0 EURASIP Journal on Wireless Communications and Networking

a SpringerOpen Journal

RESEARCH Open Access

Distributed joint source-channel code design for GMAC using irregular LDPC codes

Iqbal Shahid and Pradeepa Yahampath*

Abstract

Separate source and channel coding is known to be sub-optimal for communicating correlated sources over a Gaussian multiple access channel (GMAC). This paper presents an approach to designing distributed joint source-channel (DJSC) codes for encoding correlated binary sources over a two-user GMAC, using systematic irregular low-density parity check (LDPC) codes. The degree profile defining the LDPC code is optimized for the joint source probabilities using extrinsic information transfer (EXIT) analysis and linear programming. A key issue addressed is the Gaussian modeling of log-likelihood ratios (LLRs) generated by nodes representing the joint source probabilities in the combined factor graph of the two LDPC codes, referred to as source-channel factor (SCF) nodes. It is shown that the analytical expressions based on additive combining of incoming LLRs, as done in variable nodes and parity check nodes of the graph of a single LDPC code, cannot be used with SCF nodes. To this end, we propose a numerical approach based on Monte-Carlo simulations to fit a Gaussian density to outgoing LLRs from the SCF nodes, which makes the EXIT analysis of the joint decoder tractable. Experimental results are presented which show that LDPC codes designed with the proposed approach outperforms previously reported DJSC codes for GMAC. Furthermore, they demonstrate that when the sources are strongly dependent, the proposed DJSC codes can achieve code rates higher than the theoretical upper-bound for separate source and channel coding.

Keywords: Gaussian multiple-access channels; Distributed joint source-channel coding; LDPC codes; EXIT analysis

1 Introduction

Wireless communication of multiple correlated information sources to a common receiver has become an important research problem due to potential applications in emerging information gathering systems such as wireless sensor networks (WSNs) [1]. Most of the recent work on this problem has been focused on approaches based on the separation of source and channel coding, which rely on using distributed source coding (DSC) [2] to first generate independent bit streams from two sources and then to use a multiple-access method (such as TDMA, FDMA, or CDMA) [3] to convert a multiple-access channel (MAC) into a set of orthogonal channels. While it is known that for communication of correlated sources over orthogonal channels, the source-channel separation is optimal [3-5], the same does not hold true for a MAC [6-8]. Hence, there can be a loss of performance when

Correspondence: Pradeepa.Yahampath@umanitoba.ca

Department of Electrical and Computer Engineering, University of Manitoba,

75, Chancellor's circle, Winnipeg, R3T5V6, Canada

separate source and channel coding is used to transmit correlated sources over a MAC. This is because when the sources are correlated, even if the transmitters cannot communicate with each other, it is possible to generate correlated inputs to a MAC by using a DJSC code and thereby improve the performance relative to a system with independent channel inputs. In contrast, with separate source and channel coding, distributed source coding of correlated sources yields independent bit streams, and hence, the MAC inputs cannot be made dependent unless the transmitters are allowed to collaborate in channel coding. Therefore, DJSC coding can be expected to outperform separate source and channel coding in systems such as WSNs which are equipped with low-complexity, narrow-band sensors designed to communicate only with a common information gathering receiver.

DJSC coding of correlated sources for a GMAC has been studied sparsely in the literature. While there is no known tractable way to optimize a DJSC code for a given set of correlated sources and a MAC, a sub-optimal but effective and tractable framework is to encode each source using

Springer

© 2014 Shahid and Yahampath; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

an independent channel code in such a manner that the resulting dependence between the MAC input codewords can be exploited by a joint decoder [9,10]. In particular, the use of a systematic channel code for each source preserves the dependence between the information bits of the MAC input codewords. For example, [9] presents an approach in which much of the correlation between the sources is preserved in MAC input codewords by encoding each source using a systematic low-density generator matrix (LDGM) code. However, as LDGM codes exhibit a high error floor due to their poor distance properties, this approach requires the use of two concatenated LDGM codes for each source to achieve good performance which increases the delay and complexity. Furthermore, no known method exists for designing the LDGM codes to ensure that the codes are in some sense matched to the inter-source correlation and the channel noise level. An improved system design based on LDGM codes is presented in [10], which however requires an additional channel between each source and the common receiver. In another closely related work, Roumy et al. [11] consider the joint design of LDPC codes for independent sources transmitted over a two-input GMAC. The design of LDPC codes for correlated sources transmitted over orthogonal channels appears in [12].

In contrast to a previous work, in this paper, we present a DJSC code design approach for a pair of correlated binary sources, in which the degree profile of a systematic irregular LDPC (SI-LDPC) code is optimized for the joint distribution of the two sources and the signal-to-noise ratio (SNR) of the GMAC. Our motivations for using SI-LDPC codes are the following: (1) systematic codes can be used to exploit inter-source correlation in joint decoding of the two codes, (2) LDPC codes can be optimized by linear programming, in conjunction with the EXIT analysis of the belief propagation (BP)-based joint decoder, and (3) LDPC codes are known to be capacity achieving for a single-user case [13] and hence will exhibit very good performance in coding correlated sources as well. One of the key issues addressed here is the mutual information computation (as required for EXIT analysis) for messages passed from factor nodes in the joint factor graph of the two LDPC codes, referred to as source channel factor (SCF) nodes, which represent the joint probabilities of the two sources and the output conditional probability density function (pdf) of the GMAC. It is shown that the analytical computation of mutual information based on additive combining of incoming LLRs in variable nodes and parity check nodes of a factor graph as done in single LDPC codes does not apply to SCF nodes. In order to make the mutual information computation in EXIT analysis, tractable using a Gaussian approximation [14], we propose a simple numerical approach based on Monte-Carlo simulations to fit a Gaussian pdf to outgoing LLRs

from the SCF nodes. Simulation results show that codes designed based on this method can not only outperform previously reported GMAC codes for both independent and correlated sources [9,11], but can also achieve code rates higher than the theoretical upper-bound for independent sources over the same GMAC, when the sources are strongly dependent.

