Next Article in Journal
Identification of Hypsarrhythmia in Children with Microcephaly Infected by Zika Virus
Previous Article in Journal
Asynchronous Control of P300-Based Brain–Computer Interfaces Using Sample Entropy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

LDPC Coded Massive MIMO Systems

School of Electrical and Electronics Engineering, Chung-Ang University, 84 Heukseok-ro, Dongjak-gu, Seoul 06974, Korea
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(3), 231; https://doi.org/10.3390/e21030231
Submission received: 16 January 2019 / Revised: 19 February 2019 / Accepted: 25 February 2019 / Published: 27 February 2019
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
We design a coded massive multiple-input multiple-output (MIMO) system using low-density parity-check (LDPC) codes and iterative joint detection and decoding (JDD) algorithm employing a low complexity detection. We introduce the factor graph representation of the LDPC coded massive MIMO system, based on which the message updating rule in the JDD is defined. We devise a tool for analyzing extrinsic information transfer (EXIT) characteristics of messages flowing in the JDD and the three-dimensional (3-D) EXIT chart provides a visualization of the JDD behavior. Based on the proposed 3-D EXIT analysis, we design jointly the degree distribution of irregular LDPC codes and the JDD strategy for the coded massive MIMO system. The JDD strategy was determined to achieve a higher error correction capability with a given amount of computational complexity. It was observed that the coded massive MIMO system equipped with the proposed LDPC codes and the proposed JDD strategy has lower bit error rate than conventional LDPC coded massive MIMO systems.

1. Introduction

The massive multiple-input multiple-output (MIMO) system, whose transmitter and receiver are equipped with tens to hundreds of antennas, has recently attracted many researchers and engineers because it can vastly improve the transmission data rate and spectral efficiency [1,2,3,4,5,6,7]. Massive MIMO technology has recently found successful applications in cellular networks, known as the fifth generation (5G) systems [5,6,7,8,9,10,11], as well as in energy-efficient wireless sensor networks [12,13,14,15].
Recovering multiplexed data from signals received by many antennas in an optimal manner requires tremendously high amount of computations, so the reduction of detection complexity has been a great concern for utilizing the massive MIMO technique in practical communication systems [3,4]. As an approach to reduce the detection complexity, suboptimal linear detection algorithms have been intensively studied [7,16,17,18,19,20,21,22,23,24,25,26], where matched filter (MF) detection, zero forcing (ZF) detection and minimum mean squared error (MMSE) detection are well known examples. Nevertheless, these linear detection schemes cannot lower the computational complexity of the massive MIMO receiver to an acceptable level because the inversion of high dimensional matrices is still required. Then, low complexity detection algorithms based on approximate matrix inversion [18,19], low complexity factor graph (FG) based belief propagation (BP) algorithms [20,21,22] and pairwise Markov random fields (MRF) based MIMO detection algorithms [20,21] have been proposed. Tree-searching soft-input soft-output (SISO) MIMO detection algorithms have also been proposed in various forms [23,24,25,26]. The FG based BP detection with Gaussian approximation of interference (GAI), called FG-GAI BP detector, was proposed as one of the promising solutions to reduce the computational complexity of the massive MIMO receiver to the practically allowable level [21,22].
Low-density parity-check (LDPC) codes have been widely used in various communication systems thanks to the powerful error correction capability [27,28,29]. It is well known that LDPC codes can be efficiently designed by using the density evolution algorithm [29,30] or the extrinsic information transfer (EXIT) chart [31]. There have been many research activities regarding the analysis and design of LDPC coded MIMO systems with various forms of detection and decoding mechanisms [32,33,34,35,36]. It is a natural approach to apply LDPC codes to the massive MIMO system to improve the transmission reliability, where a joint detection and decoding (JDD) algorithm of low complexity, of course, needs to be considered. In [37], non-binary LDPC codes are designed for coded massive MIMO systems considering modified MMSE and MF soft-output detectors. In [22,38], binary LDPC codes and non-binary LDPC codes, respectively, are designed by considering the FG-GAI BP detection algorithm through the degree distribution optimization based on the EXIT chart analysis.
To make the LDPC coded massive MIMO technology more applicable in practical communication systems, the convergence of JDD has to be sped up for a given amount of computational complexity. Note that the faster JDD convergence results in the lower BER if the computational complexity is limited to finite amount. In [39], a modified FG-GAI BP detection algorithm is proposed to improve the convergence rate of JDD in LDPC coded massive MIMO systems at the cost of increased computational complexity. It is notable that one JDD iteration can be composed of multiple detection iterations followed by multiple decoding iterations. Thus, the JDD strategy, specified by the ratio of the number of detection iterations and the number of decoding iterations composing one JDD iteration, can be used as a design parameter to obtain a good trade-off between the error correction performance and the computational complexity. However, there do not exist many research works on developing a systematic way to determine the JDD strategy improving the BER performance with a given amount of computational complexity and an efficient way to design LDPC codes depending on the structure of JDD strategy. Thus, there exist strong needs for a systematic and efficient design procedure of LDPC codes and JDD strategy for coded massive MIMO systems.
In this paper, we design the LDPC coded massive MIMO system with an iterative JDD algorithm, where the suboptimal FG-GAI BP detection is considered. We represent the LDPC coded massive MIMO system by a factor graph composed of observation nodes, middle nodes, variable nodes and check nodes connected through edges, and we define iterative updating rules for messages flowing over the factor graph of JDD. We propose an analysis tool for investigating the EXIT behavior of JDD, by which the density evolution of messages is analyzed and a 3-D (three-dimensional) EXIT chart visualization is obtained. Based on the proposed EXIT analysis, we design jointly irregular LDPC codes and the JDD strategy for the coded massive MIMO system to attain the lowest BER with a given amount of computational complexity. In the LDPC code design, we include an additional constraint regarding the placement of edges between variable nodes and check nodes in a practical point of view. It is observed that the coded massive MIMO system equipped with the proposed LDPC codes and the proposed JDD strategy has a lower BER performance than that equipped with conventional LDPC codes and conventional JDD strategy. The performance gain of the proposed scheme over conventional schemes are noticeable, especially when a low amount of computational complexity is allowed for the receiver of the coded massive MIMO system.
This paper is organized as follows. In Section 2, we present the model for coded massive MIMO system. In Section 3, we introduce the operation of JDD, propose the EXIT analysis tool for JDD, and analyze the EXIT behavior of JDD of the LDPC coded massive MIMO system. In Section 4, we design LDPC codes and the JDD strategy by using the proposed EXIT analysis tool. In Section 5, we present BER performances of the proposed LDPC coded massive MIMO system in various points of view and compare those with conventional ones. Finally, we conclude this paper in Section 6.

