Download Full Error Control Coding From Theory to Practice 1st Edition Peter Sweeney PDF All Chapters
Download Full Error Control Coding From Theory to Practice 1st Edition Peter Sweeney PDF All Chapters
https://ebookultra.com
https://ebookultra.com/download/error-control-
coding-from-theory-to-practice-1st-edition-peter-
sweeney/
https://ebookultra.com/download/digital-speech-transmission-
enhancement-coding-and-error-concealment-1st-edition-peter-vary/
ebookultra.com
https://ebookultra.com/download/non-binary-error-control-coding-for-
wireless-communication-and-data-storage-1st-edition-rolando-antonio-
carrasco/
ebookultra.com
https://ebookultra.com/download/introduction-to-coding-theory-2nd-
edition-bierbrauer/
ebookultra.com
https://ebookultra.com/download/multicultural-education-from-theory-
to-practice-1st-edition-hasan-arslan/
ebookultra.com
Therapeutic Exercise From Theory to Practice 1st Edition
Michael Higgins
https://ebookultra.com/download/therapeutic-exercise-from-theory-to-
practice-1st-edition-michael-higgins/
ebookultra.com
https://ebookultra.com/download/anthropology-for-development-from-
theory-to-practice-1st-edition-robyn-eversole/
ebookultra.com
https://ebookultra.com/download/multimedia-networking-from-theory-to-
practice-1st-edition-jenq-neng-hwang/
ebookultra.com
https://ebookultra.com/download/roadwork-theory-and-practice-5th-
edition-peter-kendrick/
ebookultra.com
https://ebookultra.com/download/coding-theory-a-first-course-ling/
ebookultra.com
Error Control Coding From Theory to Practice 1st
Edition Peter Sweeney Digital Instant Download
Author(s): Peter Sweeney
ISBN(s): 9780470852613, 0470852615
Edition: 1
File Details: PDF, 16.09 MB
Year: 2002
Language: english
ERROR CONTROL CODING
ERROR CONTROL CODING
From Theory to Practice
Peter Sweeney
University of Surrey, Guildford, UK
All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or
otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of
a licence issued by the Copyright Licensing Agency Ltd., 90 Tottenham Court Road, London W1P 0LP.
UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed
to the Permissions Department, John Wiley & Sons, Ltd., Baffins Lane, Chichester, West Sussex PO19
1UD, England, or emailed to [email protected], or faxed to (+44) 1243 770571.
John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158–0012, USA
John Wiley & Sons Australia, Ltd., 33 Park Road, Milton, Queensland 4064, Australia
John Wiley & Sons (Asia) Pte Ltd., 2 Clementi Loop #02–01, Jin Xing Distripark, Singapore 129809
John Wiley & Sons Canada, Ltd., 22 Worcester Road, Etobicoke, Ontario, Canada M9W 1L1
A catalogue record for this book is available from the British Library
Typeset in 10/12pt Times by Kolam Information Services Pvt. Ltd, Pondicherry, India
Printed and bound in Great Britain by TJ International, Padstow, Cornwall
This book is printed on acid-free paper responsibly manufactured from sustainable forestry
in which at least two trees are planted for each one used for paper production.
1 The Principles of Coding in Digital Communications 1
1.1 Error Control Schemes 1
1.2 Elements of Digital Communication Systems 2
1.3 Source Encoding 2
1.4 Error Control Coding 3
1.5 Modulation 5
1.6 The Channel 7
1.7 Demodulation 8
1.7.1 Coherent demodulation 8
1.7.2 Differential demodulation 9
1.7.3 Soft-decision demodulation 10
1.8 Decoding 11
1.8.1 Encoding and decoding example 12
1.8.2 Soft-decision decoding 14
1.8.3 Alternative decoding approaches 15
1.9 Code Performance and Coding Gain 16
1.10 Information Theory Limits to Code Performance 18
1.11 Coding for Multilevel Modulations 21
1.12 Coding for Burst-Error Channels 22
1.13 Multistage Coding 24
1.14 Error Detection Based Methods 24
1.14.1 ARQ strategies 24
1.14.2 Error concealment 26
1.14.3 Error detection and correction capability of block
codes 26
1.15 Selection of Coding Scheme 27
1.15.1 General considerations 27
1.15.2 Data structure 28
1.15.3 Information type 29
1.15.4 Data rate 29
1.15.5 Real time data processing 30
1.15.6 Power and bandwidth constraints 30
vi CONTENTS
2 Convolutional Codes 35
2.1 Introduction 35
2.2 General Properties of Convolutional Codes 35
2.3 Generator Polynomials 36
2.4 Terminology 37
2.5 Encoder State Diagram 38
2.6 Distance Structure of Convolutional Codes 39
2.7 Evaluating Distance and Weight Structures 39
2.8 Maximum Likelihood Decoding 41
2.9 Viterbi Algorithm 42
2.9.1 General principles 42
2.9.2 Example of viterbi decoding 42
2.9.3 Issues arising 45
2.10 Practical Implementation of Viterbi Decoding 45
2.11 Performance of Convolutional Codes 51
2.12 Good Convolutional Codes 53
2.13 Punctured Convolutional Codes 55
2.14 Applications of Convolutional Codes 56
2.15 Codes for Multilevel Modulations 57
2.16 Sequential Decoding 62
2.17 Conclusion 64
2.18 Exercises 64
2.19 References 66
4 Cyclic Codes 87
4.1 Introduction 87
4.2 Definition of a Cyclic Code 87
4.3 Example of a Cyclic Code 88
4.4 Polynomial Representation 88
4.5 Encoding by Convolution 89
4.6 Establishing the Cyclic Property 90
4.7 Deducing the Properties of a Cyclic Code 91
4.8 Primitive Polynomials 92
4.9 Systematic Encoding of Cyclic Codes 93
4.10 Syndrome of a Cyclic Code 94
4.11 Implementation of Encoding 94
4.12 Decoding 96
4.13 Decoder Operation 100
4.14 Multiple-Error Correction 100
4.15 Example of Multiple-Error Correction 101
4.16 Shortened Cyclic Codes 103
4.17 Expurgated Cyclic Codes 104
4.18 BCH Codes 106
4.19 Cyclic Codes for Burst-Error Correction 107
4.20 Conclusion 110
4.21 Exercises 110
4.22 References 112
Index 239
This page intentionally left blank
1
The principles of coding in digital
communications
inherent redundancy to process the erroneous data in a way that will make the errors
subjectively important, a method known as error concealment.