This paper is organized as follows: Section 2 formulates the DJSC code design problem addressed in this paper and the code optimization procedure is presented in Section 3. Section 4 studies the problem of modeling the pdf of outgoing LLRs from SCF nodes and presents a numerical method for computing the mutual information of these messages in the EXIT analysis. Section 5 presents and discusses the simulation results. Conclusions are given in Section 6.

2 Problem setup

A block diagram of the system under consideration is shown in Figure 1. Let U1 and U2 be two dependent, uniform binary sources. Let the dependence between the two sources be described by the inter-source correlation parameter a e[0,0.5], where P(U1 = U2) = a. A sequence of source bits from Uk, k = 1,2, is encoded by a source channel code to produce a channel codeword whose bits are modulated to produce the GMAC input Xk e {+1, —1} in equivalent base-band representation. The output of the GMAC Y e R can is given by

Y = X1 + X2 + W, (1)

where W ~ N (0, a2) is the channel noise and N (p, a2) denotes the Gaussian pdf with mean p and variance a2. In general, the maximum sum rate achievable over GMAC for two dependent sources is not known. However, when the sources are independent, i.e. a = 0.5, it is known that the maximum sum rate achievable by any code design is I(Xi, X2, Y) [3]. In the case of dependent sources, we can consider I(X1, X2, Y) as an upper-bound to the achievable sum rate. Consider the direct transmission of the sources so that P(X1, X2) = P(U1, U2). In Figure 2, we have plotted I(X1, X2, Y) of a GMAC with noise variance a2 as a function of a for different values of a2. Notice that the maximum of I (X1, X2, Y) depends on (a, a 2), which shows that optimizing the codes for the values of these parameters will result in higher sum rates for dependent sources over the same GMAC, compared to independent sources.

The optimal DJSC code for the given GMAC must induce a distribution P(X1, X2) which maximizes the sum rate of the two channel inputs [3]. While there appears to be no known tractable approach for designing such a code, the main idea pursued in this paper is to use a systematic channel code for each source, so that the two sources are essentially transmitted directly over the GMAC and therefore P(X1, X2) = P(U1, U2) for systematic bits of the

Figure 1 Block diagram of the system considered in this paper.

channel input codewords (the parity bits of each source are related to information bit as given by parity-check equations of the code [15]). The two channel codes are decoded by a joint decoder which observes the channel output Y. This approach essentially exploits the intersource correlation to enhance the performance of channel codes. In particular, if two sources are independent, then each channel code requires a sufficient number of parity bits to correct the errors due to channel noise and the mutual interference between the the two independent bit streams. However, when the two sources are dependent,

the joint distribution P(X\, X2) of the information bits of the two channel input codewords provide an additional joint decoding gain and hence the number of parity bits required for encoding each source is reduced, or equiv-alently the achievable sum rate is higher. With practical (finite length) channel codes, this implies that the same decoding error probability can be achieved at a higher sum rate. Note that by construction, the aforementioned DJSC coding scheme requires that the code length n and the number of systematic information bits m (and the code rate Rc = m/n) be identical for both sources, and

therefore, the resulting designs correspond to symmetric rates. Achieving asymmetric rates will possibly require some form rate splitting [16] and will not be considered in this paper.

The code design approach presented in this paper is based on systematic irregular LDPC (SI-LDPC) codes. First, consider an «-bit SI-LDPC code [17] whose parity check matrix H can be represented by a factor graph with code bit variable (CBV) nodes x(1),..., x(n) and parity check factor (PCF) nodes (representing parity check equations), channel output variable (COV) nodes y(1),..., y(n), and the channel factor (CF) nodes. In the case of a Gaussian channel, a COV node represents the conditional pdf p (y(n)\x(n)). The channel outputs are decoded by applying the BP algorithm to the factor graph [17]. For the purpose of code design, a length n SI-LDPC code can be completely specified by the parameters (n, k(x), p(x)), where k(x) = kixi-1 and p(x) =

pixi-1 are the edge-perspective degree polynomials of variable nodes and parity check nodes, respectively, and Xi (resp. pi) is the fraction of edges connected to CBV (resp. PCF) nodes of degree i (a degree of a node is the number of edges connected to it), satisfying the constraints Y^,i ^ = 1 and ^i pi = 1 [17]. The parameters dcmax and dvmax are typically chosen in such a manner that the sparsity of the corresponding factor graph is maintained (i.e., the edges in the factor graph grow linearly with the codeword length [17]). It is known that a concentrated degree polynomial of the form p(x) = px?-2 + (1 — p)xs for some s > 2 and 0 < p < 1 is sufficient for achieving near optimal performance ([13], Theorem 2).

Now consider, a two-input GMAC with an SI-LDPC code applied to each input. Since (1) is symmetric with respect to X\ and X2 and the same rate is used for both sources, the same channel code can be used for both sources. While the parity check matrix H of each SI-LDPC

code whose code bits are xk(1), ■ ■ ■, xk(n) can be represented by a factor graph, for the joint decoding of the two codes, the combined factor graph as shown in Figure 3 has to be used, where the COV nodes y(1), ■ ■ ■ ,y(n) are linked to factor nodes y(i),x1(i),x2(i)), i = 1,■■■,n which represent (combined) SCF nodes. As described later in this paper, the message passing to and from these nodes in BP decoding is also crucial to the design of the codes as well. To determine the $(■), consider the maximum a posteriori (MAP) decoding of the codeword xk = (xk(1), ■ ■ ■, xk(n)) transmitted on GMAC input k = 1,2, based on the GMAC outputs y = (y(1),■■■,y(n)). Let

xk'] denote those code bits in xk, except xk(i). Also, for k e {1,2} define

1 if k = 2 2 if k = 1

Then, it is easy to verify that the MAP decoded value of the ith bit of the input codeword of GMAC input k is given by

xk(i) = arg max Vf"(xv x2,y), (2)

xk(i)e±1 V 5 "

xk] -k

where i = 1,..., n,

f (x1,x2,y) = p(y\x1,x2)I{x1 e Cjix e C} = ^rjp( y( j)\x1( j), x2 ( j))P(-l(j)' x2 (;))j