Notations

  • n T : Number of transmit antennas.
  • n R : Number of receive antennas.
  • N c h : Total number of channel uses required to transmit all symbols.
  • C : Complex number.
  • R : Real number.
  • A : Set of values for complex transmit symbols.
  • A ¯ : Set of values for real-valued transmit symbols.
  • M o : Modulation order of complex transmit symbols, where M o is the cardinality of A .
  • x ( l ) : Transmit symbol vector at the lth channel use, l = 1 , 2 , , N c h , where x ( l ) A n T × 1 .
  • y ( l ) : Received signal vector at the lth channel use, where y ( l ) C n R × 1 .
  • w ( l ) : Additive noise vector at the lth channel use, where w ( l ) C n R × 1 .
  • H ( l ) : MIMO channel gain matrix at the lth channel use, where H ( l ) C n R × n T .
  • x ¯ ( l ) , y ¯ ( l ) , w ¯ ( l ) , H ¯ ( l ) : Real-valued representations of x ( l ) , y ( l ) , w ( l ) and H ( l ) , respectively, where x ¯ ( l ) A ¯ 2 n T × 1 , y ¯ ( l ) R 2 n R × 1 , w ¯ ( l ) R 2 n R × 1 , H ¯ ( l ) R 2 n R × 2 n T .
  • x ¯ i ( l ) , y ¯ i ( l ) , w ¯ i ( l ) : The ith entry of x ¯ ( l ) , y ¯ ( l ) , w ¯ ( l ) , respectively.
  • h ¯ i j ( l ) : The ( i , j ) th entries of H ¯ ( l ) .
  • { · } : Real part of a complex value.
  • { · } : Imaginary part of a complex value.
  • E { · } : Expectation.
  • Var { · } : Variance.
  • DET l : Detector node corresponding to the lth channel use.
  • y i : Vector obtained by excluding the ith entry of y .
  • N g : Number of global JDD iterations.
  • N d e t : Number of detection iterations in one global iteration.
  • N d e c : Number of decoding iterations in one global iteration.
  • I ( U ; X ) : Mutual information between U and X.

2. Modeling of LDPC Coded Massive MIMO System

Consider a massive MIMO system with n T transmit antennas and n R receive antennas. A K-bit information sequence b is encoded to a N-bit LDPC codeword u with the code rate of R = K / N . Then, N coded bits are modulated as M o -ary QAM symbols to be transmitted by n T transmit antennas using a spatial multiplexing over N c h channel uses. Note that n T symbols are transmitted at each channel use resulting in N c h = N n T log 2 M o . The MIMO channel at the lth channel use is expressed as
y ( l ) = H ( l ) x ( l ) + w ( l ) , l = 1 , 2 , , N c h ,
where entries of w ( l ) are independent and identically distributed (i.i.d.) zero-mean circular symmetric complex white Gaussian with variance of σ 2 , and entries of H ( l ) are i.i.d. circular symmetric complex Gaussian with zero mean and unit variance. The real-valued representation of Equation (1) is written by
y ¯ ( l ) = H ¯ ( l ) x ¯ ( l ) + w ¯ ( l ) ,
where
y ¯ ( l ) = y ( l ) y ( l ) R 2 n R × 1 , x ¯ ( l ) = x ( l ) x ( l ) A ¯ 2 n T × 1 , w ¯ ( l ) = w ( l ) w ( l ) R 2 n R × 1 , H ¯ ( l ) = H ( l ) H ( l ) H ( l )    H ( l ) R 2 n R × 2 n T .
The receiver of massive MIMO system with the real-valued representation given in Equation (2) can be expressed by a bipartite graph shown in Figure 1. The receiver consists of a detector and a decoder which exchange messages with each other iteratively by joint detection and decoding. The detector is composed of N c h detector nodes, DET l , l = 1 , , N c h , while the decoder is composed of N variable nodes, v 1 , , v N , and N K check nodes, c 1 , , c N K . Each detector node DET l is composed of 2 n R observation nodes, o 1 ( l ) , , o 2 n R ( l ) , and 2 n T middle nodes, m 1 ( l ) , , m 2 n T ( l ) , connected through edges. Each middle node is connected to log 2 M o variable nodes, where each real-valued symbol is generated from log 2 M o bits. We define variable super-nodes, v 1 , , v N c h , each of which is a group of variable nodes associated with symbols transmitted at each channel use. Signals y ¯ ( 1 ) , ⋯, y ¯ ( N c h ) received over N c h channel uses are input to detector nodes DET 1 , , DET N c h , respectively.

