexity detec-
information, we speak of “open loop” transmis- tors have been devised, ranging from simple
sion which is considered in the remainder of this zero forcing to complex soft a posteriori proba-
section. It is a good match for the wireless MIMO bility (APP) detection.
channel which is time-varying, and the rate of The received signal can be written as y = Hs +
feeding back channel information might be high. n with s being the transmitted constellation vector
Multiple antennas can be used at the trans- of NT QAM symbols, H being the NR × NT matrix
mitter, the receiver, or at both ends of a wireless of channel coefficients, and n the NR × 1 vector of
communication link. There are different modes additive Gaussian noise. Spatial multiplexing can
of operation possible, and which is preferred be considered a vector-QAM, forming a com-
depends on SNR, channel conditions, and con- pound constellation symbol of 2M⋅NT signal points,
straints imposed on the system complexity. conveying information of M ⋅ NT b/channel use
Examples of open loop MIMO techniques over a matrix channel. In the following we consid-
include antenna subset selection, maximum ratio er suboptimal low-complexity spatial demappers
combining (MRC), spatial multiplexing (SMX), that decouple the output from the matrix channel
cyclic delay diversity (CDD), and space-time into individual spatial streams, which in turn are
block coding (STBC). further separated into multiple soft-bitstreams to
be sent to the outer channel decoder.
ANTENNA SUBSET SELECTION
A rather inexpensive method for benefiting from Linear Front-Ends — Zero forcing (ZF) is a low-
multiple antennas is to probe the power of all complexity method to separate the MIMO signal
NR receive antennas during preamble reception, into spatial streams by computing sest = Wy, with
and select the antenna that maximizes the “pseudo inverse” W = (H H H) –1 H H (N T × N R
received power for the remainder of the packet. matrix), and HH denoting the complex conjugate
Only simple radio frequency (RF) switches are transpose (hermitian) of H. The vector estimate
required, and only one rather than NR downcon- sest of the transmitted constellation vector can be
version chains (LNA, mixer, ADC stage), thus used to extract the soft bit metrics for the outer
reducing cost significantly. Instead of one, a sub- channel decoder. The noise enhancement at low
set of NR′ < NR receive antennas can be selected SNR can be reduced by using minimum mean
and used in combination with other methods of squared error (MMSE) estimation, taking into
MIMO communications. Antenna subset selec- account both noise and interference power. This
tion can also be applied at the transmit side, say, detector type can be extended to accept a priori