X ix e C}I{x2 e C}, = |ntj (y()x1(j),x2 j))j I{x1 e C}I{x2 e C},

Figure 3 Combined factor-graph used for joint decoding of the two LDPC codes. Bit remapping is used to convert the systematic channel code Xk (1), ■ ■ ■, Xk(n), into equivalent sparse graph form (factor graphs on either side).

C denotes the set of all codewords of the code, I{-} denotes the indicator function, and

fy{y(j)< X1(j), X2(j)) = p(y(j)\X1(j), X2(j))P(X1(j), X2(j)). (4)

In the factor graph, representation of (3), each factor node represents a term in the product [17]. As usual, the factors I{x1 e C} and I{x2 e C} are represented by the PCF nodes of the two codes, respectively. On the other hand, each term &(■), i = 1,...,n, which is a function of the code bits x1(i) and x2(i), and the channel output y(i) is represented by a SCF node as shown in Figure 3. As the codes are systematic, for information bits P(x1 (i), x2 (i)) is identical to the joint distribution P(u1, u2) of the source bits. For parity bits of an LDPC code (which has a dense generator check matrix), it can be assumed that P(x1(i),x2(i)) = P((x1(i))P((x2(i)) with P(x1(i)) = P(x2(i)) = 0.5 [18].

Sparse parity check matrices obtained through the EXIT analysis design procedure does not necessarily correspond to systematic generator matrices. As usual, the codes can be converted to systematic form by using Gaussian elimination. However, the resulting codes have dense parity-check matrices which makes the computational complexity of BP decoding impractically high. In order to get around this problem, a bit re-mapping operation is used in the joint decoder to rearrange the systematic codebits, so that the codewords correspond to sparse matrices, as shown in Figure 3.

3 Code optimization

A well-known simple method for constructing a near-capacity achieving SI-LDPC code for a single-input AWGN channel with noise variance a2 and some fixed p(x), is to determine the coefficients Xi which maximize the rate of the code under BP decoding, subject to Gaussian approximation (GA) for the messages passed in the decoder [13]. The code design in this case is a linear programming problem of the form ([17], Ch. 4): maximizeXi ^i>2 Xi/i, subject to constraints (1) ^i Xi = 1, (0 < Xi < 1) (normalization constraint), (2) X2 < exp(212 (j — 1)Pj (stability condition), and (3) a linear inequality to ensure the convergence of the BP algorithm ([13], Sec. 3) (decoder convergence constraint).

In optimization of an SI-LDPC code for two correlated sources to be transmitted over a GMAC, the objective is to determine the degree distribution X(x) which maximizes the code rate Rc, given the source correlation parameter a, the GMAC noise variance a2, and some fixed p(x). Clearly, the objective function and the constraints (1) and (2) remain the same as for single channel code design. However, since the two sources are decoded jointly using a combined factor-graph, the third constraint has to be re-established. Specifically, let the mutual information between the code bits Xk and the LLRs passed from the

corresponding CBV nodes to the PCF nodes be lV%p(l), where l is the iteration in EXIT analysis. Then, for the convergence of BP decoding of the codes on the combined factor graph, it is required that

p(i +1) > i(kX p(i), i = 1,...,

for k = 1,2. In the following, Iv-lp will be shown to be linear in Xi. Since the objective function and the constraints are all linear in the code parameters Xi, we can use a linear program to solve the problem. The rest of this section is devoted to EXIT analysis of BP decoding on the joint factor graph and the iterative computation of llkXp(l).

The details of BP decoding algorithm and the EXIT analysis for single-user LDPC codes can be found in [17,19]. In EXIT analysis, the analytical computation of mutual information is feasible only if the outgoing LLRs from the nodes in the factor graph have a Gaussian (or Gaussian-mixture) distribution [19]. When the channel is binary-input AWGN (BiAWGN) channel, the outgoing LLR values are Gaussian distributed [14]. For other types of channels, the Gaussian approximation of LLRs is known to be a good approximation, due to the universality of the LDPC codes (a code designed for one type of channel performs well on a another type of a channel) [15]. The analytical expressions for iterative mutual information updates through CBV nodes and PCF nodes in EXIT analysis is well known [17]. In particular, the mutual information update through a CBV node stems from the message update through that variable node and the central limit theorem. That is, since an outgoing message of a given node has the mean equal to the sum of means of incoming messages to that node, given a reasonably high node degree, the outgoing message is approximately Gaussian. The mutual information update for a PCF node on the other hand relies on the deterministic relationship between the PCF node and the CBV nodes connected to it, as defined by the parity check equations. As a result, the mutual information update for a PCF node can be computed by simply using duality relationship that it has with a CBV node [20].