3. Joint Detection and Decoding for LDPC Coded Massive MIMO System

3.1. Operation of Joint Detection and Decoding

We consider an iterative JDD process employing a low-complexity detection algorithm based on FG-GAI BP [22] and a sum-product decoding algorithm. One JDD iteration is composed of N d e t detection iterations followed by N d e c decoding iterations, where we call a JDD iteration as a global iteration. Let us consider the lth channel use. Then, Equation (2) can be written as
y ¯ i ( l ) = j = 1 2 n T h ¯ i j ( l ) x ¯ j ( l ) + w ¯ i ( l ) , i = 1 , , 2 n R .
Each observation node o i ( l ) obtains the information of x ¯ k ( l ) , k = 1 , , 2 n T , from y ¯ i ( l ) by regarding terms associated with x ¯ k ( l ) , j k , as interferences. For this purpose, we define z i k ( l ) j = 1 , j k 2 n T h ¯ i j ( l ) x ¯ j ( l ) + w ¯ i ( l ) as the interference plus noise when detecting the symbol x ¯ k ( l ) and rewrite Equation (3) as
y ¯ i ( l ) = h ¯ i k ( l ) x ¯ k ( l ) + z i k ( l ) .
In the case of using a massive number of transmit antennas, we can approximate z i k ( l ) as a Gaussian random variable [22] with the mean μ z i k ( l ) and the variance σ z i k ( l ) 2 , where
μ z i k ( l ) = E { z i k ( l ) } = j = 1 , j k 2 n T h ¯ i j ( l ) E { x ¯ j ( l ) }
and
σ z i k ( l ) 2 = Var { z i k ( l ) } = j = 1 , j k 2 n T h ¯ i j ( l ) 2 Var { x ¯ j ( l ) } + σ 2 2 .
The likelihood of x ¯ k ( l ) at each observation node o i ( l ) is approximately obtained by using the Gaussian approximation of z i k ( l ) as
Pr { y ¯ i ( l ) | H ¯ ( l ) , x ¯ k ( l ) = s } 1 2 π σ z i k ( l ) 2 exp ( y ¯ i ( l ) h ¯ i k ( l ) s μ z i k ( l ) ) 2 2 σ z i k ( l ) 2 ,
where s A ¯ . Note that μ z i k ( l ) and σ z i k ( l ) 2 are computed as
μ z i k ( l ) = j = 1 , j k 2 n T h ¯ i j ( l ) s A ¯ s · Pr ( i ) { x ¯ j ( l ) = s }
and
σ z i k ( l ) 2 = j = 1 , j k 2 n T h ¯ i j ( l ) 2 s A ¯ s 2 · Pr ( i ) { x ¯ j ( l ) = s } s A ¯ s · Pr ( i ) { x ¯ j ( l ) = s } 2 + σ 2 2 ,
where Pr ( i ) { x ¯ j ( l ) = s } denotes a priori probability of x ¯ j ( l ) at the observation node o i ( l ) . The extrinsic probability of x ¯ k ( l ) at each observation node o i ( l ) is obtained as [22]
Pr { x ¯ k ( l ) = s | H ¯ ( l ) , y ¯ i ( l ) } = κ j = 1 , j i 2 n R Pr { y ¯ j ( l ) | H ¯ ( l ) , x ¯ k ( l ) = s } · Pr { x ¯ k ( l ) = s } ,
where κ is a constant. As simple notations, we let α i k ( l ) ( s ) and β k i ( l ) ( s ) denote the likelihood and the extrinsic probability, respectively, of x ¯ k ( l ) = s at the observation node o i ( l ) , i.e., α i k ( l ) ( s ) = Pr { y ¯ i ( l ) | H ¯ ( l ) , x ¯ k ( l ) = s } and β k i ( l ) ( s ) = Pr { x ¯ k ( l ) = s | H ¯ ( l ) , y ¯ i ( l ) } .
In the iterative process, the extrinsic probability replaces the role of a priori probability. In other words, Pr ( i ) { x ¯ j ( l ) = s } in Equations (8) and (9) are replaced by β j i ( l ) ( s ) . Then, α i k ( l ) ( s ) is computed at the observation node o i ( l ) by using β j i ( l ) ( s ) , j k , via μ z i k ( l ) and σ z i k ( l ) 2 based on Equations (7)–(9) and delivered to the middle node m k ( l ) . Note that β k i ( l ) ( s ) is computed at the middle node m k ( l ) by using α j k ( l ) ( s ) , j i , as in Equation (10), and delivered to the observation node o i ( l ) . Consequently, α i k ( l ) ( s ) and β k i ( l ) ( s ) are updated in a recursive manner through detection iterations.
At the end of detection iterations, the log-likelihood ratios (LLR) of coded bits are computed at middle nodes in the following manner and delivered to the decoder. We suppose that a variable node v = v r represents the tth bit in the bit-stream generating x ¯ k ( l ) , which results in r = ( l 1 ) · n T log 2 M o + ( k 1 ) · log 2 M o + t . Then, the LLR of the coded bit u r corresponding to the variable node v r is defined by L v r = log Pr { u r = 0 } Pr { u r = 1 } and obtained at the middle node m k ( l ) as [22]
L v r = log s S t Pr { x ¯ k ( l ) = s | H ¯ ( l ) , y ¯ ( l ) } s S t + Pr { x ¯ k ( l ) = s | H ¯ ( l ) , y ¯ ( l ) } = log s S t i = 1 2 n R α i k ( l ) ( s ) s S t + i = 1 2 n R α i k ( l ) ( s ) ,
where S t = { s | is the tth bit of a bit-stream generating a symbol s is 0 } and S t + = { s | is the tth bit of a bit-stream generating a symbol s is 1 } . In the last equality of Equation (11), we use Pr { x ¯ k ( l ) = s | H ¯ ( l ) , y ¯ ( l ) } i = 1 2 n R Pr { y ¯ i ( l ) | H ¯ ( l ) , x ¯ k ( l ) = s } . The messages L v r obtained at middle nodes are delivered to the decoder to be used in the sum-product decoding.
Next, consider the operation of sum-product decoding. Let L v r c and L c v r denote the message flowing from the variable node v r to the check node c and the message flowing from the check node c to the variable node v r , respectively. These messages are updated in an iterative manner by [29,30]
L v r c = L v r + c C v r c L c v r
and
L c v r = v V c v r sign ( L v c ) · ϕ v V c v r ϕ | L v c | ,
where ϕ ( x ) = log ( exp ( x ) + 1 exp ( x ) 1 ) . Note that C v r c denotes the set of check nodes except c connected to the variable node v r and V c v r denotes the set of variable nodes except v r connected to the check node c. At the end of decoding iterations, the LLR message of the tth bit in the bit-stream generating x ¯ k ( l ) is computed as L k ( l ) ( t ) = c C v r L c v r and delivered to the middle node m k ( l ) in the detector. At the beginning of the next detection iteration, the probability Pr { x ¯ k ( l ) = s } is computed at the middle node m k ( l ) by
Pr { x ¯ k ( l ) = s } = t = 1 log 2 M o exp ( 1 s ( t ) ) · L k ( l ) ( t ) 1 + exp L k ( l ) ( t ) ,
and used in the detector as in Equation (10), where s ( t ) denotes the value of the tth bit in the bit-stream generating a symbol s.
After N g global iterations, the decision on bits is made such that the coded bit u r is estimated as 1 if L v r + L k ( l ) ( t ) < 0 and as 0 otherwise, where r = ( l 1 ) · n T log 2 M o + ( k 1 ) · log 2 M o + t . The overall procedure of JDD is presented in Algorithm 1 and the FG-GAI BP detection is summarized in Algorithm 2. Message flows between component nodes of the JDD are illustrated in Figure 2.
Algorithm 1: Joint Detection and Decoding (JDD).
Entropy 21 00231 i001
Algorithm 2: FG-GAI BP detection.
Entropy 21 00231 i002
Let us think about the computational complexity of FG-GAI BP detection in terms of the number of multiplications. We focus on one detection iteration for one channel use with a given modulation. It is easily inferred from Algorithm 2 that the FG-GAI BP detection requires a computational complexity of O n T n R . For a brief comparison, we consider some other SISO MIMO detectors such as BP detector [21], SISO MMSE detector, tree-searching detector such as sphere decoding (SD) aided max-log method [26] and subspace marginalization with interference suppression (SUMIS) detector [26]. These detectors require computational complexities of O n T 2 n R . It is clear that the FG-GAI-BP detector requires lower computational complexity than other SISO MIMO detectors under comparison.