This chapter first looks at the components of a digital communication system.
Sections 1.3 to 1.8 then look in more detail at each of the components. Section 1.8
gives a simple example of a code that is used to show how error detection and
correction may in principle be achieved. Section 1.9 discusses the performance of
error correcting codes and Section 1.10 looks at the theoretical performance avail-
able. A number of more advanced topics are considered in Sections 1.11 to 1.14,
namely coding for bandwidth-limited conditions, coding for burst errors, multistage
coding (known as concatenation) and the alternatives to forward error correction.
Finally, Section 1.15 summarizes the various considerations in choosing a coding
scheme.
T
Demodu IaU"
Error control Source
received
decoder decoder
contained in any message is defined in terms of the probability p that the message is
selected for transmission. The information content H, measured in bits, is given by
H = log2(l/p)
0
f 1
s 2
Output
buffer
k-\
n-\
input
v-bit encoder memory frame
the input constraint length (K), consists of the input frame of k0 symbols plus the
number of symbols in the memory. This latter parameter is known as memory
constraint length (v).
In more complex systems the encoding may consist of more than one stage and
may incorporate both block and convolutional codes and, possibly, a technique
known as interleaving. Such systems will be considered in later sections.
One property that will be shared by all the codes in this book is linearity. If we
consider a linear system we normally think in terms of output being proportional to
input (scaling property). For a linear system we can also identify on the output the
sum of the separate components deriving from the sum of two different signals at the
input (superposition property). More formally, if the system performs a function/on
an input to produce its output, thenf(cx)= c x f(x) (scaling)
1.5 MODULATION
The modulator can be thought of as a kind of digital to analogue converter, preparing
the digital code-stream for the real, analogue world. Initially the digital stream is put
into a baseband representation, i.e. one in which the signal changes at a rate compar-
able with the rate of the digital symbols being represented. A convenient representa-
tion is the Non Return to Zero (NRZ) format, which represents bits by signal levels of
+ V or — V depending on the bit value. This is represented in Figure 1.4.
ERROR CONTROL CODING
+K,
time
1 2 3 4 5 6 7 8 91 0
This is known as Quadriphase Shift Keying (QPSK) and has the advantage over
BPSK that twice as many bits can be transmitted in the same time and the same
bandwidth, with no loss of resistance to noise. The actual bandwidth occupied by the
modulation depends on implementation details, but is commonly taken to be 1 Hz
for one bit per second transmission rate using BPSK or 0.5 Hz using QPSK.
A phase diagram of QPSK is shown in Figure 1.5. The mapping of the bit values
onto the phases assumes that each of the carriers is independently modulated using
alternate bits from the coded data stream. It can be seen that adjacent points in the
diagram differ by only one bit because the phase of only one of the two carriers has
changed. A mapping that ensures that adjacent points differ by only one bit is known
as Gray Coding.
sin(2nfct)
01 11
cos(2nfct)
00 10
Other possible modulations include Frequency Shift Keying (FSK), in which the
data determines the frequency of the transmitted signal. The advantage of FSK is
simplicity of implementation, although the resistance to noise is less than BPSK or
QPSK. There are also various modulations of a type known as Continuous Phase
Modulation, which minimize phase discontinuities between transmitted waveforms to
improve the spectral characteristics produced by nonlinear power devices.
In bandwidth-limited conditions, multilevel modulations may be used to achieve
higher bit rates within the same bandwidth as BPSK or QPSK. In M-ary Phase Shift
Keying (MPSK) a larger number of transmitted phases is possible. In Quadrature
Amplitude Modulation (QAM) a pair of carriers in phase quadrature are each given
different possible amplitudes before being added to produce a transmitted signal with
different amplitudes as well as phases. QAM has more noise resistance than equiva-
lent MPSK, but the variations in amplitude may cause problems for systems involv-
ing nonlinear power devices. Both QAM and MPSK require special approaches to
coding which consider the code and the modulation together.
1-p
• Bursty channel - the errors are characterized by periods of relatively high symbol
error rate separated by periods of relatively low, or zero, error rate.
• Compound (or diffuse) channel - the errors consist of a mixture of bursts and
random errors. In reality all channels exhibit some form of compound behaviour.
Many codes work best if errors are random and so the transmitter and receiver
may include additional elements, an interleaver before the modulator and a deinter-
leaver after the demodulator to randomize the effects of channel errors. This will be
discussed in Section 1.12.
1.7 DEMODULATION
The demodulator attempts to decide on the values of the symbols that were trans-
mitted and pass those decisions on to the next stage. This is usually carried out by
some sort of correlation with replicas of possible transmitted signals. Consider, for
example, the case of BPSK. The correlation is with a single fixed phase of the carrier,
producing either a positive or a negative output from the detector. In the absence of
noise, the detected signal level can be taken as ±\/E~r where Er is the energy in each
received bit. The effect of an AWGN channel will be to add a noise level n sampled
from a Gaussian distribution of zero mean and standard deviation a. The probability
density is given by
Gaussian noise has a flat spectrum and the noise level is often described by its
Single-sided Noise Power Spectral Density, which is written N0. The variance, <r2, of
the Gaussian noise, integrated over a single-bit interval, will be No/2. In fact it can be
considered that there is a total noise variance of N0 with half of this acting either in
phase or in antiphase to the replica and the other half in phase quadrature, therefore
not affecting the detector. The performance of Gray-coded QPSK is therefore exactly
the same as BPSK because the two carriers can be demodulated as independent
BPSK signals, each affected by independent Gaussian noise values with the same
standard deviation.
The demodulator will make its decision based on the sign of the detected signal.
If the received level is positive, it will assume that the value corresponding to the
replica was transmitted. If the correlation was negative, it will assume that the other
value was transmitted. An error will occur, therefore, if the noise-free level is -\fEr
THE PRINCIPLES OF CODING IN DIGITAL COMMUNICATIONS 9
and a noise value greater than +\fEr is added, or if the noise-free level is +\fE~r and a
noise value less than —-/fir is added. Considering only the former case, we see that
the probability of error is just the probability that the Gaussian noise has a value
greater than +^/Er•.
cc
p = -4= f e-"2^° dn
oc
,
where —
7 f
v^J
The function erfc(x) is known as the complementary error function and its values
are widely available in tabulated form. Note that the maximum value of erfc(x) is 1 .0,
so that the maximum bit error probability is 0.5. This makes sense because we could
guess bit values with 50% probability without attempting to receive them at all.