In the case of LDPC codes applied to two correlated sources transmitted over a GMAC and decoded by using a combined factor graph, the mutual information updates through CBV nodes and PCF nodes can be analytically computed as in the case of single-user LDPC codes. Denote the messages passed between various nodes in the factor graph as in Figure 4. Accordingly, the message passed from a degree dv CBV node of the code k e {1,2}, along its jth edge to a PCF node is given by

pkV,l 1 ■

PCF nodes of code 1

COV node i

^ m(1) m(1) X\(l) '"u-m "'«-m

j — th edge

mv—ts X2(t)

^P.J / CBV node i of code 1

SCF node i

(j>{y{i),Xl{i),X2{i))

PCF nodes of code 2

CBV node i\ mn-^P'3 of code 2

Figure4 Message (LLR) flow through the ith SCF node in the combined factor graph (i = 1,...,n).

and the message passed from a PCF node of degree dc on itsjth edge to a CBV node is given by

m'— vj = 2tanh

(k) v—^p,i

see ([17], Ch. 2). Similarly, the LLR passed from a CBV node to a SCF node can be formed by the summation of incoming LLRs from the PCF nodes, i.e.,

dv—1

(k) . p— v,i.

Note however that the LLRs computed by an SCF node cannot be formed as the sum of incoming LLRs, but are determined by (4). In the Appendix, it is shown that when sources are uniformly distributed

= log I

'P(x{p = +1jy) v P(x(1) = -1 jyi ,

qi,i(yi)(1 - a)emv—s + q\,-\(yi)a q-1,1(yi)aem<^s + q-1,-1(yi)(1 - a),

where qj,k(y) ± f (yijx(1) = j,x(2) = k), j, k e {-1, +1},

and we have used the fact that mV2is = Similarly,

P(X2=1)

P(X2=-1)

ms(2—) v = log

q1,1(yi)(1 - a)emv—s + q-1,1(yi)a q1,-1(yi)aemV——s + q-1,-1(y)(1 - a) t

4 EXIT analysis

Let the mutual information between two random variables r and s be I(r; s) and define the following: iV——p =

I(Xk; mEp), /Pk_lv ^ I(Xk; mpkkkv), 4k = I(Xk; m<kks), and 4kv = I(Xk; m(kkv). In the l + 1th iteration of EXIT analysis, giveniv%p(l) and4kks(l),Ipkv(l+1) and4kv(l+ 1) are first updated, followed by I^lp(l +1) and ^(l +1). The convergence of the degree polynomial X(x) to a valid code is then verified by (5).

Let Ik = E{mlk\pj}, where v represents degree d CBV nodes in the factor graph, d = 2,..., dvmax. Given that all incoming messages to a CBV node are independent, the outgoing message is given by

= (d - 2)t' —V + t^s—v,

Under the assumption that LLRs generated by a CBV node are Gaussian with mean i and variance 2|, the mutual information I between the code bit represented by the CBV node and the LLR is given by

I = J (t)

where J(■) is given by Equation twenty four of [21]. Thus, the mutual information between degree d CBV nodes and the messages passed to PCF nodes is

I— = J ((d - 2)J-1 (l<—v) + J-1 (i

Therefore,

IV——p = £ w ((d - 2)j-1 (4—v) + J-1 (ii——.

Let mutual information between a CBV nodes and the messages it receives from a degree d PCF nodes be Ip——V.

Then, from the duality approximation ([17], pp. 236), it follows that,

r(k) _ JJOp

Hp—v - /_, Pd H

(k) j(k,d) -p—v

1 -E {(d - 1)J-1(1 - p)).

Furthermore, the average mutual information between CBV nodes and the messages passed to SCF nodes is given by

= E (id - i)j-1 siSXdV,)). (16)

Next consider the computation of mutual information ¡Xv and ¡¡Xv between the CBV nodes and the messages m~XXv and mfXv as given by (9) and (10), respectively, passed from SCF nodes. Unfortunately, it is not straightforward to compute these quantities, as the mean values of mfX v, k = 1,2 cannot be computed using an analytical

relation as in (11). In this case, /Xv is a function of /VXs, a, and a2. As will be demonstrated below, msXv is in general not Gaussian-distributed, even if mVXs is Gaussian. However, in order to be able to apply EXIT analysis based on (12) suppose that, by using a suitable approach, we model the pdf m^Xv by a Gaussian function with variance equal to twice the mean. Then, we can obtain the required mutual information simply as

H (k) = s—^ v

J v) •

On the other hand, if we model the pdf of m(sXv by a more general Gaussian mixture

a{k)Nii4k), 2/4k)) + a^Ni/f, 2/f),

where af\ af, / f ^, and /f are now functions of /VXs, a, and a2, then [20]

l(X v = a(k)J/k)) + a2k)J if). (18)

Next, we present an approach to numerically estimate the mean values /SXv. In order to get an idea about the pdf of m^Xv, let the LLR mVXs ~ N (/VX*, 2/VX^ passed from a CBV node v of X2 to a SCF node s as shown in Figure 4. Figure 5 shows the histograms of mSXv obtained through Monte-Carlo simulations for several values of a and |V-L, suggesting that the pdf of mSXv can be highly skewed or even bi-modal depending on the values of a and /v2X) s. Similar observations hold for msX2) v. Therefore, the problem at hand is to find a suitable method to fit a Gaussian pdf to mskX) v, which is effective for range values of a and a2.

For approximating an arbitrary distribution by a Gaussian, the transformation-based methods are widely used, see [22,23]. These methods are essentially parametric where the parameter estimation is usually done through methods such as maximum likelihood (ML) or Bayesian inference. They also require performing the inverse transform operation once the required processing is done on the Gaussian density. For our problem, both parameter estimation and inverse operation can make the LDPC code optimization algorithm intractable. Since our code optimization procedure is based on mutual information transfer through SCF nodes as computed in (17), we seek a computationally simple Gaussian approximation which yields the maximum mutual information Is(X1) v for the messages m(sXv, for given /V-L, a, and a2. To this end, we consider the following three approaches.

• Mean-matched Gaussian approximation - The mean / is estimated from observations and variance set to 2/.

• Mode-matched Gaussian approximation - The mode m of the pdf is estimated from observations and we set the mean / = m and variance 2/. The fitting of a Gaussian distribution at the mode of an arbitrary distribution is closely related to the Laplace approximation [24].