3.2. Analysis of Joint Detection and Decoding

We analyze the behavior of JDD in the receiver of coded massive MIMO system in terms of mutual information transfer characteristics, so-called EXIT characteristics, in component units. We focus on the mutual information between coded bits generating transmit symbols and corresponding message variables. In fact, α i k ( l ) ( s ) and β k i ( l ) ( s ) at the observation node o i ( l ) contain information regarding the transmit symbol x ¯ k ( l ) . Thus, for the bit-level EXIT analysis mentioned above, we define new LLR messages of coded bits at observation nodes. Let us consider the tth bit of a coded bit-stream mapped to x ¯ k ( l ) and define two LLR messages of this bit at the observation node o i ( l ) . The first LLR is L k i ( l ) ( t ) = log s S t β k i ( l ) ( s ) s S t + β k i ( l ) ( s ) sent from m k ( l ) to o i ( l ) , and the second LLR is L i k ( l ) ( t ) = log s S t α i k ( l ) ( s ) s S t + α i k ( l ) ( s ) sent from o i ( l ) to m k ( l ) , where k = 1 , , 2 n T . We let L o i n and L o o u t denote random variables representing L k i ( l ) ( t ) and L i k ( l ) ( t ) , respectively, for all k , i , t , and let U denote the corresponding coded bit. We suppose all LLR messages are independent and normally distributed. For each observation node, we define I O A = I ( U ; L o i n ) and I O E = I ( U ; L o o u t ) . We define I V A = I ( U ; L c v ) and I V E = I ( U ; L v c ) at variable nodes, where L c v and L v c are incoming and outgoing messages at variable nodes, respectively. We also define I C A = I ( U ; L v c ) and I C E = I ( U ; L c v ) at check nodes, where L v c and L c v are incoming and outgoing messages at check nodes, respectively. Allowing slight abuse of notation, we use I V A ( d c ) and I C E ( d c ) to denote the mutual information between U and L c v delivered from degree- d c check nodes to a variable node. We also use I V E ( d v ) and I C A ( d v ) to denote the mutual information between U and L v c delivered from degree- d v variable nodes to a check node. We depict the resultant iterative JDD process represented by transfer blocks of mutual information as in Figure 3.
Consider a degree- d v variable node that is connected to d v check nodes and 2 n R observation nodes via a corresponding middle node. The variable node sums up all incoming messages except one from a target node and sends the result to the target node. Thus, L o i n is obtained by summing up 2 n R 1 copies of L o o u t and d v copies of L c v . It follows that the variance of L o i n is obtained by adding the variance of L o o u t multiplied by 2 n R 1 and the variance of L c v multiplied by d v . By defining J ( σ X )  as [33]
J ( σ X ) = 1 e ( ξ σ X 2 / 2 ) 2 / 2 σ X 2 2 π σ X 2 · log 2 [ 1 + e ξ ] d ξ ,
we obtain I ( U ; X ) = J ( σ X ) , where σ X 2 is the variance of a normally distributed random variable X. Then, I O A is obtained as a function of d v as
I O A ( d v ) = J ( 2 n R 1 ) · J 1 I O E ( d v ) 2 + d v · J 1 I ¯ V A 2 ,
where I ¯ V A = d c = 2 d c , max ρ d c · I V A ( d c ) is the average of I V A ( d c ) over d c , ρ d c denotes the fraction of edges that are connected to check nodes of degree d c , and d c , max denotes the maximum degree of check node. Let us define the EXIT function between I O A and I O E as
I O E ( d v ) = f O I O A ( d v ) , E b N 0 ,
where I O E is also a function of d v due to the dependency of I O A on d v . Note that f O ( · ) is obtained by Monte Carlo simulation [33]. The LLR message L v c sent from the variable node to check nodes is obtained by summing up 2 n R copies of L o o u t and d v 1 copies of L c v . Then, the variance of L v c is obtained by adding the variance of L o o u t multiplied by 2 n R and the variance of L c v multiplied by d v 1 . It follows that
I V E ( d v ) = J 2 n R · J 1 I O E ( d v ) 2 + ( d v 1 ) · J 1 I ¯ V A 2 .
In the case of irregular distribution of d v , we define averages of I V E ( d v ) and I O E ( d v ) over d v as
I ¯ V E = d v = 2 d v , max λ d v · I V E ( d v )
and
I ¯ O E = d v = 2 d v , max λ d v · I O E ( d v ) ,
respectively, where λ d v denotes the fraction of edges that are connected to variable nodes of degree d v and d v , max denotes the maximum degree of variable node.
Let us consider a degree- d c check node and define the EXIT function from I ¯ C A to I C E as [33]
I C E ( d c ) 1 J d c 1 · J 1 ( 1 I ¯ C A ) ,
where I ¯ C A = d v = 1 d v , m a x λ d v · I C A ( d v ) is the average of I C A ( d v ) over d v . In the case of irregular distribution of d c , we define the average of I C E ( d c ) over d c as
I ¯ C E = d c = 2 d c , max ρ d c · I C E ( d c ) .
The density evolution of messages flowing in the JDD process in terms of EXIT characteristics is summarized in Algorithm 3.
We can obtain the 3-D EXIT chart of JDD process by using Equations (16)–(22). The EXIT surface for variable nodes is obtained by using Equations (18)–(20). The EXIT surface for check nodes is obtained by stretching along the I ¯ O E -axis the 2-D EXIT function from I ¯ C A to I ¯ C E obtained by Equations (21) and (22). As an example, we plot in Figure 4 the 3-D EXIT chart of JDD process for (3, 6)-regular LDPC coded massive MIMO systems with N d e t = 1 and N d e c = 1 , where coded bits are 4-QAM modulated and transmitted over 16 × 16 MIMO channel. We also plot in Figure 4 the JDD trajectory obtained by Algorithm 3, where the update for I ¯ O E is computed by Equations (16), (17) and (20). It is observed that the JDD trajectory is formed between two EXIT surfaces. If the JDD trajectory approaches a point with I ¯ V E = 1 at a certain E b / N 0 , this implies that the JDD converges and the decoding succeeds at this E b / N 0 . The minimum value of E b / N 0 resulting in the JDD trajectory approaching I ¯ V E = 1 is called the threshold. We can find the threshold value of LDPC coded massive MIMO system by using Algorithm 3 and visualize the JDD behavior by using the 3-D EXIT chart.
Algorithm 3: Density evolution in terms of EXIT characteristics.
Entropy 21 00231 i003

4. Design of LDPC Coded Massive MIMO System

In general, LDPC codes are designed through two steps: the optimization of degree distributions and the placement of edges between variable nodes and check nodes. Degree distributions of variable nodes and check nodes from the edge perspective are represented in the form of polynomials as [29]
λ ( x ) = d v = 2 d v , max λ d v x d v 1 and ρ ( x ) = d c = 2 d c , max ρ d c x d c 1 ,
respectively. Then, the code rate R is given by [29]
R ( λ , ρ ) = 1 d c = 2 d c , max ρ d c / d c d v = 2 d v , max λ d v / d v ,
where λ = { λ 2 , , λ d v , m a x } and ρ = { ρ 2 , , ρ d c , m a x } . In the first step of designing LDPC codes, we first determine degree distributions to maximize the code rate guaranteeing the convergence of JDD at a given E b / N 0 by using the density evolution algorithm. By repeating the same procedure for various values of E b / N 0 , we find the smallest E b / N 0 resulting in the maximum code rate exceeding the target code rate. Such E b / N 0 is called the threshold, and the corresponding degree distributions are considered optimal. In the second step of LDPC code design, we place edges between variable nodes and check nodes based on given optimal degree distributions to satisfy the following criteria [29]:
(a)
Avoid short cycles involving only degree-2 variable nodes.
(b)
Length-4 cycles need to be avoided.
These criteria can be satisfied by using the progressive edge growth (PEG) algorithm [40]. When we construct finite-length LDPC codes, the following criterion needs to be satisfied additionally:
(c)
All degree-2 variable nodes need to represent only non-systematic bits.
Let Λ 2 denote the number of degree-2 variable nodes. Then, Λ 2 N K , or equivalently,
λ 2 2 d c = 2 d c , max ρ d c / d c
is a necessary condition to satisfy Criterion (c). Thus, we need to take into consideration the condition in Equation (25) when determining degree distributions in the first step of LDPC code design.
Since the computational complexity is a major concern, we need to design the coded massive MIMO system such that the error correction capability is maximized with a given amount of computational complexity. As introduced above, one global iteration of JDD consists of N d e t detection iterations and N d e c decoding iterations. We can speed up the convergence of JDD by controlling the ratio of N d e t and N d e c in one global iteration. In Table 1, we list the approximate numbers of multiplications and additions required to compute various messages in the JDD process, where we assume that exp ( · ) , log ( · ) and ϕ ( · ) are obtained in a look-up-table manner. Total approximate numbers of operations required by N g global iterations of JDD are listed in Table 2, which are also approximated as functions of N if N is large enough. We obtain JDD trajectories of LDPC coded massive MIMO system by using Algorithm 3 for different combinations of N d e t and N d e c , and plot the results in Figure 5, where M o = 4 and n T = n R = 16 . For each trajectory, we specify the approximate number of required multiplications. It is observed that JDD trajectories may converge to the same values of I ¯ V E and I ¯ C E , resulting in the same BER performance, with different computational complexities depending on the combination of N d e t and N d e c . This verifies the importance of the JDD strategy represented by N d e t and N d e c to operate the JDD efficiently.
Let us focus on the number of multiplications for a simple analysis of computational complexity. It is clear from Table 2 that the number of multiplications required for detection is much higher than that for decoding, especially with large n T and n R . Thus, increasing N d e t results in much higher computational complexity than increasing N d e c . It follows that increasing N d e t results in the significant decrease of N g to maintain the total amount of computational complexity. With a small N g , the JDD does not converge sufficiently so that a low value of threshold is not attained. As a result, we fix N d e t = 1 and adjust N d e c to design the JDD strategy, where N g is determined by N d e c with other parameters given. We call the JDD with N d e t = N d e c = 1 the global iteration only (GIO) JDD.
Consider a LDPC coded massive MIMO system using GIO JDD with N g = N g G I O as a reference system. The degree distributions of LDPC codes and the JDD strategy in a proposed coded massive MIMO system are determined in the following manner. First, we choose candidate values of N d e c resulting in the number of multiplications equivalent to that of GIO JDD. For each E b / N 0 , we perform the following optimization for all candidate values of N d e c :
max λ , ρ R ( λ , ρ ) s . t . I ¯ V E = 1 after running Algorithm 3 ,       λ 2 2 d c = 2 d c , max ρ d c / d c ,       d c = 2 d c , max ρ d c = d v = 2 d v , max λ d v = 1 with ρ d c , λ d v 0 ,
where the first constraint guarantees the convergence of JDD and the second constraint is used to satisfy Criterion (c) introduced above. The lowest E b / N 0 , at which there exist N d e c such that the maximum R ( λ , ρ ) exceeds the target rate, is called the threshold and denoted by ( E b / N 0 ) . Degree distributions and N d e c resulting in the lowest threshold are determined as optimal parameters of LDPC codes and the JDD strategy, respectively. Then, we construct the parity check matrix of LDPC codes based on optimally determined degree distributions by using the PEG algorithm.