24 IEEE Wireless Communications • August 2006


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 25

values fed back from the outer channel decoder,


which allows iterative detection and decoding to
time code. This can offer diversity benefits
paired with ease of detection when there are
The extrinsic
be performed to regain some of the performance more transmit than receive antennas; this will information is
losses incurred compared to the optimal detector. become apparent as we continue our discussion.
Typically, horizontal encoding is done with a deinterleaved to
Successive Cancellation — A refinement of the specific detection scheme in mind. For each
above detector is successive cancellation, starting transmit antenna, a separate coded bit stream is become the a priori
with the strongest spatial stream and successively generated by a dedicated channel encoder. Dif-
subtracting out one by one until all spatial ferent channel coding and modulation rates can input to the outer
streams are separated. The hard decision perfor-
mance after the cancellation detector tends to be
be used, and the successive cancellation detector
can benefit from the outer channel decoding,
soft in/soft out
better than that of plain ZF/MMSE detection. providing more reliable decisions than those decoder which
However, error propagation due to successive right after the detector; however, the latency
cancellation limits the quality of the soft output. might be high. In vertical encoding, the output of calculates outer
a single channel encoder is bit-interleaved and
Maximum Likelihood and APP Detection — The maxi- distributed among the transmit antennas; this extrinsic information.
mum likelihood detector (MLD) enumerates appears to be the best method for capturing all
through all 2M⋅NT hypotheses on the transmitted spatial diversity offered by the channel, benefit- One iteration is
constellation vector ^ s , and picks the vector ^
s that ing from deeper interleaving across spatial sub- completed by
^ 2
minimizes the Euclidean distance ||y – Hs || . channels. A larger interleaver is also useful for
MLD minimizes the probability of making a vector concatenated coding and iterative decoding, re-interleaving the
error, and just produces hard decisions, which is which requires a sequence length of several
not good for combining it with outer channel thousand bits to perform well. outer extrinsic
decoding. The APP detector generates soft relia-
bility values on the received constellation bits by Iterative Processing — The channel code and information, to
taking all competing hypotheses into account, MIMO mapper with matrix channel H can be
computing a ratio for a 1- vs. a 0-hypothesis per interpreted as a serially concatenated coding become the a priori
constellation bit. The APP detector minimizes the
probability of making a bit error, and produces
scheme. The outer encoder forwards coded bits
through the bit interleaver to the inner vector
knowledge to the
soft outputs, the true a posteriori log-likelihood QAM mapping; the MIMO channel implicitly inner detector.
ratio values, which can be further processed by an performs a block encoding with matrix H, intro-
outer channel decoder. It shows the best perfor- ducing memory, thus connecting the bits of the
mance of all detectors when combined with itera- vector constellation across multiple transmit
tive detection and decoding, as it readily accepts a antennas. Optimal decoding at the receiver cor-
priori information for closing the turbo loop. responds to jointly detecting the MIMO constel-
However, applicability of the MLD or APP detec- lation and decoding the outer code, which is
tor suffers from an exponential complexity prohibitively complex. Thanks to the bit inter-
increase in the number of transmitted bits (i.e., leaver we can separate this task into MIMO
the QAM constellation size M and the number of demapping and channel decoding, approximating
transmit antennas NT). The sphere decoder is a joint detection using iterative exchange of reliabil-
lower-complexity alternative; it only considers the ity information between the processing elements.
most relevant hypotheses using a tree-search algo- The iterative algorithm is illustrated in Fig. 2.
rithm, bounded by a radius constraint around an The detector takes channel observations and a
initial vector estimate. Soft outputs are computed priori knowledge on the outer coded bits and
by APP detection over all relevant candidate vec- computes extrinsic information for each of the
tors that fulfill the radius constraint. The number MNT coded bits per vector channel symbol y. The
of search steps depends on the SNR and the par- extrinsic information is deinterleaved to become
ticular instantiation of the channel matrix H, the a priori input to the outer soft in/soft out
which is challenging for hardware implementation. decoder which calculates outer extrinsic informa-
tion. One iteration is completed by reinterleaving
Combination with Channel Coding — Spatial multi- the outer extrinsic information to become the a
plexing can be interpreted as a vector extension priori knowledge to the inner detector.
of BICM, where the bit-interleaved coded Figure 4 illustrates the iterative decoding pro-
sequence is mapped onto a vector of N T QAM cess in an extrinsic information transfer (EXIT)
symbols, rather than a single QAM constella- chart. It plots the transfer behavior of the inner
tion. The channel interface at the receiver MIMO demapper and outer channel decoder in
(detector) only sees a fraction of the transmit- a single chart (e.g., [12]). A trajectory visualizes
ted message at a time; thus, its role should the progress of the iterative decoding and allows
merely be to convey soft reliability information verification of whether the MIMO demapper
to the outer channel decoder. The channel and channel decoder interact efficiently. The left
decoder sees the entire sequence, and should chart illustrates the situation for NT ≤ NR and NT
make the final decisions on the transmitted ≈ NR. The demapper curve represents the chan-
message. A hard decision after the channel nel as seen by the outer decoder; it improves
interface, as done in MLD, would throw away slightly with increasing a priori knowledge at the
precious information that could help the demapper, quantified in values from 0 to 1 (in
decoder to do a better job. It is therefore a bits) along the x-axis. In combination with an
good strategy to concentrate all redundancy of outer capacity achieving code, like a turbo or
the system into a single outer channel code. LDPC code, there are hardly any iterations
Another approach is to split up the redundancy between the MIMO demapper and turbo
between outer channel code and an inner space- decoder needed, as both curves match well.