• Two-component Gaussian mixture approximation -The density is approximated by fitting a two component Gaussian mixture

a1Ni/1, a-j2) + a2Ni/2, a|), where /1, /2, a2, a^, a1, and a2 are estimated from the observations.

The rationale for using these approximations can be seen from Figure 5. Note that for some values of a, /.iVXs and channel noise variance a2, the density of ms1X) v displays two dominant modes. Note also that, for some values, the density does resemble a Gaussian (for which the mean and mode are equal), while for some values, the density is uni-modal but highly skewed. In particular, the skewed density functions suggest the use of the mode-matched approximation. In order to compare the performance of these approaches on the basis of mutual information of outgoing messages from SCF nodes, we present in Figures 6 and 7 Is(X1) v as a function of IvX2) s for two cases selected from Figure 5. In Figure 6, we compare the mean-matched and mode-matched approximations for a case in which the density is uni-modal, and hence, the Gaussian mixtures do not provide a better fit. In Figure 7, we have chosen a case in which the histogram is bi-modal and hence a Gaussian mixture is a better fit. It is however evident that in either case, the highest output mutual information is achieved with the mode-matching approach. The mode-matched method was also found to yield the maximum output mutual information for various

=1 , a = 0.01 ^s = 1.8 , a = 0.01 ^s = 3.24 , a = 0.01

A 10 0 1 600 400 : 0 -1 0 0 10 -10 0 10

|i(2) =1 , a = 0.1 - A 10 0 1 n® s = 1 , a = 0.2 600 400 200 0 0 -1 =1.8, a = 0.1 À 0 0 1 n<2) = 1.8 , a = 0.2 600 400 200 0 0 -1 = 3.24 , a = 0.1 0 0 10 H® s = 3.24 , a = 0.2

-■- A 600 400 200 0 1 1000 500 0 A

Figure 5 Histograms of outgoing messages m®v from SCF nodes for different values of incoming message mean s for different values a ( a2 = 5).

other values of a, /IXs and a2. Furthermore, as will be shown (see Figure 8), the joint codes designed by using this approximation also yield the lowest decoding bit error probability compared to the other two approaches.

With all three approximation methods the mean value /sskX) v of the pdf of mssXk) v can be estimated using Monte-Carlo simulation. For example, /sskX) v can be estimated

using mean-matched or mode-matched approximations as follows:

Step 1: Given the mean value /VXs generate a sufficiently

large number of N samples of mVXs ~ Ni/VXs, 2/4X-s). Step 2: Given P(X1, X2) and a2, generate N samples from the pdf of the GMAC output y.

Input mutual Information

Figure 6 Mutual information update through SCF nodes. v (output mutual information) as a function of VXs (input mutual information) for ßVXs = 1.8 and a = 0.01. The corresponding message histogram is shown in Figure 5.

Figure 7 Mutual information update through SCF nodes. /(—— v (output mutual information) as a function of V—— s (input mutual information) for tV—— s = 3.24 and a = 0.01. Note the corresponding bi-modal histogram in Figure 5.

Step 3: Use (9) (if k = 1) or (10) (if k = 2) to compute the corresponding N samples of m(skkv. Estimate the mean m of the pdf of ms(kk) v using either mean-matched or mode-matched approximations described above. Set i s(kk) v = m and var(m(ki v) = 2m.

In the case of Gaussian mixture approximation, mean values n, |2 and the weights ai, a2 can be estimated from the sample set of mkv [25].

5 Simulation results

In this section, we present simulation results obtained by designing DJSC codes for a pair of uniformly distributed binary sources (whose statistical dependence is given by a) and a GMAC with noise variance a2.

First, we investigate the impact of the three message density approximation considered in Section 4. As evidenced by Figures 6 and 7, codes designed by using the mode-matched approximation gives the maximum output

<s. . .

> ^........

^ ■ ■ " ■ ■ ■ ■

■ "N

■ : 4

—<1 —Mode matche d

. —<>— Two-component Gaussian mixture —I— Mean matched

Codeword length (bits)

Figure 8 Decoding error probability of codes designed with three approximation methods shown in Figure 7 (a2 = 5, a = 0.01).

mutual information from a SCF node. In order to compare the three approximation methods on the basis of code performance, in Figure 8, we present the probability of decoding error of codes designed using each of these methods. Here, the correlation parameter a and the channel noise variance a2 are identical to those used in Figure 7 (for which the density of outgoing messages from SCF nodes is bi-modal). These results confirm that the mode-matched approximation tends to yield the best codes, owing to the skewed nature of the pdf of the output messages from SCF nodes. For example, at the error probability of 10-6, the codeword length required with mode-matched approximation is approximately 1.7 x 104 bits, while that with mean-matched approximation is approximately 3.8 x 104 bits. In obtaining simulation results in the rest of this section, we have used the mode-matched approximation.

As discussed in Section 2, the capacity of a GMAC can be higher for dependent sources as compared to independent sources. Table 1 presents examples of several DJSC code designs together with their code rates Rc for sources with a correlation level of a = 0.1. The table also indicates the maximum code rate achievable (channel capacity) with independent sources 1I(X1, X2, Y|a = 0.5) over the same channel (noise level), as well as the actual value of the joint mutual information \I(X1,X2; Y|a = 0.1) of the DJSC code. In particular, note that the DJSC codes can actually achieve code rates (bits/channel-use) higher than the capacity of the GMAC for independent sources. While the capacity of GMAC for correlated sources remains unknown, these results clearly demonstrate that the proposed codes are able to outperform separate source and channel coding for GMAC (with separate source and channel coding, a good DSC would render the two sources nearly independent). In Figure 9, we compare the joint source-channel coding (JSC) rates in channel-uses/source-bit RJSC, achieved by the proposed DJSC codes as a function of a, at a codeword length of 106 bits and a decoding error probability of 10-6. The

rate lower-bound for independent sources [3] over the same GMAC is also shown. Note that for a < 0.36, DJSC codes can achieve JSC rates below the theoretical lower-bound for independent sources with the same marginal probabilities.