5. Numerical Results

We considered LDPC coded massive MIMO systems over 16 × 16 , 64 × 64 and 256 × 256 channels with code rates of R = 0.5 and 0.75 . Coded bits were mapped to 4-QAM transmit symbols by Gray-mapping. We considered a coded massive MIMO system using GIO JDD with an arbitrary N g G I O as a reference system, based on which the number of multiplications was evaluated as a function of N from Table 2. Then, we chose candidate values of N d e c of the proposed JDD strategy such that the total number of multiplications with N d e t = 1 was equivalent to that of GIO JDD, where N g was determined by N d e c with other given parameters. We solved the optimization problem in Equation (26) for each E b / N 0 and N d e c by using the differential evolution algorithm [41]. We found degree distributions and the value of N d e c resulting in the smallest threshold and the rate exceeding the target rate. Note that, in determining degree distributions of LDPC codes, we used the concentrated check node degree distribution [30], i.e., ρ ( x ) = ρ d c x d c + ( 1 ρ d c ) x d c + 1 . We constructed the parity check matrix of LDPC codes by using the degree distribution and the PEG algorithm. Then, we generated LDPC codes from the obtained parity check matrix and performed BER simulations.

5.1. Convergence Speed of JDD Strategy

We show the benefit of using the proposed JDD strategy in view of the threshold with respect to the amount of computational complexity. In Figure 6, we plot the threshold ( E b / N 0 ) obtained by the density evolution algorithm given in Algorithm 3 for the proposed JDD strategy and GIO JDD over 16 × 16 channel with various numbers of multiplications. It was observed that the proposed JDD strategy converged to the lowest threshold faster than GIO JDD. It was also observed that the proposed JDD strategy resulted in a lower threshold than GIO JDD for a given amount of computational complexity.

5.2. Performance Comparison without Complexity Constraint

We next considered the JDD without constraint on the amount of computational complexity. We investigated the threshold and BER obtained with different values of N d e c , where the case of N d e c = 1 corresponded to the reference system using GIO JDD. In Table 3, we list optimal degree distributions of LDPC codes and resultant thresholds for some values of R, N d e c and d v , max with n T = n R = 16 . It was observed that the proposed JDD strategy and the GIO JDD resulted in the same threshold for given d v , max and R.
In Figure 7, we plot BER performances of coded massive MIMO systems with N = 64,000 over 16 × 16 channel for some values of N d e c and sufficiently large N g . The degree distributions listed in Table 3 corresponding to d v , max = 24 and d v , max = 20 for R = 0.5 and R = 0.75 , respectively, were used for generating LDPC codes. We used N g = 200 and N g = 85 for N d e c = 1 and N d e c = 15 , respectively, when R = 0.5 and we used N g = 100 and N g = 90 for N d e c = 1 and N d e c = 5 , respectively, when R = 0.75 . It was observed that the proposed JDD strategy and GIO JDD showed similar BER performances if a sufficiently high amount of computational complexity was allowed. This result agreed with the threshold analysis presented in Figure 6 and Table 3.

5.3. Performance Comparison with Complexity Constraint

We then considered the JDD with the finite amount of computational complexity. In Table 4 and Table 5, we list optimal degree distributions of LDPC codes in the reference system (GIO JDD) and the proposed system. It was observed that the proposed JDD strategy resulted in a lower threshold than GIO JDD. We performed BER simulations of rate- 0.5 LDPC codes with N = 4096 and rate- 0.75 LDPC codes with N = 10,240, which were constructed from the degree distributions presented in Table 4 and Table 5, respectively. When R = 0.5 , we used degree distributions and N d e c corresponding to d v , max = 24 for both GIO JDD and the proposed JDD strategy. When R = 0.75 , we used degree distributions and N d e c corresponding to d v , max = 3 and d v , max = 20 for GIO JDD and the proposed JDD strategy, respectively. In Figure 8, we plot BER performances of the LDPC coded massive MIMO system equipped with the proposed JDD strategy and with GIO JDD over 16 × 16 channel. It was observed that using the proposed JDD strategy resulted in a lower BER than using GIO JDD. This result agreed with the threshold analysis presented in Table 4 and Table 5. Consequently, the jointly designed LDPC codes and JDD strategy could result in the lower BER of coded massive MIMO system by using the equivalent amount of computational complexity.
As shown in Figure 9 and Figure 10, we compared BER performances of the proposed LDPC coded massive MIMO system and the conventional system with various numbers of antennas, where the conventional system was equipped with the conventional LDPC codes and GIO JDD [38]. As the proposed system, we constructed the rate- 0.5 LDPC codes with N = 4096 using the degree distribution corresponding to d v , max = 24 in Table 4 and the rate- 0.75 LDPC codes with N = 2048 using the degree distribution corresponding to d v , max = 3 in Table 5. It was observed (Figure 9 and Figure 10) that the coding gain of the proposed system over the conventional one at the BER of 10 5 over 16 × 16 channel was about 2.3 dB and 1.4 dB for R = 0.5 and R = 0.75 , respectively.

6. Conclusions

In this study, we designed the LDPC coded massive MIMO system equipped with an iterative JDD algorithm using the low-complexity FG-GAI BP detection and the sum-product decoding. We defined a factor graph representation of the LDPC coded massive MIMO system and defined updating rules for messages flowing in the JDD process. We proposed a 3-D EXIT analysis as an engineering tool for investigating the behavior of iterative JDD algorithm of coded massive MIMO receiver. Based on the EXIT analysis, we designed jointly irregular LDPC codes through the optimization of degree distributions and the JDD strategy to achieve the lowest BER with a given amount of computational complexity. The proposed 3-D EXIT analysis enables the efficient design of LDPC codes and JDD strategy for coded massive MIMO system in a joint manner. We observed that the JDD strategy and corresponding LDPC codes designed appropriately by using the proposed EXIT analysis shows a faster convergence rate than a conventional JDD algorithm. Thus, the proposed scheme results in the improved BER performance over the conventional one with the equivalent amount of computational complexity. This result is meaningful especially when the computational complexity of coded massive MIMO receiver is constrained to finite amount, which is a practical situation.
In addition to the results presented in this paper, we plan to work on the following issues as future works.
  • We will perform 3-D EXIT analysis for coded massive MIMO system equipped with various kinds of MIMO detectors. Based on this, we plan to optimize the JDD strategy for each SISO MIMO detector under consideration and correspondingly design LDPC codes. Then, we will compare BER performances of coded massive MIMO systems using different MIMO detectors.
  • We will study and analyze the influence of imperfect channel estimation on the performance of LDPC coded massive MIMO system. It is hard to obtain the perfect channel estimation in practice, so we need to investigate this issue thoroughly to utilize the proposed scheme in practical communication systems.
  • We will work on the finite-length analysis of LDPC coded massive MIMO system. It is well known that using channel codes with short to medium blocklength results in a gentle waterfall in the BER curve [42,43,44,45]. Since practical communication systems use finite-length channel codes, we need to study this issue as a future work for the practical application of the coded massive MIMO technology.