• DEPSK – The demodulator maintains a replica of one of the two carrier phases
and correlates the received signal with this replica as for normal PSK. It then
compares the sign of the correlation with the previous correlation value; a change
of sign indicates data bit 0 and the same sign indicates data bit 1. Compared with
PSK, there will now be a bit error either when the phase is received wrongly and the
10 ERROR CONTROL CODING
previous phase was correct or when the phase is received correctly and the previous
phase was wrong. Thus noise that would cause a single-bit error in a BPSK
demodulator will cause two consecutive bit errors in the DEPSK demodulator
and the bit error probability is approximately twice the above BPSK expression.
• DPSK - The demodulator uses the previously received phase as the replica for the
next bit. Positive correlation indicates data value 1, negative correlation indicates
data value 0. The bit errors again tend to correlate in pairs, but the overall
performance is worse. In fact the bit error probability of DPSK follows a different
shape of curve:
In some cases the demodulator's decision will be easy; in other cases it will be
difficult. In principle if errors are to be corrected it is better for the demodulator to
pass on the information about the certainty of its decisions because this might assist
the decoder in pinpointing the positions of the likely errors; this is called soft-decision
demodulation. We could think of it as passing on the actual detected level as a real
number, although in practice it is likely to have some sort of quantization. Eight-level
quantization is found to represent a good compromise between complexity and
performance.
Since the purpose of soft decisions is to assist decoding, it is useful to relate the
demodulator output to probabilistic measures of performance. One commonly
adopted measure is known as the log-likelihood ratio, defined as log[/Kl|r/)//?(0|r,)].
This metric is required in an important decoding method to be described in Chapter
10 and can be used for other decoding methods too. The computation of the value
may appear difficult, however we note that
The appropriate values of x for bit values 1 and 0 are +\TEr and —\fEr- Thus the
2 2
log-likelihood ratio i s proportional t o
THE PRINCIPLES OF CODING IN DIGITAL COMMUNICATIONS 11
Now
^.,-(n-\
log
#o No
r<r,-|0)
V /[ * / I "IV ">
4r
I
In other words, the log-likelihood ratio is linear with the detected signal level and is
equal to the channel E r /N 0 , multiplied by four times the detected signal (normalized
to make the noise-free levels equal to -f/ — 1).
Note that the mapping adopted here from code bit values to detected demodulator
levels is opposite to that conventionally used in other texts. The conventional
mapping is that bit value 0 maps onto +1 and bit value 1 onto — 1 . The advantage
is that the exclusive-OR operation in the digital domain maps onto multiplication in
the analog domain. The disadvantage is the potential confusion between bit value
1 and analog value +1.
Because of the linearity of the log-likelihood ratio, the quantization boundaries of
the demodulator can be set in roughly linear steps. The question remains, however, as
to what size those steps should be. It can be shown that, for Q-level quantization, the
optimum solution is one that minimizes the value of
where p(jlc) represents the probability of a received value j given that symbol c was
transmitted. Massey [1] described an iterative method of finding the optimum solution
with nonuniform arrangement of boundaries, but the above value can easily be
calculated for different linear spacings to find an approximate optimum. For example,
with E r / N 0 around 2 dB, it is found that uniformly spaced quantization boundaries are
close to optimum if the spacing is 1/3, i.e. the boundaries are placed at —1, — 2/3
-1/3,0, +1/3, + 2/3, + 1. The use of such a scheme will be described in Section 1.8.2.
1.8 DECODING
The job of the decoder is to decide what the transmitted information was. It has the
possibility of doing this because only certain transmitted sequences, known as code-
words, are possible and any errors are likely to result in reception of a non-code
sequence. On a memoryless channel, the best strategy for the decoder is to compare
the received sequence with all the codewords, taking into account the confidence in
the received symbols, and select the codeword which is closest to the received
sequence as discussed above. This is known as maximum likelihood decoding.
12 ERROR CONTROL CODING
Consider, for example, the block code shown in Table 1.1. This code is said to be
systematic, meaning that the codeword contains the information bits and some other
bits known as parity checks because they have been calculated in some way from the
information. It can be seen that any codeword differs in at least three places from any
other codeword. This value is called the minimum Hamming distance or, more briefly,
minimum distance of the code. Consequently, if a single bit is wrong, the received
sequence is still closer to the transmitted codeword, but if two or more bits are
wrong, then the received sequence may be closer to one of the other codewords.
This code is linear and for any linear code it is found that the distance structure is
the same from any codeword. For this example, starting from any codeword there are
two sequences at a distance of 3 and one at a distance of 4. Thus the code properties
and the error-correction properties are independent of the sequence transmitted. As a
consequence, the minimum distance of the code can be found by comparing each
nonzero sequence with the all-zero sequence, finding the nonzero codeword with the
smallest number nonzero symbols. The count of nonzero symbols is known as the
weight of the sequence and the minimum weight of the code is equal to the minimum
distance.
Let us now assume that information 10 has been selected and that the sequence
10101 is therefore transmitted. Let us also assume that the received bits are hard-
decision quantized. If the sequence is received without error, it is easy to identify it in
the table and to decode. If there are errors, however, things will be more difficult and
we need to measure the number of differences between the received sequence and
each codeword. The measure of difference between sequences is known as Hamming
distance, or simply as distance between the sequences. Consider first the received
sequence 00101. The distance to each codeword is shown in Table 1.2.
In this case we can see that we have a clear winner. The transmitted sequence has
been selected as the most likely and the decoding is correct.
Information Codeword
00 00000
01 01011
10 10101
11 11110
Codeword Distance
00000 2
01011 3
10101 1
11110 4
THE PRINCIPLES OF CODING IN DIGITAL COMMUNICATIONS 13
The previous example had an error in an information bit, but the result will be the
same if a parity check bit is wrong. Consider the received sequence 10111. The
distances are shown in Table 1.3. Again the sequence 10101 is chosen. Further
examples are left to the reader, but it will be found that any single-bit error can be
recovered, regardless of the position or the codeword transmitted.
Now let us consider what happens if there are two errors. It will be found that there
are two possibilities.
Firstly, consider the received sequence 11111. The distances are shown in Table 1.4.
In this case, the codeword 11110 is chosen, which is wrong. Moreover, the decoder has
decided that the final bit was wrong when in fact it was correct. Because there are at
least three differences between any pair of codewords, the decoder has made an extra
error on top of the two made by the channel, in effect making things worse.