In order to further demonstrate the advantage of the proposed DJSC codes compared to separate source and channel coding, we next compare three different system designs which differ in terms of the use of prior information about the inter-source correlation parameter a, as follows:

Scheme 1: Regardless of the actual inter-source correlation a, the two sources are assumed to be independent (a = 0.5) in code design as well as in decoding. Essentially, these codes at best can only achieve a channel capacity of I(Xi,X2; Y|a = 0.5). We denote this scheme by (adesign = 0.5, adecode = 0.5).

Scheme 2: Independent sources are assumed for code design (adesign = 0.5), but the actual value of a is used in joint decoding. We denote this scheme by (adesign =

°.5, adecode = aactual).

Scheme 3: The actual value of a is used for both code design and in joint decoding. We denote the scheme by

(adesign = adecode = aactual).

Figure 10 shows the code rates (measured in bits per channel use) achieved by scheme 2 and scheme 3 for different values of correlation parameter a, for a2 = 1 and a decoding error probability of 10-6. While the rate achieved by both schemes increases as the inter-source correlation increases (a decreases) as expected, note that for a = 0.1 and a = 0.2, Scheme 3 can actually achieve code rates higher than the theoretical upper-bound for independent sources over the same channel, which demonstrates the advantage of optimizing the code for the joint distribution of the sources. Figure 11 shows the decoding error probability of the three schemes, as a function of a. As expected, the codes optimized for the joint distribution of the sources yields the best

Table 1 Degree profiles for LDPC codes generated by the proposed design algorithm

0.3 0.4 a 2 0.5 0.6

p(x) x9 x8 x7 x6

k(x) 0.284x + 0.3124x2 0.3012x + 0.3321x2 0.3111x + 0.3544x2 0.4411x + 0.4235x2

+0.0222x4 + 0.1344x7 +0.0982x3 + 0.1322x10 +0.1655x3 + 0.0786x11 0.0233x17 + 0.0321 x17

+0.0977x8 + 0.1277x19 +0.1363x99 +0.0321 x16 + 0.0583x99 +0.0682x99

+0.08x99

Rc 0.5614 0.5226 0.4857 0.4528

/ind 0.5014 0.4731 0.4393 0.4113

lc 0.6328 0.6017 0.5744 0.5509

For binary sources with a = 0.1 and different channel noise levels a2. Rc is the code rate, /¡nd = 1 /(Xj,X2; Y\a = 0.5) is the maximum code rate achievable (channel capacity) with independent sources, and lc = j/(Xi, X2; Y\a = 0.1) is the actual value of the joint mutual information of the DJSC code.

.......;

3- .......

DJSC coding —I— Lower bound for independent sources

0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5

Figure 9 JSC rate RJSC (channel uses per source bit) of proposed DJSC codes. a2 = 0.5 and codeword length is 106 bits. The theoretical lower-bound for independent sources over the same GMAC is also shown.

performance. It can also be seen that even the codes designed for independent sources can achieve a significant performance improvement if the actual value of joint probabilities of the sources are used in joint decoding. Note that with (adesign = 0.5, adecode = 0.5) and (adesign = 0.5, adecode = aactual), the same pair of codes have been

used for all values of a. As a decreases, the improvement achieved by incorporating the joint source statistics for both code optimization and joint decoding becomes more pronounced. Figure 12 shows the probability of decoding error of the three schemes as a function of codeword length n for several values of SNR of the GMAC (for

Upper bound for independent sources x Scheme 3 O Scheme 2

0.35 0.4 0.45

Rate of source 1

Figure 10 Code rates (in bits per channel use) achieved by Scheme 2 and Scheme 3. The points correspond to a = 0.5 (lowest rate points), 0.4,0.3,0.2 and 0.1 (highest rate points). The decoding error probability is 10 , a = 1, and the codeword length is 106 bits.

/■ /

—I— Scheme 1 —< — Scheme 2 -0 - Scheme 3

0.05 0.1

0.15 0.2

0.35 0.4 0.45 0.5

Figure 11 Comparison of three code-design/decoding schemes at different values of inter-source correlation (codeword length is 106 bits).

a given value of SNR, the JSC rates are kept the same for all three schemes).

It is of interest to compare the performance of the proposed LDPC code constructions with the concatenated LDGM codes reported in [9]. The use of LDGM codes has the advantage that all bits of two GMAC input codewords are correlated, whereas in the proposed scheme with systematic LDPC codes, only the information bits

are correlated. However, LDGM codes have an inherent disadvantage that they typically have a high error floor [17]. To get around this problem, the authors in [9] have used serial, parallel, and hybrid concatenation of LDGM codes with interleavers, but this also increases the encoding complexity. This problem is not present in the LDPC codes. Additionally, unlike LDGM codes in [9], the degree polynomials of the LDPC codes can be optimized to

SNR = 6dB

SNR = 2dB

S 10" S

is:..........................;

Si:::;:::::i i i: i :i :i:i::i::i

........ x......S ........

: : H":::* I : Si: I; :i:i::i:;

.: ; : ■:■:■,: v v.^;..: : :;V : : \ ^ V ............... x ... : :v:.

:: : ; :::::: : : :::;:S* : ; N :::::::>

:i : : ;::::: i i .......vHN...........

.:;;.:.;.;.::;:.:■:.;. : N . . : ..:... . . . ...... \ 0

... ...... ... .... ...... ^

: ; ; : : ; :::::: ; : :: i-iv

—o — Scheme 1 —0 — Scheme 2 —x —Scheme 3

... : . : : \ IcJ ii-i^i i I ■■:■■:

*• ..........s

a. | 10"

S).............

Ni::::. \ .vv ■ ■ ......

..............

■..... :

:::::: ! : : :;::::: ! : \:v:: ..................v-

—o — Scheme 1 —0 — Scheme 2 —x — Scheme 3

10 10 Codeword length (bits)

10 10 Codeword length (bits)

Figure 12 The performance of three code-design/decoding schemes schemes as a function codeword length, at different channel SNR values (a = 0.2).

>•- .. ..............

........: •• o ....

— __ . .

-.............

■ ■ ■ ■ ........:......

____:........

\ .. A ...:........

: "It:

.....\ \......

......\ \.....

....... N !

.............\

—O—LDGM —+—SI-LDPC

-0.5 -0.45 -0.4 -0.35 -0.3 -0.25 -0.2 -0.15 -0.1

SNR gap (dB)

Figure 13 Comparison of the proposed LDPC codes with LDGM codes in (Figure eight of [9]); a = 0.1). The SNR gap refers to the difference between the SNR of the actual channel for which the code is designed and the SNR corresponding to the theoretical limit for independent sources.

correlated sources, as proposed in this paper. While the theoretical limit of SNR required to achieve a given decoding error probability is not known for correlated sources, Figure eight of [9] shows the SNR gain of LDGM codes compared to the theoretical limit for independent sources. In Figure 13, we compare SNR gain of proposed LDPC codes and LDGM codes in Figure eight of [9]. The SNR gap (in decibels) in this figure is the difference between

the channel SNR for which the code is designed and the theoretical limit of SNR for independent sources.

While the proposed LDPC code design is aimed at DJSC coding of correlated sources over a GMAC, they can also be applied to channel coding of independent sources over a GMAC, similar to [11]. Specifically, recall that DJSC codes designed for a = 0.5 yields a channel code for independent sources. Figure 14 compares performance

O --c C . O-. .

.....i >..... .....

1 ..... « ..... \

■ Y ■ ■ ■ ■ \..... ........ A ....... ..... > 1

? R =0-.6

■V ■ ■ ■ ■ R =0.5 ■ \ : 1 ■ ■ ■ ■ \ « ......

-..... \ . . 1. . . . ■ : è

:::::: ? =0.3 ■ ^ .c..... ...........It-

.....■< f " 1 " " " ...........Q ■ I ■ ■ ■ ■ ■■■ ■

U = = :\ l I

■ x ■ ■ ■ ...........

- - — o- - Design method in [11] - Proposed design method

SNR (dB)

Figure 14 Channel coding of independent sources over a GMAC: comparison of proposed LDPC codes designs with those reported in (Figure three of [11]). Rc is the code rate.

Table 2 Degree profiles for LDPC codes used in Figure 14

Code rate Rc 0.5

0.3x7 + 0.7x8 0.145x + 0.231 x2

0.3x7 + 0.7x8 0.308x + 0.282x2

0.29x7 + 0.71 x8 0.398x + 0.321 x2

+0.154x3 + 0.086x5

+0.121x3 + 0.176x6

0.021 x3 + 0.179x4

+0.055x11 + 0.329x48

+0.021 x22 + +0.092x48

+0.032x40 + +0.049x48

of channel code designed in this manner with that of the codes reported in (Figure 3 of [11]). The degree profiles of the LDPC codes are given in Table 2. For example, the proposed code designs achieve a coding gain of ^ 0.2 dB at a decoding error probability of 10-3 for all coding rates considered here. While the approach in [11] is also based on a combined factor graph for two codes, the improved performance of the codes proposed in this paper is due to more accurate approximation of the density functions of the outgoing messages from SCF nodes as discussed in Section 4.

6 Conclusions

An approach to designing a DJSC code with symmetric rates for a pair of correlated binary sources transmitted over a GMAC, based on SI-LDPC codes has been developed. For EXIT analysis of the joint BP decoder for two sources, the accurate modeling of the density function of the outgoing LLRs from factor nodes in the combined factor graph of two LDPC codes, which represent the joint source probabilities and GMAC output conditional density (SCF nodes), has been investigated. While a tractable analytical expression appears difficult to obtain, a numerical method appropriate for EXIT analysis has been proposed for fitting a Gaussian or Gaussian mixture to model the density function of outgoing LLRs from SCF nodes. Experimental results are presented which show that SI-LDPC codes designed with this approach outperform previously reported DJSC codes. Furthermore, these results demonstrate that, for strongly dependent sources, the proposed DJSC code can achieve code rates higher than the theoretical upper-bound for independent sources over the same GMAC.

Appendix

Since mfXv = log P(x't =+1), we have

& P(x\ 2)=-1) l(2) = p(xf = +1) = ^

P(xf} =-1)

Also, define Pj,k = P(x(1) = j, x^f2 = k) where j, k e {-1, +1}. It follows that,

pu = P(x(2 = +1)P(x,(1) = +1|x(2) = +1) = P(x(2) = +1)(1 - a),

and similarly Pw = P(x(2) = -1)a, P-U = P(x(2) = +1)a, andP-1,-1 = P(x(2) = —1)(1 — a). Now consider

p(x(1) = +1 to)

_ p(x(1) = +1,yi) p( yi)

_ p(yi,x(1 = +1,x(2) = +1)+p(yi,x(1) =+1,x(2) = —1)

p( yi)

_ p(yilx((1) = +1,xf> = +1)P1,1 +p(yilx((1) = +1,x(2) = —1)P1-1

p( yi)

_ qn(yj)Pi,1 + g1,-1(yi)P1,—1 p( yi) '

Similarly, it can be shown that p(xi ' = 1 lyi) = -

p( yi )

Therefore

p(x(1) = +1 yi) p(x(1) = -1|yi)

qi,i( yi )Pi,i + qi,-i( yi)Pi,-i q-1,1( yi)P-i,i + q-i,-i( yi)P-i,-i

= g1,1(yi)P(x(2) = +1)(1 - a) + q1,-1(yi)P(xf } = -1)a " q-1,1(yi)P(x(2) = +1)a + q-1,-1 (yi)P(x'i2) = -1)(1 - a) _ g1,1(yi)Lf)(1 - a) + q1,-1 (yi)a

q-1,1(yi)L(2a + q-1,-1(yi)(1 - a)

from which (9) follows. Competing interests

The authors declare that they have no competing interests. Acknowledgements

This work has been supported by the National Science and Engineering Research Council (NSERC) of Canada.

Received: 3 September 2013 Accepted: 23 December 2013 Published: 9 January 2014

References

1. D Culler, D Estrin, M Srivastava, Overview of sensor networks. IEEE Comput. 37(8), 41-49 (2004)

2. D Slepian, JK Wolf, Noiseless coding of correlated information sources. IEEE Trans. Inf. Theory. 19(4), 471-480 (1973)

3. T Cover, J Thomas, Elements of Information Theory, 2nd edn (Wiley-Interscience, New York, 2006)

4. SS Shamai, S Verdu, Capacity of channels with uncoded-message side-information, in Proceedings of the International Symposium on Information Theory, Whistler, 17-22 September, (1995), p. 7

5. J Barros, SD Servetto, Network information flow with correlated sources. IEEE Trans. Inf. Theory. 52(1), 155-170 (2006)

6. T Cover, A El Gamal, M Salehi, Multiple-access channel with arbitrarily correlated sources. IEEE Trans. Inf. Theory. IT-26(6), 648-657 (1980)

7. S Ray, M Medard, M Effros, R Koetter, On separation for multiple access channels, in Proceedings of the IEEE Inf. Theory Workshop, Chengdu, 22-26 October, (2006), pp. 399-403

8. SS Pradhan, S Choi, K Ramachandran, A graph-based framework for transmission of correlated sources over multiple-access channels. IEEE Trans. Inf. Theory. 53(12), 4583-4604 (2007)

9. J Garcia-Frias, Y Zhao, W Zhong, Turbo-like codes for transmission of correlated sources over noisy channels. IEEE Signal Process. Mag. 24, 58-66 (2007)

10. AD Murugan, PKGopala, H El Gamal, Correlated sources over wireless channels: cooperative source-channel coding. IEEE J. Selected Areas Commun. 22(6), 988-998 (2004)

11. A Roumy, D Declercq, Characterization and optimization of LDPC codes for the 2-user Gaussian multiple access channel. EURASIP J. Wireless Commun. Netw Article ID 74890 (2007)

12. I Shahid, P Yahampath, Distributed joint source-channel coding using unequal error protection LDPC codes. IEEE Trans. Commun.

61 (8), 3472-3482 (2013)

13. SY Chung, GD Forney, TJ Richardson, R Urbanke, On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit. IEEE Commun. Lett. 5(2), 58-60 (2001)

14. SY Chung, T Richardson, R Urbanke, Analysis of sum-product decoding of LDPC codes using a Gaussian approximation. IEEE Trans. Inf. Theory. 47(2), 657-670(2001)

15. WE Ryan, S Lin, Channel Codes: Classical and Modern (Cambridge University Press, Cambridge, 2009)

16. B Rimoldi, R Urbanke, A rate-splitting approach to the Gaussian multiple-acccess channel. IEEE Trans. Inf. Theory. 42(2), 364-375 (1996)

17. T Richardson, R Urbanke, Modern Coding Theory (Cambridge University Press, Cambridge, 2008)

18. M Sartipi, F Fekri, Distributed source coding using short to moderate length rate-compatible LDPC codes: the entire Slepian-Wolf region. IEEE Trans. Commun. 56(3), 400-411 (2008)

19. T Richardson, A Shokrollahi, R Urbanke, Design of capacity-approaching irregular low-density-parity-check codes. IEEE Trans. Inf. Theory. 47(2), 619-637 (2001)

20. S ten Brink, G Kramer, A Ashikhmin, Design of low-density-parity-check codes for modulation and detection. IEEE Trans. Communi.

52(4), 670-678 (2004)

21. S ten Brink, Convergence behavior of iteratively decoded parallel concatenated codes. IEEE Trans. Commun. 49,1727-1737 (2001)

22. GEP Box, DR Cox, An analysis of transformations. J. R. Stat. Soc. B. 26,211-252 (1964)

23. TGasser, P Bacher, J Mocks, Transformations towards the normal distribution of broad band spectral parameters of the EEG. Electroencephalogr. Clin. Neurophysiol. 53,119-124 (1982)

24. A Azevedo-Filho, RD Shachter, Laplace's method approximations for probabilistic interference in belief networks with continuous variables, in 10th Conference on Uncertainty Artif.Intell, Seattle, 29-31 July, (1994),

pp. 28-36

25. AC Cohen, Estimation in mixtures of two Gaussian distributions. Technometrics. 9(1), 15-28 (1967)

doi:10.1186/1687-1499-2014-3

Cite this article as: Shahid and Yahampath: Distributed joint source-channel code design for GMAC using irregular LDPC codes. EURASIP Journal on Wireless Communications and Networking 2014 2014:3.

Submit your manuscript to a SpringerOpen journal and benefit from:

7 Convenient online submission 7 Rigorous peer review 7 Immediate publication on acceptance 7 Open access: articles freely available online 7 High visibility within the field 7 Retaining the copyright to your article

Submit your next manuscript at 7 springeropen.com