Author Contributions

Conceptualization, J.W.L., I.H. and H.J.P.; software, I.H. and H.J.P.; investigation, J.W.L.; writing, J.W.L. and I.H.; project administration, J.W.L.; funding acquisition, J.W.L.

Funding

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A1B03933174).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Telater, I. Capacity of multi-antenna Gaussian channels. Eur. Trans. Telecommun. 1999, 10, 585–595. [Google Scholar] [CrossRef]
  2. Bjornson, E.; Larsson, E.; Marzetta, T. Massive MIMO: Ten myths and one critical question. IEEE Commun. Mag. 2016, 54, 114–123. [Google Scholar] [CrossRef]
  3. Rusek, F.; Persson, D.; Lau, B.; Larsson, E.; Marzetta, T.L.; Edfors, O.; Tufvesson, F. Scaling up MIMO: Opportunities and challenges with very large arrays. IEEE Signal Process. Mag. 2013, 30, 40–46. [Google Scholar] [CrossRef]
  4. Lu, L.; Li, G.; Swindlehurst, A.; Ashikhmin, A.; Zhang, R. An overview of massive MIMO: Benefits and challenges. IEEE J. Sel. Topics Signal Process. 2014, 8, 742–758. [Google Scholar] [CrossRef]
  5. Marzetta, T. Noncooperative cellular wireless with unlimited numbers of base station antennas. IEEE Trans. Wirel. Comm. 2010, 9, 3590–3600. [Google Scholar] [CrossRef]
  6. Larsson, E.; Tufvesson, F.; Edfors, O.; Marzetta, T. Massive MIMO for next generation wireless systems. IEEE Commun. Mag. 2014, 52, 186–195. [Google Scholar] [CrossRef] [Green Version]
  7. Hoydis, J.; ten Brink, S.; Debbah, M. Massive MIMO in the UL/DL of cellular networks: How many antennas do we need? IEEE J. Sel. Areas Commun. 2013, 31, 160–171. [Google Scholar] [CrossRef]
  8. Zuo, J.; Zhang, J.; Yuen, C.; Jiang, W.; Luo, W. Multicell multiuser massive MIMO transmission with downlink training and pilot contamination precoding. IEEE Trans. Veh. Tech. 2016, 65, 6301–6314. [Google Scholar] [CrossRef]
  9. Yu, S.; Lee, J. Channel sounding for multi-user massive MIMO in distributed antenna system environment. Electronics 2019, 8, 36. [Google Scholar] [CrossRef]
  10. Pitarokoilis, A.; Mohammed, S.; Larsson, E. On the optimality of single-carrier transmission in large-scale antenna systems. IEEE Wirel. Commun. Lett. 2012, 1, 276–279. [Google Scholar] [CrossRef]
  11. Ge, X.; Zi, R.; Wang, H.; Zhang, J.; Jo, M. Multi-user massive MIMO communication systems based on irregular antenna arrays. IEEE Trans. Wirel. Commun. 2016, 15, 5287–5301. [Google Scholar] [CrossRef]
  12. Ciuonzo, D.; Rossi, P.; Dey, S. Massive MIMO channel-aware decision fusion. IEEE Trans. Signal Process. 2015, 63, 604–619. [Google Scholar] [CrossRef]
  13. Shirazinia, A.; Dey, S.; Ciuonzo, D.; Rossi, P. Massive MIMO for decentralized estimation of a correlated source. IEEE Trans. Signal Process. 2016, 64, 2499–2512. [Google Scholar] [CrossRef]
  14. Jiang, F.; Chen, J.; Swindlehurst, A.; Lopez-Salcedo, J. Massive MIMO for wireless sensing with a coherent multiple access channel. IEEE Trans. Signal Process. 2015, 63, 3005–3017. [Google Scholar] [CrossRef]
  15. Ding, G.; Gao, X.; Xue, Z.; Wu, Y.; Shi, Q. Massive MIMO for distributed detection with transceiver impairments. IEEE Trans. Veh. Technol. 2018, 67, 604–617. [Google Scholar] [CrossRef]
  16. Ngo, H.; Matthaiou, M.; Duong, T.; Larsson, E. Uplink performance analysis of multicell MU-SIMO systems with ZF receivers. IEEE Trans. Veh. Technol. 2013, 62, 4471–4483. [Google Scholar] [CrossRef]
  17. Elghariani, A.; Zoltowski, M. Low complexity detection algorithms in large-scale MIMO systems. IEEE Trans. Wirel. Commun. 2016, 15, 1689–1702. [Google Scholar] [CrossRef]
  18. Gao, X.; Dai, L.; Yuen, C.; Zhang, Y. Low-complexity MMSE signal detection based on Richardson method for large-scale MIMO systems. In Proceedings of the 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, Canada, 14–17 September 2014; pp. 1–5. [Google Scholar] [CrossRef]
  19. Tang, C.; Liu, C.; Yuan, L.; Xing, Z. High precision low complexity matrix inversion based on Newton iteration for data detection in the massive MIMO. IEEE Commun. Lett. 2016, 20, 490–493. [Google Scholar] [CrossRef]
  20. Yoon, S.; Chae, C. Low-complexity MIMO detection based on belief propagation over pairwise graphs. IEEE Trans. Veh. Technol. 2014, 63, 2363–2377. [Google Scholar] [CrossRef]
  21. Som, P.; Datta, T.; Srinidhi, N.; Chockalingam, A.; Sundar Rajan, B. Low-complexity detection in large-dimension MIMO-ISI channels using graphical models. IEEE J. Sel. Top. Signal Process. 2011, 5, 1497–1511. [Google Scholar] [CrossRef]
  22. Narasimhan, T.; Chockalingam, A. Detection and decoding in large-scale MIMO systems: A non-binary belief propagation approach. In Proceedings of the 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), Seoul, Korea, 18–21 May 2014; pp. 1–5. [Google Scholar] [CrossRef]
  23. Studer, C.; Bolcskei, H. Soft-input soft-output single tree-search sphere decoding. IEEE Trans. Inf. Theory 2010, 56, 4827–4842. [Google Scholar] [CrossRef]
  24. Studer, C.; Burg, A.; Bolcskei, H. Soft-output sphere decoding: Algorithms and VLSI implementation. IEEE J. Sel. Areas Commun. 2008, 26, 290–300. [Google Scholar] [CrossRef]
  25. Papa, G.; Ciuonzo, D.; Romano, G.; Rossi, P. A dominance-based soft-input soft-output MIMO detector with near-optimal performance. IEEE Trans. Commun. 2014, 62, 4320–4335. [Google Scholar] [CrossRef]
  26. Cirkic, M.; Larsson, E. SUMIS: Near-optimal soft-in soft-out MIMO detection with low and fixed complexity. IEEE Trans. Signal Process. 2014, 62, 3084–3097. [Google Scholar] [CrossRef]
  27. Gallager, R. Low-Density Parity-Check Codes; MIT Press: Cambridge, MA, USA, 1963. [Google Scholar]
  28. Richardson, T.; Urbanke, R. The capacity of low-density parity-check codes under message-passing decoding. IEEE Trans. Inf. Theory 2001, 47, 599–618. [Google Scholar] [CrossRef] [Green Version]
  29. Richardson, T.; Shokrollahi, A.; Urbanke, R. Design of capacity-approaching irregular low-density parity-check codes. IEEE Trans. Inf. Theory 2001, 47, 619–637. [Google Scholar] [CrossRef] [Green Version]