IEEE Wireless Communications • August 2006 25


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 26

1 1
Bit error rate
below 0.1%

Inner
Extrinsic output from MIMO demapper

Extrinsic output from MIMO demapper


demapper for
NT >> NR
(e.g., 6 × 2)

Inner demapper for NT ≈ NR Trajectory of


(e.g., 6 × 6) iterative
detection and
decoding

Outer channel decoder


(turbo code, LDPC code)

Outer channel decoder


(LDPC code, matched to demapper)

0 0
0 1 0 1
A priori feedback from outer channel decoder A priori feedback from outer channel decoder

■ Figure 4. Spatial multiplexing and bit-interleaved coded modulation with iterative detection and decoding for NT ≈ NR (left) and
NT >> NR (right).

When there are many more transmit than receive transmitted from antenna 1 at time instance 2,
antennas (NT >> NR), however, the demapper and from antenna 2 at time instance 3; and so
output improves significantly with increasing a on. This can be extended to any number of trans-
priori knowledge (steep slope), as depicted in mit antennas, corresponding to a rate 1/NT repe-
the right chart; many iterations over a MIMO tition code. The downside is that detection at
detector and an outer decoder are required to the receiver is still rather complex, applying con-
converge toward low BER. Furthermore, the ventional methods known from equalization of
behavior of the channel decoder needs to be ISI channels, such as optimal Viterbi equaliza-
matched to that of the MIMO detector. LDPC tion. Of course, any of the SMX detectors dis-
codes can be specifically designed for this by cussed in the previous section will do the job as
appropriately adjusting the degree distributions, well. So we have suffered a rate loss, giving up
that is, choosing the right mixture of repetition some spectral efficiency to collect some more
code rates and parity-check code rates; this, spatial diversity, but have not gotten simpler
however, complicates system design. detection in return. Does this pay off? Can we
As N T > N R is a quite common scenario in, not get both, the benefit of transmit diversity
say, the downlink from a base station (with many and simple detection at the receiver? Another
antennas) to a mobile terminal (with only a few space-time technique comes to the rescue, com-
antennas), there needs to be a better way of monly referred to as space-time block coding,
benefiting from excess transmit antennas. Simply which is discussed next.
repeating symbols over different transmit anten-
nas sounds, intuitively, like a good idea. Let us SPACE-TIME BLOCK CODING
take a closer look. As with CDD, space-time block codes [13, 14]
can be viewed as repetition codes over space and
CYCLIC DELAY DIVERSITY time, simultaneously transmitting the same data
In cyclic delay diversity (CDD), delayed replicas over different antennas. Similar to MRC, a fad-
of the message are transmitted over different ing channel can be made more AWGN-like
antennas. In a way, it is like deliberately creating using this technique, providing increased robust-
a single antenna intersymbol interference (ISI) ness and range extension. A quite attractive vari-
channel from an otherwise perfectly frequency- ant of space-time codes is orthogonal space-time
flat multiple antenna channel. The upside is that block codes, which can be detected optimally at
all transmitted symbols benefit from the full spa- the receiver with very simple linear operations.
tial diversity, as can be seen from the transmit They enjoy popularity in both wireless cellular
matrix given for NT = 2, (e.g., UMTS) and wireless networking standards
(i.e., 802.11n, 802.16e). The Alamouti orthogo-
s s2 s3 … nal space-time block code for the 2 × 1 channel
S = 1 .
0 s1 s2 … [13] is given by
s − s2* 
Constellation symbol s 1 is transmitted from
S = 1 .
antenna 1 at time instance 1, and from antenna s2 s1* 
2 at time instance 2; constellation symbol s 2 is

26 IEEE Wireless Communications • August 2006


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 27

At time instance 1, constellation symbol s 1 is


transmitted from antenna 1, and s2 from antenna
full SMX-style MIMO detection, are more chal-
lenging for efficient receiver implementation.
To achieve diversity
2. At time instance 2, symbol –s*2 is transmitted Likewise, STBC should be considered as a front- gains, the repetition
from antenna 1, and s*1 from antenna 2. This end, on top of spatial multiplexing and channel
pattern is repeated with new symbols s 1 , s 2 . coding, using excess transmit antennas NT – NR code is a natural
There are two information symbols transmitted to make the channel look “better” for the chan-
per two channel uses, commonly referred to as nel code, by: choice. To obtain the
spatial rate 1. The code has full diversity, which • Increasing the robustness of the link (less
is a measure for the asymptotic slope of the fades, higher SNR) same spectral
BER curve at high SNR. The Alamouti code is
the only orthogonal STBC with spatial rate 1
• Turning asymmetric channels (NT > NR) into
close to symmetric ones (NT ≈ NR), thus avoid-
efficiency as with
and full diversity for 2 × 1. ing performance degradation when iterative spatial multiplexing,
It is instructive to realize that in the world of detection and decoding cannot be performed
channel coding, a spatial rate of 1 would be con- due to complexity/latency restrictions. however, one needs
sidered a coding rate of 1/N T. Thus, as STBCs
are mere repetition codes (like CDD), they do AN EXAMPLE FROM STANDARDS to go to higher order
not offer coding gain — but diversity gains over
fading channels. As we have familiarized ourselves with different modulation, putting
In diversity, the same information is transmit-
ted over different preferably independent trans-
MIMO techniques, we are now ready to walk
through an example from the standards. The
tighter constraints on
mission paths to mitigate fading, interference, wireless local area network (WLAN) standard the linearity of the
and noise. To achieve diversity gains, the repeti- 802.11a [5] has a physical layer (PHY) based on
tion code is a natural choice. To obtain the same orthogonal frequency-division multiplexing RF chains, and the
spectral efficiency as with spatial multiplexing, (OFDM), employing 64 subcarriers in a 20 MHz
however, one needs to go to higher order modu- band, and simple bit-interleaved coded modula- ADC/DAC resolution.
lation, putting tighter constraints on the linearity tion, with modulation alphabets ranging from
of the RF chains and ADC/digital-to-analog con- BPSK to 64-QAM. A memory 6 convolutional
verter (DAC) resolution. Thus, the main objec- code is used with coding rates R = 1/2 up to 3/4,
tive of STBC is not to increase the data rate, but achieving data rates of 6 Mb/s (BPSK, rate 1/2)
to improve the robustness of the wireless link. up to 54 Mb/s (64-QAM, rate 3/4). A next-gen-
Alamouti’s simple 2 × 1 scheme triggered a eration WLAN system (802.11n, [2]) supporting
tremendous amount of research in this area. PHY data rates beyond 200 Mb/s is currently
Other codes were found for N T × N R = 3 × 1 being discussed in the IEEE 802.11 standardiza-
and 4 × 1 scenarios [14]. Although full diversity, tion body. It is based on the 802.11a/g OFDM
they only convey three information symbols in system, employing multiple antenna techniques
four channel uses, and thus incur a rate loss with some of the optional modes achieving data
(spatial rate 3/4). For NT × 1 scenarios, no gen- rates beyond 500 Mb/s. With its full deployment
eral construction of orthogonal STBC is known expected in 2007, WLAN IEEE 802.11n is likely
with full diversity and full spatial rate. Moreover, to be the first system that makes widespread use
it can be proved [14] that no full rate (i.e., spa- of MIMO techniques.
tial rate 1) orthogonal STBC exists with NT > 2. The transmitter of an 802.11n device is depict-
Several other original nonorthogonal space- ed in Fig. 5. The encoder parser distributes the
time block codes exist that require full SMX- scrambled bits among NES channel encoders in
type detection to recover the transmitted round-robin fashion. This is useful in two ways:
information. However, we are walking a thin line • Different coding rates can be realized, to be
of gaining advantages through additional diversi- mapped onto different spatial streams.
ty on the channel — which might be small for • A high-data-rate stream can be broken down
the third or fourth transmit antenna to be added into several parallel slower bitstreams, to sim-
— and compromising this gain at the receiver by plify hardware implementation.
making the detection more complicated, defeat- In fact, for data rates of 300 Mb/s and lower, a
ing the benefit of the additional diversity. single convolutional encoder is used, while for
One way out of this dilemma is, in fact, rather rates greater than 300 Mb/s two encoders are
simple and pragmatic: The most popular STBC applied in parallel. Optionally, LDPC codes (RA
used in practice is the 2 × 1 Alamouti code due codes) can be used for channel coding. The
to simple optimal detection at full spatial rate. stream parser divides the output of the encoders
The extension to more than two transmit anten- into NSS spatial streams, which go through dif-
nas is done by simply filling the additional anten- ferent bit interleavers and QAM mappers, map-
nas with: ping the sequence of bits into complex
• Zeros (cyclic, can be viewed as antenna subset constellation symbols, facilitating the use of dif-
selection) ferent QAM constellation sizes per transmit
• Repetition antenna. The optional STBC (essentially the
• Combination with SMX (also referred to as Alamouti code) maps symbols from one into two
hybrid STBC/SMX) spatial streams, using repetition and complex
This scheme was adopted for 802.11n; it is conjugation of constellation symbols, outputting
discussed in greater detail in the next section. N STS space-time streams. It is only in effect if
As we have seen, an important aspect of N STS > N SS , with either STBC or a hybrid of
STBC is the ease of detection. One could argue STBC and SMX being used. Obviously, the
that other redundant space-time mappings, such structure of Fig. 5 is very flexible, and many dif-
as other linear combinations at the transmitter ferent combinations of SMX and STBC are pos-
that do not enjoy simple detection but require sible; even closed-loop modes such as

IEEE Wireless Communications • August 2006 27


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 28

TRENDS AND FUTURE CHALLENGES


Information
source We conclude by taking an outlook on some future
developments in coding over space and time.

Encoder parser Closed Loop — So far, we have almost exclusively


paid attention to open loop transmission, with no
NES or only very limited feedback provided from
channel Channel encoder Channel encoder Convolutional
rate R1 rate RNES codes, receiver to transmitter, like an SNR value or any
encoders or LDPC codes other simple channel quality indicator. If we had
knowledge of the channel matrix at the transmit-
Stream parser ter, we could further increase the capacity of the
MIMO link [15]. This is referred to as closed loop
NSS Interleaver Interleaver transmission. In eigenmode beamforming, the
Spectrally
spatial efficient transmit and receive vectors are multiplied with
streams QAM mapper 1 QAM mapper NSS modulation properly chosen unitary matrices as obtained
from singular value decomposition. The effective
channel is turned into a diagonal matrix, with the
NSTS Space/time block code Repetition singular values being directly proportional to the
space-time coding SNR of the NT parallel subchannels. The dynamic
streams
Spatial mapper range of the singular values can be high. To fully
take advantage of the capacity potential, both
modulation and channel coding have to support
NT iFFT iFFT
this wide range. Typical implementations should
transmit provide constellation sizes from BPSK to 256-
chains
Analog RF 1 Analog RF NT QAM, and code rates from 1/12 to 7/8, to allow
for waterfilling (adaptation of power and rate)
over the eigenmodes of the channel. Closed loop
transmission works well for NT > NR, but the sys-
tem engineering is more intricate than for open
loop. There are several obstacles in practice. It is
■ Figure 5. Transmitter according to WLAN 802.11n. a nontrivial undertaking to obtain channel feed-
back of sufficiently high quality at a sufficiently
high update rate, just to keep up with the fluctua-
beamforming techniques are supported in the tions of the channel. Exploiting reciprocity of the
standard document. MIMO channel in time-division multiplexing is an
Figure 6 shows a MIMO mode table accord- attractive option to simplify the feedback burden.
ing to [2] with pragmatic extensions of the basic However, it has its own challenges, such as cali-
Alamouti STBC to more than two transmit bration of RF chains and varying interference sce-
antennas. Besides a pure SMX mode for each narios at both ends of the link, providing distorted
value of N T , there are several special STBC views on supposedly identical yet reciprocal chan-
modes: For NT = 2, there is just the basic 2 × 1 nels. Nevertheless, it can almost be taken for
STBC, abbreviated as AL. For NT = 3 transmit granted that engineering ingenuity will further
antennas, the 2 × 1 AL scheme is extended to add refinements to the scheme, and make it hap-
three transmit antennas by inserting a zero pen in future applications.
antenna output, which cycles through all anten-
nas in time (AL + zero); an alternative exten- Cooperative Coding — Point-to-point links using
sion just repeats the spatial stream to be multiple antennas have been comprehensively
transmitted on the third antenna (AL + rep); a analyzed over the past decade and are well
hybrid STBC/SMX mode, denoted AL + SMX, understood by now. However, there are several
uses two antennas for STBC, and the third communication scenarios that still offer plenty of
antenna for conveying a second spatial stream. room for improvement, like the point-to-multi-
For NT = 4, there are even more different modes point link described next. In the multiple
possible: cyclic zero-antenna extension; antenna user/multiple antenna broadcast channel, the
repetition; repeating two space-time block codes downlink transmissions from the base station to
(AL + AL (rep)), or transmitting different data all users should be done simultaneously, rather
(AL + AL (SMX)); and, finally, three spatial than exclusively assigning time, frequency, or spa-
streams using one Alamouti scheme, while con- tial resources to a particular link. This promises a
veying two additional spatial streams, labeled as significant increase in capacity of cellular net-
AL + SMX. For better averaging in OFDM sys- works [16], yet comes bundled with a whole new
tems, the antenna cycling (subset selection) is set of challenges: A successful implementation
applied over time and the subcarrier index with- requires appropriate multiuser precoding at the
in one OFDM symbol, to ensure that all RF base station transmitter, also known as “dirty
chains are operated at the same transmit power. paper coding,” and multiuser detection based on
As apparent from the table, 802.11n offers a vector quantization at the receiver, to avoid mul-
plethora of possible MIMO modes, many of tiuser interference. Current research focuses on
which are being defined as optional. The future finding practical schemes for combining channel
will show which of those modes will become the coding with “dirty paper” precoding and vector
most widely used, and thus most commonly quantization. Several other communication prob-
implemented ones. lems fall into this broad class of cooperative cod-

28 IEEE Wireless Communications • August 2006


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 29

Spatial streams (SS) Space-time streams (STS)


Hybrid
STBC- Number of Output
SMX Number of Symbol Symbol
SS, 2n STS, index
scheme NSTS nSTS
NSS 2n 2n+1

1 a b
AL 1 a,b 2
2 -b* a* or or

1 a b a b 0 0
AL
+ 1 a,b 3 2 -b* a* 0 0 a b
zero
3 0 0 -b* a* -b* a*

1 a b
AL
+ 1 a,b 3 2 -b* a*
rep.
3 a b

1 a b
a,b
AL
+ 2 3 2 -b* a*
SMX
c,d
3 c d or or or

1 a b a b 0 0 0 0

AL 2 0 0 0 0 a b a b
+ 1 a,b 4
zero 3 0 0 -b* a* 0 0 -b* a*

4 -b* a* 0 0 -b* a* 0 0

1 a b

AL 2 -b* a*
+
AL 1 a,b 4
(rep) 3 a b

4 -b* a*

1 a b
a,b
AL 2 -b* a*
+
2 4
AL
(SMX) 3 c d
c, d
4 -d* c*

a,b 1 a b

AL 2 -b* a*
+ 3 c, d 4
SMX 3 c d

e, f 4 e f

■ Figure 6. Extensions of the basic 2 × 1 orthogonal space-time block code to more than two transmit antennas by zero insertion, repeti-
tion, and combinations with spatial multiplexing, as done in WLAN 802.11n.

ing, and we can expect advances in this field over cial systems) has now turned into something
the next few years. called cognitive radio — and this time it seems it
is becoming real. In cognitive radio [17] it is all
Cognitive Radio — What used to be software radio about multidimensional spectrum reuse: in
(which has never has really taken off in commer- space, in time, in frequency, breaking free of

IEEE Wireless Communications • August 2006 29


TEN BRINK LAYOUT 8/3/06 1:27 PM Page 30

With the ever- most of the constraints that hinder further opti-
mization of today’s wireless systems. A cognitive
single antenna channels. With the ever increasing
demand for faster wireless connectivity, even the
increasing demand radio can sense its environment and location, seemingly vast bandwidth available for UWB com-
learn from its measurements, and react by adapt- munication will become a bottleneck — thus, it is
for faster wireless ing power, frequency, bandwidth, MIMO mode, likely that a further evolution of current single
modulation, coding, protocol stack, and several antenna systems toward including MIMO tech-
connectivity, it is other parameters of its transmission. The auto- niques is just a matter of time.
matic channel switching of WLAN 802.11 can
likely that a further already be regarded as a first humble step toward REFERENCES
evolution of current an environment-aware radio. But there is more
on the horizon: In 2002 FCC opened up the
[1] C. E. Shannon, “A Mathematical Theory of Communica-
tion,” Bell Sys. Tech. J., vol. 27, July/Oct. 1948, pp.
379–423, 623–56.
single antenna spectrum from 3.1 to 10.6 GHz for unlicensed [2] “Joint Proposal: High Throughput Extension to the
ultrawideband (UWB) communications — across 802.11 Standard: PHY Draft 1.0,” Task Group n, doc.
systems toward several already existing licensed and unlicensed IEEE 802.11-05/1102r4.
bands. Although the allowed transmit levels are [3] C. Berrou, A. Glavieux, and P. Thitimajshima, “Near
including MIMO extremely low (–41 dBm/MHz), other regulatory Shannon Limit Error-Correcting Coding and Decoding:
Turbo-Codes,” Proc. IEEE Conf. Commun., May 1993,
domains, like Japan and Europe, demand special
techniques is just a detect-and-avoid (DAA) modes, the details of
pp. 1064–70.
[4] G. D. Forney, Jr. and G. Ungerboeck, “Modulation and
Coding for Linear Gaussian Channels,” IEEE Trans. Info.
matter of time. which (e.g., threshold levels and response times)
are still to be defined. The basic idea, however, Theory, IT-44, Oct. 1998, pp. 2384–2415.
[5] “Part 11: Wireless LAN Medium Access Control (MAC)
is simple: The device has to detect victim sys- and Physical Layer (PHY) Specifications, High-Speed
tems, like WiMAX or WLAN services, using Physical Layer in the 5 GHz Band,” IEEE Std 802.11a-
spectral measurements, and avoid interference 1999.
[6] D. J. Costello et al., “Applications of Error-Control Cod-
by notching out the respective frequency compo- ing,” IEEE Trans. Info. Theory, vol. 44, no. 6, Oct. 1998,
nents from its transmit spectral mask. This allows pp. 2531–60.
to satisfy different regulatory domains, and to [7] J. Hagenauer, E. Offer, and L. Papke, “Iterative Decoding of
coexist with the primary users of the respective Binary Block and Convolutional Codes,” IEEE Trans. Info.
Theory, vol. 42, no. 2, Mar. 1996, pp. 429–45.
spectrum. Depending on the flavor of UWB, [8] T. J. Richardson and R. L. Urbanke, “The Capacity of
DAA might be more or less difficult to realize. Low-Density Parity-Check Codes under Message-Passing
The UWB system according to the WiMedia Decoding,” IEEE Trans. Info. Theory, vol. 47, no. 2, Feb.
standard [18] has a built-in OFDM receiver that 2001, pp. 599–618.
[9] J. H. Winters, J. Salz and R. D. Gitlin, “The Impact of
is already capable of performing Fourier trans- Antenna Diversity on the Capacity of Wireless Commu-
forms to decode the OFDM symbols. The nication Systems,” IEEE Trans. Commun., vol. 42, no.
respective frequency domain processor just 2/3/4, Feb./Mar./Apr. 1994, pp. 1740–51.
needs some further tuning to provide accurate [10] G. J. Foschini, “Layered Space-Time Architecture for