Finally, consider the received sequence 11001, whose distances to the codewords
are shown in Table 1.5. In this case, there are two problems in reaching a decision.
The first, and obvious, problem is that there is no clear winner and, in the absence of
other information, it would be necessary to choose randomly between the two most
likely codewords. Secondly, we predicted at the outset that only single errors would
be correctable and the decoder may have been designed in such a way that it refuses
to decode if there is no codeword within a distance 1 of the received sequence. The
likely outcome for this example, therefore, is that the decoder will be unable to
Codeword Distance
00000 4
01011 3
10101 1
11110 2
Codeword Distance
00000 5
01011 2
10101 2
11110 1
Codeword Distance
00000 3
01011 2
10101 2
11110 3
14 ERROR CONTROL CODING
choose the most likely transmitted codeword and will indicate to the user the
presence of detected uncorrectable errors. This is an important outcome that may
occur frequently with block codes.
The probability that a sequence c of length n was transmitted, given the received
sequence r, is OJ'rJXc/lr,-). We wish to maximize this value over all possible code
sequences. Alternatively, and more conveniently, we take logarithms and find the
maximum of J]/=o l°§[/Kc/lr/)]- This can be carried out by a correlation process,
which is a symbol-by-symbol multiplication and accumulation, regarding the code
bits as having values +1 or — 1. Therefore we would be multiplying the assigned
probability by 1 for a code bit of 1 and by -1 for a code bit of 0. For hard decisions, a
codeword of length n at a distance d from the received sequence would agree in n — d
places and disagree in d places with the received sequence, giving a correlation metric
of 2n— d. Obviously choosing the codeword to maximize this metric would yield the
same decoding result as the minimum distance approach.
Even with soft decisions, we can adopt a minimum distance view of decoding and
minimize 53/=o {1 ~ 1°8 [/>(c/lr»)] }• The correlation and minimum distance approaches
are again identical provided we have an appropriate measure of distance. If the
received bits are given values vi equal to log[/?(l|r/)], then the distance to a bit value
1 is 1 — v/, the distance to a bit value 0 is v, and we maximize probability by minimizing
this measure of distance over all codewords.
The maximization of probability can also be achieved by maximizing some other
function that increases monotonically with it. This is the case for the log-likelihood
ratio log [p(\ |r/)/XO|r,-)]. To decode, we can maximize £], c, log[p(r,11 )//?(r,| 1)] where
Ci is taken as having values ± 1. This again corresponds to carrying out a correlation
of received log-likelihood ratios with code sequences.
As discussed in Section 1.7.3, it is likely that the received levels will be quantized.
For 8-level quantization, it might be convenient to use some uniform set of metric
values depending on the range within which the detected bit falls. Such a scheme is
shown in Figure 1.7.
Bearing in mind the fact that the log-likelihood ratio is linear with the analog
detected level from the demodulator, then the only deviation from an ideal 8-level
quantized
metric value
-1 0
normalized
"* detected value
quantization is that the end categories (000 and 111) extend to — oo and +00 and
therefore should have larger metrics associated with them. The effect on perform-
ance, however, is negligible. For E r / N 0 = 2 dB, the optimum soft-decision metric
values associated with this quantization arrangement are —3.85, —2.5, —1.5, —0.5,
+0.5, +1.5, +2.5, +3.85. Therefore the proposed metrics of —3.5 to +3.5 are very
close to optimum.
The assigned values can be scaled and offset in any convenient manner, so the
scheme in Figure 1.7 is equivalent to having bit values of (—7, —5, —3, —1, +1, +3,
+5, +7) or (0, 1, 2, 3, 4, 5, 6, 7). This last form is convenient for implementation of a
3-bit interface to the decoder.
Applying the correlation approach to a soft-decision case, the example in Table 1.4
might become a received sequence +2.5 +0.5 +1.5 +0.5 +3.5 with correlation values
as shown in Table 1.6.
The maximum correlation value indicates the decoder decision. In this case, the
decoder selects the correct codeword, illustrating the value of soft decisions from the
demodulator.
Although conceptually very simple, the method described above is very complex to
implement for many realistic codes where there may be very many codewords. As a
result, other decoding methods will need to be studied. For example, the parity
checks for the above code were produced according to very simple rules. Numbering
the bits from left to right as bits 4 down to 0, bits 4 and 3 constitute the information
and the parity bits are
bit 2 == bit 4
bit 1 = bit 3
bit 0 = bit 4 0 bit 3
error, parity bits 2 and 0 will be wrong. If bit 3 is in error, parity bits 1 and 0 will be
wrong. If both parity bits 2 and 1 fail, the error is uncorrectable, regardless of
whether parity bit 0 passes or fails.
We can now construct some digital logic to check the parity bits and apply the
above rules to correct any correctable errors. It will be seen that applying the rules
will lead to the same decodings as before for the examples shown. In the final
example case, where the sequence 11001 was received, all three parity checks fail.
This type of decoding procedure resembles the methods applied for error correc-
tion to many block codes. Note, however, that it is not obvious how such methods
can incorporate soft decisions from the demodulator. Convolutional codes, however,
are decoded in a way that is essentially the same as the maximum likelihood method
and soft decisions can be used.
it on the coded performance curve showing a different, in many cases lower, bit error
rate.
An example is shown in Figure 1.8 which shows the theoretical performance of
a BPSK (or QPSK) channel, uncoded and with a popular rate 1/2 convolutional
code. The code performance is plotted both with hard-decision demodulation and
with unquantized soft decisions, i.e. real number output of detected level from the
demodulator.
It can be seen that without coding, the value of E b / N 0 needed to achieve a bit error
rate of 10 -5 is around 9.6 dB. This error rate can be achieved with coding at
E b /N 0 around 7.1dB using hard-decision demodulation or around 4.2 dB using
unquantized soft-decision demodulation. This is expressed by saying that the coding
gain at a BER of 10 -5 is 2.5dB (hard-decision) or 5.4 dB (soft-decision). Real life
decoding gains would not be quite so large. The use of 8-level, or 3-bit, quantization
of the soft decisions reduces the gain by around 0.25 dB. There may also be other
implementation issues that affect performance. Nevertheless, gains of 4.5 to 5dB can
be expected with this code.
The quoted coding gain must be attached to a desired bit error rate, which in turn
will depend on the application. Note that good coding gains are available only for
relatively low required bit error rates and that at higher error rates the gain may be
negative (i.e. a loss). Note also that the quoted bit error rate is the error rate coming
out of the decoder, not the error rate coming out of the demodulator. In the soft-
decision example, the demodulator is working at E r /N 0 around 1.2dB, producing a
BER of around 5 x !0-2 out of the demodulator.
If we know the minimum distance of a block code, or the value of an equivalent
parameter called free distance for a convolutional code, we can find the asymptotic
2 3 4 5 6 7 8 9 1 0
l.0E+00
l.0E-01
Uncoded |
- Hard-decision!
Soft-decision !
Eb/N0 (dB)
coding gain, i.e. the gain that would be delivered if vanishingly small decoded error
rates were required. For unquantized soft-decision decoding of a rate R code with
distance d between the closest code sequences, the asymptotic gain is
(1.2)
If we have only hard decisions from the demodulator and can correct up to / errors
then
G
asymptotic = 10 log,0 [R(t + 1)] (1.3)
From the earlier simple block code example, we can see that the expected value of t
would be the largest value that is less than half the value of d. Thus the value of d in
Equation (1.2) is just less than twice the value of / + 1 in Equation (1.3). Asymptotic
coding gains are therefore almost 3 dB higher when unquantized soft-decision decod-
ing is used. As stated above, the use of 8-level quantization reduces the gain by about
0.25 dB.
Although we have solved one issue of comparability by the use of Eb/N0, there is
another that is regularly ignored. If we look at an uncoded channel and a coded
channel with the same BER, the characteristics will be completely different. On the
AWGN channel, the errors will occur at random intervals. On the coded channel
there will be extended error-free intervals interspersed with relatively dense bursts
of errors when the decoder fails. Thus if we are interested in error rates on larger
units of transmission, frames, packets or messages, the coded channel at the same
BER will give fewer failures but more bit errors in corrupted sections of transmission.
Assessing coding gain by comparing coded and uncoded channels with the same
BER may therefore be unfair to the coded channel. For example, out of 100 messages
sent, an uncoded channel might result in 10 message errors with one bit wrong in
each. A coded channel might produce only one message error but 10 bit errors within
that message. The bit error rates are the same, but the message error rate is better
on the coded channel. Add to this the fact that the detection of uncorrectable
errors is rarely taken into account in a satisfactory way (a significant issue for
many block codes), coding regularly delivers benefits that exceed the theoretical
figures.
Shannon showed that, using an average of all possible codes of length n, the error
rate over the channel is characterized by a probability of message error
Pe<e-'lE(Rl} (1.4)
where E, which is a function of the information rate, is called the random coding
error exponent. Any specific code will have its own error exponent and the greater
the error exponent the better the code, but there are calculable upper and lower
bounds to the achievable value of E. In particular, a positive error exponent is
achievable provided RI is less than some calculable value called the channel capacity.
Provided a positive error exponent can be obtained, the way to achieve lower error
probabilities is to increase the length of the code.
As was seen in Section 1.9, codes have a calculable asymptotic coding gain and
thus at high signal-to-noise values the error rates reduce exponentially with E b /N 0 , as
in the uncoded case. The error exponent is therefore proportional to Eb/N0.. The
difficulty with known codes is maintaining the error exponent while the length is
increased. All known codes produced by a single stage of encoding can hold
their value of error exponent only by reducing the rate to zero as the code length
increases towards infinity. For example, an orthogonal signal set, which can be
achieved by Frequency Shift Keying or by means of a block code, is sometimes
quoted as approaching the theoretical capacity on an AWGN channel as the signal
set is expanded to infinity. Unfortunately the bandwidth efficiency or the code rate
reduces exponentially at the same time. This limitation can be overcome by the use of
multistage encoding, known as concatenation, although even then the error expo-
nents are less than the theoretically attainable value. Nevertheless, concatenation
represents the closest practicable approach to the predictions of information theory,
and as such is a technique of increasing importance. It is treated in more detail in
Chapters 9 and 10.
As the most widely available performance figures for error correcting codes are for
the additive white Gaussian noise (AWGN) channel, it is interesting to look at the
theoretical capacity of such a channel. The channel rate is given by the Shannon-
Hartley theorem:
(1.5)
where B is bandwidth, S is signal power and N is noise power within the bandwidth.
This result behaves roughly as one might expect, the channel capacity increasing with
increased bandwidth and signal-to-noise ratio. It is interesting to note, however, that
in the absence of noise the channel capacity is not bandwidth-limited. Any two
signals of finite duration are bound to show differences falling within the system
bandwidth, and in the absence of noise those differences will be detectable.
Let N = B-No and S = R}Eh (NQ is the single-sided noise power spectral density,
RI is rate of information transmission (< C) and Eh is energy per bit of information),
then
20 ERROR CONTROL CODING
In the limit of infinite bandwidth, using the fact that Iog2 (jc) = loge (jc)/ log,, 2
gives
(1.6)
«V-1) (1.7)
Wo 1
This value can be thought of as imposing an upper limit to the coding gain
achievable by a particular coding and modulation scheme. The value of Eb/N0 to
deliver the desired error rate on the uncoded channel can be determined from the
modulation performance, and the corresponding coded value must be at least that
given by equation (1.7). In practice, these coding gains are difficult to achieve.
If we were to use a rate 1/2 code on a QPSK channel, a fairly common arrange-
ment, the value of rj is around 1.0, giving E b /N 0 = 1 ( = OdB). As has been seen
earlier, a rate 1/2 convolutional code may need over 4.5 dB to deliver a BER of 10-5.
It therefore falls well short of the theoretical maximum gain.
It must be stressed that Shannon merely proved that it was possible by coding to
obtain reliable communications at this rate. There is no benefit, however, in having a
21
good code if one does not know how to decode it. Practical codes are designed with a
feasible decoding method in mind and the problem of constructing long codes that
can be decoded is particularly severe. This seems to be the main reason why
approaching the Shannon performance has proved to be so difficult.
m M Gm (dB)
1 2 0.0
2 4 0.0
3 8 -3.6
4 16 -8.2
5 32 -13.2
6 64 -18.4
7 128 -23.8
8 256 -29.2
22 ERROR CONTROL CODING
The principal approach to designing codes for this type of system is to take a
constellation with m bits per symbol and to use a rate (m - 1)/m code so that the
information throughput will be the same as the uncoded constellation with m - 1 bits
per symbol and the performances can be compared directly. Convolutional codes of
this type are known as Ungerboeck codes and will be described in Chapter 2.
codewords
Code order
symbols
Transmission
order
Jim ymm
follows the diagonal sequence shown. Any burst of errors will affect symbols in the
transmission stream as shown and it can be seen that the burst must exceed n + 1
symbols in length before it affects two symbols of the same codeword. If the delays
are increasing by D for each symbol, then the separation of two symbols from the
same codeword is Dn + 1. In effect this is the interleaving degree.
The main differences between the two types of interleaving are that the convolu-
tional interleaver will extend the symbol stream through the presence of null values in
the delay registers, but block interleaving will have more delay because of the need to
fill the array before transmission can commence.
One might think that the block interleaver would introduce a delay of In symbols,
however it is possible to start transmission a little before the array is filled. The
encoder must have (A — 1)« + 1 symbols prepared by the time that A symbols are
transmitted; otherwise, the rightmost symbol of the top row will not be ready in time
for transmission (assuming that symbol is transmitted the instant it is prepared). The
delay is therefore (A - 1)« + 1 - A = (A - \)(n - 1) symbols. The same delay will
occur in the deinterleaver which writes the symbols into rows and decodes by
column, giving an overall delay of 2(A — !)(« — 1) symbols.
The convolutional interleaver introduces D + 2D + h (n - !)D = n(n -1)D/2
dummy symbols into the stream. The deinterleaver applies a delay of (n – l)D to the
top row, (n - 2)D to the second row, etc., introducing the same number of dummy
symbols. The overall delay is therefore n(n — l)D. As the interleaving degree is
nD + 1, the overall delay is (A - \)(n - 1), half the value of the block interleaving.
24 ERROR CONTROL CODING
where n is the total frame length and k is the amount of information in the frame. The
difference between n and k in this case will not be purely the parity checks of the code.
It will include headers, frame numbers and other fields required by the protocol.
For Go Back N (GBN-ARQ), there is no need for receiver buffering, but the
efficiency is lower. Every time x frames are received correctly, followed by one in
error, the transmitter goes on to frame x + N before picking up the sequence from
frame x + 1 . We can therefore say that
Now the probability of x frames being successful followed by one that fails is
pf(1 — p f ) x ; therefore
The sum to infinity of the series in the square brackets is l/pj-, so we find that
Pf
Hence
It may appear from this that an efficient GBN scheme would have a small value of
N, however the value of N depends on the round trip delays and the frame length.
Small values of N will mean long frames which in turn will have a higher error rate.
In fact it is the frame error rate that is the most important term in the efficiency
expression, with the factor k/n also playing its part to ensure that frames cannot be
made too small.
26 ERROR CONTROL CODING
The main difficulties with ARQ are that efficiency may be very low if the frame
error rate is not kept low and that the delays are variable because they depend on the
number of frame errors occurring. The delay problem may rule out ARQ for real
time applications, particularly interactive ones. The solution to the efficiency prob-
lem may be to create some sort of hybrid between FEC and ARQ with FEC
correcting most of the errors and reducing the frame error rate and additional
error detection resulting in occasional use of the ARQ protocols.
Some applications carry data for subjective appreciation where there may still be
some inherent redundancy. Examples include speech, music, images and video. In
this case, the loss of a part of the data may not be subjectively important, provided
that the right action is taken. Designing a concealment system is a signal processing
task requiring knowledge of the application, the source coding and the subjective
effects of errors. Possibilities include interpolation or extrapolation from previous
values. Hybrids with FEC are also possible.
Error concealment is often appropriate for exactly the applications where ARQ is
difficult or impossible. One example is digital speech where the vocoders represent
filters to be applied to an input signal. The filter parameters change relatively slowly
with time and so may be extrapolated when a frame contains errors. Another
example occurs with music on compact disc where the system is designed in a way
that errors in consecutive samples are unlikely to occur. The FEC codes have a
certain amount of extra error detection and samples known to contain errors are
given values interpolated from the previous and the following sample.
Error detection schemes or hybrids with FEC are usually based on block codes. In
general, we can use block codes either for error detection alone, for error correction or
for some combination of the two. Taking into account that we cannot correct an error
that cannot be detected, we reach the following formula to determine the guaranteed
error detection and correction properties, given the minimum distance of the code:
dmin>S+t (1.10)
where s is the number of errors to be detected and t ( < s) is the number of errors to
be corrected. Assuming that the sum of s and t will be the maximum possible then
dmin = S + t + 1
s=4 t =0
5=3 t=1
5=2 t=2
THE PRINCIPLES OF CODING IN DIGITAL COMMUNICATIONS 27
dmin=2t+1 (1.11)
The major purpose of incorporating coding into the design of any system is to reduce
the costs of the other components. Reliable communications can usually be obtained
by simple, yet costly, methods such as increasing power. A well-designed coding
scheme should result in a lower overall system cost for an equivalent or better
performance. If this objective is to be met, however, the designer needs to make a
careful choice and be aware of the whole range of available techniques.
Convolutional codes are highly suitable for AWGN channels, where soft decisions
are relatively straightforward. The coding gains approach the asymptotic value at
relatively high bit error rates, so that at bit error rates of 10–5 to 10–7 in Gaussian
conditions, convolutional codes are often the best choice. Many types of conditions,
however, can give rise to non-Gaussian characteristics where the soft-decision thresh-
olds may need to adapt to the channel conditions and where the channel coherence
may mean that Viterbi decoding is no longer the maximum likelihood solution. The
complexity of the decoder also increases as the code rate increases above 1/2, so that
high code rates are the exception. Even at rate 1/2, the channel speed which can be
accommodated is lower than for Reed Solomon codes, although it is still possible to
work at over l00 Mbits / second, which is more than enough for many applications!
Reed Solomon codes have almost exactly complementary characteristics. They do
not generally use soft decisions, but their performance is best in those conditions where
soft decisions are difficult, i.e. non-Gaussian conditions. In Gaussian conditions the
performance curves exhibit something of a 'brick wall' characteristic, with the codes
28 ERROR CONTROL CODING
working poorly at high bit error rates but showing a sudden transition to extremely
effective operation as the bit error rate reduces. Thus they may show very high
asymptotic coding gains but need low bit error rates to achieve such gains. Conse-
quently they are often advantageous when bit error rates below 10–10 are required.
Error rates as low as this are often desirable for machine-oriented data, especially if
there is no possibility of calling for a retransmission of corrupted data. The decoding
complexity reduces as code rate increases, and in many cases decoding can be
achieved at higher transmitted data rates. They can also, of course, be combined
with other codes (including convolutional codes or other RS codes) for concatenated
coding.
For the future, the so-called turbo codes are going to be of increasing importance.
These are tree codes of infinite constraint length, used in combination and decoded by
an iterative method. Usually two codes are used with one operating on an interleaved
data set. The decoding algorithms not only use soft decisions, they also provide soft
decisions on the outputs, and the output of each decoder is fed to the input of the other
so that successive iterations converge on a solution. The performance is extremely
good, giving acceptable error rates at values of Eb/ No little above the Shannon levels.
There are, however, several problems to be resolved including the existence of an error
floor making it difficult to achieve output BERs below 10–5or 10–6.
The above considerations certainly do not mean that other types of codes have no
place in error control. Many considerations will lead to the adoption of other
solutions, as will be seen from the discussions below. Nevertheless, mainstream
interests in future systems are likely to concentrate on Viterbi-decoded convolutional
codes, Reed Solomon codes and turbo codes, and the designer wishing to adopt a
standard, 'off-the-shelf solution is most likely to concentrate on these alternatives.
If information is segmented into blocks, then it will fit naturally with a block coding
scheme. If it can be regarded as a continuous flow, then convolutional codes will be
most appropriate. For example, protecting the contents of computer memories is
usually done by block coding because the system needs to be able to access limited
sections of data and decode them independently of other sections. The concept of
data ordering applies only over a limited span in such applications. On the other
hand, a channel carrying digitized speech or television pictures might choose a
convolutional scheme. The information here is considered to be a continuous stream
with a definite time order. The effects of errors will be localized, but not in a way
which is easy to define.
It is important to separate the structure of the data from the characteristics of the
channel. The fact that a channel carries continuous data does not necessarily mean
that the data is not segmented into block form. Less obvious, but equally important,
a segmented transmission does not necessarily imply segmented data. A TDMA
channel, for example, may concentrate several continuous streams of information
into short bursts of time, but a convolutional code may still be most appropriate.
With adequate buffering, the convolutional code on any stream may be continued
across the time-slots imposed by the TDMA transmission.
THE PRINCIPLES OF CODING IN DIGITAL COMMUNICATIONS 29
It is difficult to put figures on the data rates achievable using different codes. This is
partly because any figures given can quickly become out of date as technology
advances and partly because greater speeds can usually be achieved by adopting a
more complex, and therefore more expensive, solution. Nevertheless, for a fixed
complexity, there are some codes which can be processed more rapidly than others.
30 ERROR CONTROL CODING
The codes which can be processed at the highest data rates are essentially simple,
not very powerful, codes. Examples are codes used purely for error detection.
Concatenated codes using short block inner codes are not far behind because the
computations on the Reed Solomon codes are done at symbol rate, not bit rate, and
the block codes used are extremely simple. It follows that Reed Solomon codes alone
are in the highest data rate category. Viterbi-decoded convolutional codes are fast
provided the input constraint length is not too long, say no more than 9. BCH codes
can also be used at similar rates provided hard-decision decoding only is required.
Soft-decision decoding of block codes and the more complex concatenated schemes,
e.g. turbo codes, are capable of only moderate data rates.
Of course, the required data rate affects the choice of technology too; the more that
can be done in hardware the faster the decoding. Parallelism can increase decoding
speeds, but with higher hardware complexity and therefore cost. A data rate of a few
thousand bits per second could allow a general-purpose microprocessor to be used
for a wide range of codecs, but obviously that would be uneconomic for volume
production. Many of the influences of data rate on system design will be closely
bound up with economics.
If real time data processing is required, the decoder must be able to cope with the link
data rates. This may be achieved at the expense of delays by, for example, decoding
one sequence while the next is being buffered. The decoding delay may in some cases
become significant, especially if it is variable.
Forward error correction requires a decoding delay that, in most cases, depends on
the exact errors which occur. Nevertheless, there is usually a certain maximum delay
that will not be exceeded. Buffering the decoded information until the maximum
delay has expired can therefore produce a smooth flow of information to the
destination. Two major factors determining the delay will be the data rate and the
length of the code. Information theory tells us that long codes are desirable, but for
many applications long delays are not. Thus the maximum acceptable delay may
limit the length of the codes that can be used.
If no maximum decoding delay can be determined, then the decoded information
will come through with variable delays, which can cause havoc with real time infor-
mation. The main error control strategy that exhibits variable delays is ARQ because
one cannot guarantee that any retransmission will be successful. These problems may
be minimized by the use of a suitable ARQ / FEC hybrid.
These constraints drive the solution in opposite directions. In the absence of band-
width constraints one would use a low rate concatenated code to achieve high coding
gains or very low error rates. Very tight bandwidth constraints, making binary
modulation incompatible with the required data rate and error rates, require the use
of specially designed codes in conjunction with multilevel modulations. Traditionally
THE PRINCIPLES OF CODING IN DIGITAL COMMUNICATIONS 31
these have been convolutional codes, but block codes may be possible and turbo-coded
solutions are being developed.
Assuming that the major aim of coding is to reduce the power requirement for
a given error rate, high coding gains would appear to be desirable. There can be
no doubt that the highest gains are achievable using turbo codes or concatenated
codes. If the gain requirement is less stringent, convolutional codes with hard-
decision sequential decoding or soft-decision Viterbi decoding (to be described in
Chapter 2) provide the highest gains on a Gaussian channel.
Ideally one would design a coding scheme for the precise conditions encountered on
the channel. In practice, the channel may not be well characterized and the coding
scheme may have to show flexibility to cope with the range of possible conditions.
For slowly varying channel conditions which exhibit approximate Gaussian condi-
tions over appreciable periods of time, adaptive coding schemes are a natural choice.
These often use variable rate convolutional codes, or they may be based around
ARQ / FEC hybrids. For channels which may fluctuate rapidly between states,
producing mixtures of bursty and random errors, a wide variety of diffuse-error
correcting schemes, including interleaving, are available. Reed Solomon codes may
also be considered to fall into this category; although optimized neither for random
errors or general bursts, their low redundancy overhead makes them a good choice
for a variety of channel conditions.
1.15.8 Cost
Any error control scheme is merely a part of a larger system and its costs must be in
proportion to its importance within the system. Bearing in mind that error rates may
be reduced by the use of higher transmitted power, the aim of coding is to be more
cost-effective than other solutions. That, however, is often not the main way in which
cost constraints are experienced in a coding system; the major part of the costs of
error control are incurred at the decoder, placing the burden of the economics onto
the receiving equipment. Since the owners of transmitting and receiving equipment
may be different, the economic considerations may not be combined to optimize
overall system costs. Decoder costs must be assessed in terms of what the receiver will
be prepared to pay.
A number of fairly straightforward rules may be stated. Firstly as previously
indicated, the decoder costs dominate in a forward error correction scheme. Error
detection is therefore much cheaper than error correction. High data rates will cost
more than low data rates. Complex codes with multiple-error correction will
cost more than simpler codes. For many applications, however, the main factor
affecting cost will be whether there is a codec available commercially or whether it
will need to be developed specially. Development costs must be spread across the
number of receivers, and if the market is small or particularly cost-sensitive it may be
32 ERROR CONTROL CODING
impossible to develop a special codec for the particular needs of the application. In
that case, the choice will be severely limited.
Any very specific advice about commercially available codecs would ensure that
this book would quickly be out of date. As with all modern technologies, the product
range is expanding and getting cheaper. Rate 1 /2 Viterbi decoders are available and
popular, and may incorporate puncturing for higher rates or for adaptable coding
schemes (although the latter involve many other system complexities and costs).
Certain Reed Solomon codes are being adopted as standard and codecs are becoming
available. Often this will be a spin-off from a particular mass market, such as
compact disc players.
Although it seems a shame to sound a negative note, I believe that many interesting
ideas in error control will never be implemented simply because their potential market
will not make the development costs worthwhile. Similarly many engineers working on
error control techniques will never be allowed to design the best system technically;
they will be forced to choose the best of what is available. Those who wish to have a
relatively free hand should work on applications where the potential market is large or
not very cost-sensitive. The same constraints apply, of course, in many other areas.
Some would say that is what engineering is all about and error control is, after all, an
engineering topic rather than a mathematical one. The mathematics is the servant of
the engineer, and the engineering is the really difficult part.
1.16 CONCLUSION
In this chapter we have been concerned mainly with general concepts and back-
ground. There are several good modern books on digital communications that
include a treatment of error control codes [2–4]. These can be consulted for more
information about digital modulations implementation issues and applications. They
can also be used to provide an alternative view of error control coding issues that will
be treated later in this book. Another large subject given very brief treatment here is
the general topic of information theory, and other sources [5, 6] are recommended for
further reading.
The next chapter of this book deals with convolutional codes, which are the most
commonly adopted codes in digital communications. Chapter 3 will cover linear
block codes and a subset of these codes, cyclic codes, will be treated in Chapter 4.
The construction of cyclic codes and the decoding methods for multiple-error correc-
tion require a knowledge of finite field arithmetic, and this is covered in Chapter 5.
Chapter 6 then deals with BCH codes, a large family of binary and nonbinary codes,
but concentrating on the binary examples. The most important nonbinary BCH
codes are Reed Solomon codes and these are treated in Chapter 7. Chapter 8 then
deals with performance issues relevant to all block codes. Multistage coding is
introduced in chapter 9. Codes using soft-in-soft-out algorithms for iterative decod-
ing are covered in Chapter 10.
It should not be assumed that the length of the treatment of different codes
indicates their relative importance. Block codes have a very strong theoretical
THE PRINCIPLES OF CODING IN DIGITAL COMMUNICATIONS 33
basis, but for many applications the chapters on convolutional codes and on iterative
decoding will be the most relevant. Iterative decoding can, however, be applied to
block codes and familiarity with Chapters 4 and 9 will certainly help in obtaining the
most from Chapter 10.
1.17 EXERCISES
1 A transmitter sends one of four possible messages. The most likely occurs with a
probability of 0.5 and is represented by the value 0. The second most likely occurs
with a probability of 0.25 and is given the representation 10. The other two
messages each occur with a probability of 0.125 and are given the representations
110 and 111. Find the mean information content of the messages and the mean
number of bits transmitted. Compare with the case where a fixed length repre-
sentation is used.
2 Find the value of Er /N0 needed by BPSK or QPSK modulation to achieve a bit
error rate of 10 –3 over an AWGN channel.
5 Prove that, for a linear code, the distance structure is the same viewed from any
codeword.
7 Find the maximum coding gain that could be achieved for BER = 10–6 using
QPSK modulation over an AWGN channel and a rate 1/3 code.
8 A block code has dmin = 8. Find the maximum guaranteed error detection if
maximum error correction is to be carried out. How would this change if only
single-error patterns were to be corrected? Find the amount of error correction
achievable if an extra three bits in error should be detectable.
10 Assuming the same propagation delays and the same corrupted frames as
question 9, find how many frame intervals would be needed to transfer 7 frames
if SR-ARQ were used, assuming
(a) an infinite receiver window
(b) a minimum receiver window to operate SR-ARQ.
Quantify the receiver window size needed for part (b).
1.18 REFERENCES
1 J. Massey, Coding and Modulation in Digital Communications, Proceedings of the Inter-
national Zurich Seminar on Digital Communications, 1984.
2 S. Haykin, Communication Systems, 4th edition, John Wiley & Sons, 2001.
3 B. Sklar, Digital Communications: fundamentals and applications, 2nd edition, Prentice
Hall, 2001.
4 J.G. Proakis, Digital Communications, 4th edition, McGraw Hill, 2001.
5 S.W. Golomb, R.E. Peile and R.A. Scholtz, Basic Concepts in Information Theory and
Coding, Plenum Press, 1994.
6 R.E. Blahut, Principles and Practice of Information Theory, Addison Wesley, 1987.
2
C onvolutional codes
2.1 INTRODUCTION
In Chapter 1 it was explained that codes for error control generally fell into two
categories, namely block codes and convolutional codes. Many telecommunications
applications have used convolutional codes because of their ability to deliver good
coding gains on the AWGN channel for target bit error rates around 10–5.
As background to this chapter most of the first chapter is relevant, even though the
examples in Chapter 1 were based on a block code. The main decoding method,
Viterbi decoding, is indeed an implementation of the maximum likelihood decoding
that was explained there. This means that the discussion on soft-decision decoding
will be relevant as it will almost always be implemented in conjunction with Viterbi
decoding. Convolutional codes are also linear, as previously defined.
input
Quest. XXX. Doth God leave all mankind to perish in the state of
sin and misery?
Answ. God will not leave all mankind to perish in the state of sin
and misery, into which they fell by the breach of the first
covenant, commonly called, the covenant of works; but of his
mere love and mercy, delivereth his elect out of it, and bringeth
them to an estate of salvation by the second covenant,
commonly called the covenant of grace.