  30. Chung, S.; Richardson, T.; Urbanke, R. Analysis of sum-product decoding of low-density parity-check codes using a Gaussian approximation. IEEE Trans. Inf. Theory 2001, 47, 657–670. [Google Scholar] [CrossRef] [Green Version]
  31. ten Brink, S. Convergence behavior of iteratively decoded parallel concatenated codes. IEEE Trans. Commun. 2001, 49, 1727–1737. [Google Scholar] [CrossRef]
  32. Uchoa, A.; Healy, C.; de Lammare, R. Iterative detection and decoding algorithms for MIMO systems in block-fading channels using LDPC codes. IEEE Trans. Veh. Technol. 2016, 65, 2735–2741. [Google Scholar] [CrossRef]
  33. ten Brink, S.; Kramer, G.; Ashikhmin, A. Design of low-density parity-check codes for modulation and detection. IEEE Trans. Commun. 2004, 52, 670–678. [Google Scholar] [CrossRef]
  34. Lu, B.; Yue, G.; Wang, X. Performance analysis and design optimization of LDPC-coded MIMO OFDM systems. IEEE Trans. Signal Process. 2004, 52, 348–361. [Google Scholar] [CrossRef]
  35. Zheng, J.; Rao, B. LDPC-coded MIMO systems with unknown block fading channels: Soft MIMO detector design, channel estimation, and code optimization. IEEE Trans. Signal Process. 2006, 54, 1504–1518. [Google Scholar] [CrossRef]
  36. Sanderovich, A.; Peleg, M.; Shamai, S. LDPC coded MIMO multiple access with iterative joint decoding. IEEE Trans. Inf. Theory 2005, 51, 1437–1450. [Google Scholar] [CrossRef]
  37. Suthisopapan, P.; Kasai, K.; Meesomboon, A.; Imtawil, V. Achieving near capacity of non-binary LDPC coded large MIMO systems with a novel ultra low-complexity soft-output detector. IEEE Trans. Wirel. Commun. 2013, 12, 5185–5199. [Google Scholar] [CrossRef]
  38. Narasimhan, T.; Chockalingam, A. EXIT chart based design of irregular LDPC codes for large-MIMO systems. IEEE Commun. Lett. 2013, 17, 115–118. [Google Scholar] [CrossRef]
  39. Zhao, X.; Li, Y.; Zhong, J.; Zhao, M.; Zheng, C. Low complexity layered joint detection and decoding for LDPC coded large-MIMO systems. In Proceedings of the 2013 International Conference on Wireless Communications and Signal Processing, Hangzhou, China, 24–26 October 2013; pp. 1–6. [Google Scholar] [CrossRef]
  40. Xu, J.; Chen, L.; Djurdjevic, I.; Lin, S.; Abdel-Ghaffar, K. Construction of regular and irregular LDPC codes: Geometry decomposition and masking. IEEE Trans. Inf. Theory 2007, 53, 121–134. [Google Scholar] [CrossRef]
  41. Storn, R.; Price, K. Differential evolution—A simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 1997, 11, 341–359. [Google Scholar] [CrossRef]
  42. Lee, J.; Urbanke, R.; Blahut, R. On the performance of turbo codes over the binary erasure channel. IEEE Commun. Lett. 2007, 11, 67–69. [Google Scholar] [CrossRef]
  43. Amraoui, A.; Montanari, A.; Richardson, T.; Urbanke, R. Finite-length scaling for iteratively decoded LDPC ensembles. IEEE Trans. Inf. Theory 2009, 55, 473–498. [Google Scholar] [CrossRef]
  44. Andriyanova, I. Finite-length scaling of turbo-like code ensembles on the binary erasure channel. IEEE J. Sel. Areas Commun. 2009, 27, 918–927. [Google Scholar] [CrossRef]
  45. Yazdani, R.; Ardakani, M. Waterfall performance analysis of finite-length LDPC codes on symmetric channels. IEEE Trans. Commun. 2009, 57, 3183–3187. [Google Scholar] [CrossRef]
Figure 1. Receiver structure of LDPC coded massive MIMO system.
Figure 1. Receiver structure of LDPC coded massive MIMO system.
Entropy 21 00231 g001
Figure 2. Message passing in the JDD of receiver for LDPC coded massive MIMO system.
Figure 2. Message passing in the JDD of receiver for LDPC coded massive MIMO system.
Entropy 21 00231 g002
Figure 3. The JDD process in terms of EXIT characteristics.
Figure 3. The JDD process in terms of EXIT characteristics.
Entropy 21 00231 g003
Figure 4. The 3-D EXIT chart and trajectory of JDD process for (3, 6)-regular LDPC coded massive MIMO system with 4-QAM over 16 × 16 MIMO channel at E b / N 0 = 5 [dB], where I ¯ O E denotes the mutual information per observation node.
Figure 4. The 3-D EXIT chart and trajectory of JDD process for (3, 6)-regular LDPC coded massive MIMO system with 4-QAM over 16 × 16 MIMO channel at E b / N 0 = 5 [dB], where I ¯ O E denotes the mutual information per observation node.
Entropy 21 00231 g004
Figure 5. JDD trajectories of LDPC coded massive MIMO system with R = 1 / 2 , n T = n R = 16 and E b / N 0 = 1.50 [dB].
Figure 5. JDD trajectories of LDPC coded massive MIMO system with R = 1 / 2 , n T = n R = 16 and E b / N 0 = 1.50 [dB].
Entropy 21 00231 g005
Figure 6. The threshold of the LDPC coded massive MIMO system with the proposed JDD strategy and with the GIO JDD obtained by the density evolution algorithm given in Algorithm 3, where R = 0.5 and R = 0.75 were considered with n T = n R = 16 .
Figure 6. The threshold of the LDPC coded massive MIMO system with the proposed JDD strategy and with the GIO JDD obtained by the density evolution algorithm given in Algorithm 3, where R = 0.5 and R = 0.75 were considered with n T = n R = 16 .
Entropy 21 00231 g006
Figure 7. BER performances of LDPC coded massive MIMO systems over 16 × 16 channel with various N d e c and sufficiently high amount of computational complexity, where N = 64,000.
Figure 7. BER performances of LDPC coded massive MIMO systems over 16 × 16 channel with various N d e c and sufficiently high amount of computational complexity, where N = 64,000.
Entropy 21 00231 g007
Figure 8. BER performances of LDPC coded massive MIMO systems equipped with the proposed JDD strategy and with GIO JDD over 16×16 channel, where N = 4096 and N = 10,240 with R = 0.5 and R = 0.75 , respectively, were considered.
Figure 8. BER performances of LDPC coded massive MIMO systems equipped with the proposed JDD strategy and with GIO JDD over 16×16 channel, where N = 4096 and N = 10,240 with R = 0.5 and R = 0.75 , respectively, were considered.