Wireless Communication in A Fading Environment
spectral energy measurements. What cognitive When Using Multi-Element Antennas,” Bell Labs. Tech.
radio means for channel coding is less obvious, J., vol. 1, no. 2, 1996, pp. 41–59.
but it is something like “one-code-fits-all”: The [11] G. D. Golden et al., “Detection Algorithm and Initial
code should be flexible with regard to block Laboratory Results using V-BLAST Spacetime Communi-
cation Architecture,” IEE Elect. Lett., vol. 35, Jan. 1999,
length and code rate, and should be robust pp. 14–16.
against transmit notches, or support simple [12] S. ten Brink, G. Kramer, and A. Ashikhmin, “Design of
means to “code around” those nulled subcarriers Low-Density Parity Check Codes for Modulation and
in combination with a good interleaving strategy. Detection,” IEEE Trans. Commun., vol. 52, no. 4, Apr.
2004, pp. 670–78.
It should be simple to adapt to different channel [13] S. M. Alamouti, “A Simple Transmit Diversity Tech-
interfaces, like different numbers of transmit nique for Wireless Communications,” IEEE JSAC, vol.
antennas and modulation formats, and provide 16, no. 8, Oct. 1998, pp. 1451–58.
excellent performance in conjunction with itera- [14] V. Tarokh, H. Jafarkani and A. R. Calderbank, “Space-
Time Block Codes from Orthogonal Designs,” IEEE
tive detection and decoding. A lot of creativity Trans. Info. Theory, vol. 45, July 1999, pp. 1456–67.
has already gone into this, and more is to come. [15] A. Goldsmith et al., “Capacity Limits of MIMO Channels,”
IEEE JSAC, vol. 21, no. 5, June 2003, pp. 684–702.
SUMMARY [16] W. Yu, J. M. Cioffi, “Sum Capacity of Gaussian Vector
Broadcast Channels,” IEEE Trans. Info. Theory, vol. 50,
no. 9, Sept. 2004, pp. 1875–92.
This article is an attempt to shed some light on [17] S. Ashley, “Cognitive Radio,” Sci. Amer., Mar. 2006,
wireless communication using multiple antennas, as pp. 66–73.
seen from the perspective of the channel code. [18] “MultiBand OFDM Physical Layer Specification,” WiMe-
dia Alliance specification document, ver. 1.1, May 26,
Extending simple bit-interleaved coded modulation 2005, Also, “High Rate Ultra Wideband PHY and MAC
to the matrix channel, with a single outer encoder Standard,” ECMA-368.
and an inner vector-QAM mapping at the transmit-
ter, appears to be the most pragmatic choice for BIOGRAPHY
materializing a significant portion of the promised S TEPHAN TEN B RINK (stenbrink@realtek-us.com) received a
high spectral efficiencies. Alamouti’s unique orthog- Dipl.-Ing. degree in electrical engineering and a Dr.-Ing.
onal space-time block code in combination with degree from the University of Stuttgart, Germany, in 1997
repetitions and zero insertions as extensions to and 2000, respectively. From 2000 to June 2003 he was
with the Wireless Research Laboratory, Bell Laboratories,
more than two transmit antennas makes the chan- Lucent Technologies, Holmdel, New Jersey, conducting
nel more robust against fading and interference. research on channel coding for multiple-antenna systems.
The commercial application of multiple antenna Since July 2003 he has been with Realtek Semiconductor
techniques has just begun. While WLAN 802.11n Corp., Irvine, California, where he is involved in the devel-
opment and standardization of high-throughput wireless
has moved to MIMO just recently, many other sys- systems. His research interests include concatenated coding
tems, like ultrawideband WPAN systems, are still and iterative decoding, multiple-antenna communications,
based on spectrally inefficient communication over cognitive radios and watermarking schemes.

30 IEEE Wireless Communications • August 2006

S-ar putea să vă placă și