Entropy 21 00231 g008
Figure 9. BER performances of coded massive MIMO systems with the proposed LDPC codes and JDD strategy and with the conventional LDPC codes and GIO JDD, where R = 0.5 and N = 4096 over 16 × 16 and 64 × 64 channels were considered.
Figure 9. BER performances of coded massive MIMO systems with the proposed LDPC codes and JDD strategy and with the conventional LDPC codes and GIO JDD, where R = 0.5 and N = 4096 over 16 × 16 and 64 × 64 channels were considered.
Entropy 21 00231 g009
Figure 10. BER performances of coded massive MIMO systems with the proposed LDPC codes and JDD strategy and with the conventional LDPC codes and GIO JDD, where R = 0.75 and N = 2048 over 16 × 16 and 256 × 256 channels were considered.
Figure 10. BER performances of coded massive MIMO systems with the proposed LDPC codes and JDD strategy and with the conventional LDPC codes and GIO JDD, where R = 0.75 and N = 2048 over 16 × 16 and 256 × 256 channels were considered.
Entropy 21 00231 g010
Table 1. Computational complexities for computing messages in the detector and the decoder, where d ¯ v and d ¯ c denote the average degree of variable nodes and check nodes, respectively.
Table 1. Computational complexities for computing messages in the detector and the decoder, where d ¯ v and d ¯ c denote the average degree of variable nodes and check nodes, respectively.
MessagesApproximate Number of Operations
AdditionMultiplication
α i k ( s ) 4 n T n R ( 2 M o + 1 ) Θ α A 2 n T n R ( 11 M o + 4 ) Θ α M
β k i ( s ) 0 8 n T n R M o Θ β M
L v ( M o 2 ) N Θ v A 4 n T n R M o + N Θ v M
Pr { x ¯ l = s } n T M o log 2 M o + v ¯ N Θ s A 2 n T M o ( log 2 M o 1 ) Θ s M
L v c ( 2 d ¯ v + 1 ) N Θ v c A 0
L c v 2 d ¯ c ( N K ) Θ c v A 3 d ¯ c ( N K ) Θ c v M
Table 2. Total approximate number of operations required for overall JDD.
Table 2. Total approximate number of operations required for overall JDD.
OperationTotal Approximate Number of Operations
Addition N g N c h N d e t Θ α A + Θ v A + N d e c ( Θ v c A + Θ c v A ) + ( N g 1 ) N c h Θ s A
d ¯ v / ( n T log 2 M o ) N g N 2 + { ( 8 n R M o / log 2 M o ) N d e t + 2 ( d ¯ v + d ¯ c ) N d e c } N g N
Multiplication N g N c h N d e t Θ α M + ( N d e t 1 ) Θ β M + Θ v M + N d e c Θ c v M + ( N g 1 ) N c h Θ s M + Θ β M
30 n R M o N d e t + ( 3 d ¯ c ( 1 R ) log 2 M o ) N d e c N g N
Table 3. Optimal degree distributions of LDPC codes in a coded massive MIMO system over 16 × 16 channel for some values of N d e c , d v , max and R. We also specified the threshold ( E b N 0 ) d B , the capacity Γ d B and their gap, where the capacity of MIMO channel with M o -ary input was obtained by using a formula given in [34].
Table 3. Optimal degree distributions of LDPC codes in a coded massive MIMO system over 16 × 16 channel for some values of N d e c , d v , max and R. We also specified the threshold ( E b N 0 ) d B , the capacity Γ d B and their gap, where the capacity of MIMO channel with M o -ary input was obtained by using a formula given in [34].
R0.50.75
d v , max 1224122412201220
λ 2 0.311770.261380.311620.261370.171950.144850.171950.14485
λ 3 0.395200.307630.394860.307660.760440.621190.760440.62119
λ 8 0.12685 0.12684
λ 12 0.29304 0.29352 0.06761 0.06761
λ 20 0.23396 0.23396
λ 24 0.30414 0.30413
ρ 6 0.54707 0.54404
ρ 7 0.452930.318680.455960.31868
ρ 8 0.68132 0.68132
ρ 11 0.34890 0.34889
ρ 12 0.65110 0.65111
ρ 13 0.18173 0.18173
ρ 14 0.81827 0.81827
N d e c 1115151155
( E b N 0 ) d B 1.671.451.671.453.403.323.403.32
Γ d B 1.353.12
( E b N 0 ) d B Γ d B 0.320.100.320.100.280.200.280.20
Table 4. Optimal parameters of LDPC codes and JDD strategy for a coded massive MIMO system with R = 0.5 over 16 × 16 and 64 × 64 channels, where GIO JDD with N g G I O = 15 was used in a reference system.
Table 4. Optimal parameters of LDPC codes and JDD strategy for a coded massive MIMO system with R = 0.5 over 16 × 16 and 64 × 64 channels, where GIO JDD with N g G I O = 15 was used in a reference system.
Channels 16 × 16 64 × 64
JDD StrategyGIOProposedGIOProposed
d v , max 32412243241224
λ 2 0.305830.25299 0.304860.25777
λ 3 1.00.985210.383380.330011.00.984010.378640.32276
λ 9 0.06158 0.05931
λ 12 0.31079 0.31650
λ 24 0.01479 0.35542 0.01599 0.36016
ρ 6 0.997620.906870.42250 0.988530.890480.40215
ρ 7 0.002380.093130.577500.187560.011470.109520.597850.21765
ρ 8 0.81244 0.78235
N d e c N g   115  11521111811  115  11535132913
( E b N 0 ) d B 3.243.231.911.863.203.191.821.69
Γ d B 1.351.35
( E b N 0 ) d B Γ d B 1.891.880.560.511.851.840.470.34
Table 5. Optimal parameters of LDPC codes and JDD strategy for a coded massive MIMO system with R = 0.75 over 16 × 16 and 256 × 256 channels, where GIO JDD with N g G I O = 15 was used in a reference system.
Table 5. Optimal parameters of LDPC codes and JDD strategy for a coded massive MIMO system with R = 0.75 over 16 × 16 and 256 × 256 channels, where GIO JDD with N g G I O = 15 was used in a reference system.
Channels 16 × 16 256 × 256
JDD StrategyGIOProposedGIOProposed
d v , max 33203320
λ 2 0.003390.181280.150840.007720.181240.15360
λ 3 0.996610.818720.650810.992280.818760.66624
λ 20 0.19835 0.18017
ρ 11 0.96429 0.96186
ρ 12 1.00.03571 1.00.03814
ρ 13 0.72658 0.97718
ρ 14 0.27342 0.02282
N d e c N g   1151113  913  11576146714
( E b N 0 ) d B 4.203.663.654.103.453.44
Γ d B 3.123.12
( E b N 0 ) d B Γ d B 1.080.540.530.980.330.32

Share and Cite

MDPI and ACS Style

Hwang, I.; Park, H.J.; Lee, J.W. LDPC Coded Massive MIMO Systems. Entropy 2019, 21, 231. https://doi.org/10.3390/e21030231

AMA Style

Hwang I, Park HJ, Lee JW. LDPC Coded Massive MIMO Systems. Entropy. 2019; 21(3):231. https://doi.org/10.3390/e21030231

Chicago/Turabian Style

Hwang, Inho, Han Jin Park, and Jeong Woo Lee. 2019. "LDPC Coded Massive MIMO Systems" Entropy 21, no. 3: 231. https://doi.org/10.3390/e21030231

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop