Next Article in Journal
Energy-Efficient Parallel Computing: Challenges to Scaling
Previous Article in Journal
Target Positioning and Tracking in WSNs Based on AFSA
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Power Control of Reed–Solomon-Coded OFDM Systems in Rayleigh Fading Channels

Department of Electrical & Computer Engineering, University of Seoul, Seoul 02504, Republic of Korea
Information 2023, 14(4), 247; https://doi.org/10.3390/info14040247
Submission received: 19 March 2023 / Revised: 13 April 2023 / Accepted: 19 April 2023 / Published: 20 April 2023
(This article belongs to the Section Wireless Technologies)

Abstract

:
Power control in an RS-coded orthogonal frequency division multiplex (OFDM) system with error-and-erasure correction decoding in Rayleigh fading channels was investigated. The power of each symbol within a codeword was controlled to reduce the codeword error rate (WER). Several RS-coded OFDM systems with power control are proposed. The WERs of the proposed systems as a function of the signal-to-noise ratio per bit were derived. We found that channel inversion at the transmitter in combination with the erasure generation by ordering fading amplitudes at the receiver provided the lowest WER among the considered systems. Furthermore, the erasure generation by ordering fading amplitudes was found to be better than the erasure generation by comparing fading amplitudes with a threshold.

1. Introduction

In wireless communication systems, the received signal suffers from fading due to the multipath propagation of the transmitted signal. As a fading compensation technique, coding and power control were investigated independently in [1,2,3].
Coding in combination with power control is a powerful fading compensation technique, as we can see in the following RS code example. Coding uses redundancy to correct errors in a codeword. In RS codes, unreliable symbols are erased to use redundancy more efficiently. If the number of erased symbols in a codeword is more than the minimum distance, the codeword is not correctly decoded. First, assume that a codeword is not correctly decoded because it has too many erasures. Among the erased symbols in the codeword, some symbols are in deep fades, and the other symbols are relatively not in deep fades. If many erased symbols are relatively not in deep fades, we can make these erased symbols reliable by adding a little power to these symbols and correctly decode the codeword. Now, assume that a codeword is correctly decoded. Among the unerased symbols in the codeword, some symbols may have too much power, which can be used by other symbols in another codeword. Then, we can reduce and save the transmitted power of these symbols. As we see in the example, coding is good for managing the symbols in deep fades by erasing the symbols, and power control is good for managing the symbols with excessive power. Thus, coding in combination with power control is a powerful fading compensation technique that works in a complementary fashion [4].
We considered how to combine power control with the RS-coded system and compared erasure generation schemes. One code symbol is mapped to one M-ary quadrature amplitude modulation (MQAM) symbol. A codeword is transmitted parallel in the frequency domain by OFDM. We assumed that the receiver knows the fading of code symbols in a codeword and decodes codewords with error-and-erasure correction. At the receiver, three different erasure generation schemes are used. One erasure generation scheme is ordering fading amplitudes of symbols and erasing a fixed number of symbols that have smaller fading amplitudes than the other symbols in a codeword [5]. Another erasure generation scheme is comparing the fading amplitudes of symbols with a threshold and erasing the symbols that have a smaller fading amplitude than the threshold [6]. Furthermore, the erasure generation scheme that combines ordering and comparing a threshold was considered. At the transmitter, two different power control schemes called truncated channel inversion and truncation were only considered. The transmitter with truncated channel inversion cuts off its power for the symbols to be erased and uses channel inversion for the unerased symbols so that the received power for the unerased symbols are equal. The transmitter with only truncation cuts off its power for the symbols to be erased and transmits constant power for the unerased symbols. Thus, six systems that are classified by the erasure generation scheme at the receiver and the power control scheme at the transmitter are considered. We found that the erasure generation by ordering fading amplitudes was better than the erasure generation by comparing fading amplitudes with a threshold, also for the systems with no power control. Furthermore, the truncated channel inversion in combination with the erasure generation by ordering fading amplitudes was found to provide the lowest codeword error rate (WER) among the considered systems.
This paper consists of six sections. In Section 2, the system model is shown. In Section 3, the systems that use truncated channel inversion at the transmitter are analyzed. In Section 4, the systems that use only truncation at the transmitter are analyzed. In Section 5, numerical results are shown. Finally, conclusions are made in Section 6.

2. System Model

We considered an RS-coded OFDM system in a Rayleigh fading channel. The system model is shown in Figure 1.
The Q-ary ( N , K ) RS codes were used, where N is the number of the code symbols and K is the number of the information symbols in a codeword. A codeword is transmitted parallel in the frequency domain by OFDM. One code symbol in the RS code is transmitted as one MQAM symbol. Thus, Q is equal to M in MQAM. We assumed that the fading amplitudes of the symbols in a codeword are independent. Thus, perfect interleaving was assumed. Furthermore, the perfect channel state information (CSI) at the transmitter was assumed. For example, this perfect CSI assumption at the transmitter is easily implemented in 5G systems that use the time division duplex (TDD). The coherence time is usually larger than the switching time of the TDD. For the OFDM system, the independence of code symbols in a codeword is hard to achieve because the frequency spectrum of each symbol overlaps. We can avoid this spectrum overlap by inserting a serial to parallel conversion block before the inverse fast Fourier transform (IFFT) block at transmitter [7]. Thus, Q frames are transmitted simultaneously. We assumed that the fading amplitudes of the symbols in a codeword that have no spectrum overlap are independent. Furthermore, we assumed that fading stays constant over at least a Q frame length so that a code symbol suffers slow fading. Thus, the received signal after phase compensation at the demodulator for the i th symbol in a codeword is
r i = a i · x i + n i , i = 1 , 2 , , N
where a i is the fading amplitude, x i is the transmitted MQAM symbol, and n i is the complex Gaussian noise of the ith symbol. Note that x i and n i are complex numbers. a i is a positive real number. We assumed that E { a i 2 } = 1 , E { X i 2 } = E s = K N log 2 M · E b , and E { | n i | 2 } = N 0 , where E b is the average energy per information bit.
Error-and-erasure correction is used as the decoding scheme of RS codes. RS codes allow the correction of up to t errors and e erasures as long as [8]
2 t + e N K .
If we erase unreliable symbols, the performance gain over error-only decoding is achieved [5,6].

3. Truncated Channel Inversion

In this section, the truncated channel inversion as the power control scheme [9] is investigated:
E i = T 2 / a i 2 , f o r   u n e r a s e d   s y m b o l s 0 , f o r   e r a s e d   s y m b o l s ,
where E i is the transmitted energy for the ith symbol in a codeword and T 2 is the received energy for unerased symbols.
Finding the optimum erasure generation scheme is complex, and we analyzed three systems that use different erasure generation schemes. One erasure generation scheme is ordering fading amplitudes of symbols and erasing a fixed number of symbols in a codeword [5]. Another erasure generation scheme is comparing the fading amplitudes of symbols with a threshold and erasing the symbol that has smaller fading amplitude than the threshold [6]. Furthermore, we considered the erasure generation scheme that combines ordering and comparing a threshold.

3.1. Erasure Generation by Ordering Fading Amplitudes

In this subsection, ordering as the erasure generation scheme was assumed. The number of erased symbols within a codeword was fixed to e symbols.
After ordering the fading amplitudes, the probability density function (pdf) of a i 2 , where a i is the fading amplitude of the ith reliable symbol, is
f i ( x ) = N ! ( N i ) ! ( i 1 ) ! F N i ( x ) { 1 F ( x ) } i 1 f ( x )
where f ( x ) = e x and F ( x ) = 1 e x in the Rayleigh fading channel. Since we assumed that the received energy of unerased symbols was set to T 2 , the average transmitted energy per codeword is
E c w = i = 1 N e 0 T 2 x · f i ( x ) d x = N T 2 i = 1 N e N 1 i 1 ( 1 ) N i + 1 j = 0 N i ( 1 ) j N i j ln ( N j ) .
See Appendix B.1 for the derivation of (5). The average transmitted energy per information bit E b is
E b = E c w K log 2 M ,
T 2 N 0 = K log 2 M N i = 1 N e N 1 i 1 ( 1 ) N i + 1 j = 0 N i ( 1 ) j N i j ln ( N j ) · E b N 0 .
The symbol error probability P s of MQAM is written as [10]
P s = 4 ( 1 1 M ) Q 3 E s ( M 1 ) N 0 4 ( 1 1 M ) 2 Q 2 3 E s ( M 1 ) N 0 4 Q 3 E s ( M 1 ) N 0
where the Q-function is defined as
Q ( x ) = x e t 2 / 2 2 π d t .
We used (8) as the tight upper bound of the symbol error probability for the analysis. Then, the symbol error probability for an unerased symbol P s | E ¯ is
P s | E ¯ = α · Q ( β T 2 N 0 )
where α = 4 and β = 3 M 1 . The WER is
WER = t = N K e 2 + 1 N e N e t P s | E ¯ t ( 1 P s | E ¯ ) N e t .

3.2. Erasure Generation by Comparing Fading Amplitudes with a Threshold

In this subsection, we erased the code symbols that have smaller fading amplitudes than threshold T 1 .
If a i 2 < T 1 , the ith symbol in a codeword is erased, where a i is the fading amplitude of the ith symbol. The pdf of a i 2 is f ( x ) = e x . The symbol erase probability is
P E = 0 T 1 e x d x = 1 e T 1 .
The probability that a codeword has e symbol errors is
P E ( e ) = N e P E e ( 1 P E ) N e .
The average transmitted energy of an unerased symbol is
T 1 T 2 x · e ( x T 1 ) d x = T 2 e T 1 E i ( 1 , T 1 )
where E i ( n , x ) is an exponential integral function defined as
E i ( n , x ) = 1 e x t t n d t .
The average transmitted energy per codeword is
E c w = e = 0 N K ( N e ) T 2 e T 1 E i ( 1 , T 1 ) · P E ( e )
where P E ( e ) is (13). Since the average energy per information bit E b is written as (6),
T 2 N 0 = K log 2 M e = 0 N K ( N e ) e T 1 E i ( 1 , T 1 ) · P E ( e ) · E b N 0 .
The symbol error probability for an unerased symbol P s | E ¯ is written as (10). The WER is
WER = e = 0 N K P E ( e ) · t = N K e 2 + 1 N e N e t P s | E ¯ t ( 1 P s | E ¯ ) N e t + e = N K + 1 N P E ( e ) .

3.3. Erasure Generation by Ordering and Comparing Fading Amplitudes with a Threshold

Here, we considered the erasure generation scheme that includes both ordering and comparing fading amplitudes with a threshold as special cases. At least e symbols are erased in a codeword and the fading amplitudes of all unerased symbols is larger than the threshold T 1 . In Appendix C, we verified that this erasure generation scheme is the same as ordering when T 1 = 0 and the same as comparing a threshold when e = 0 .
For the analysis, we assumed that we first erase e symbols by comparing the threshold T 1 . If the number of erased symbols e is less than e, we erase e e symbols additionally by ordering. The average transmitted energy per codeword is
E c w = T 2 e = 0 e 1 ( N e ) P E ( e ) j = 1 N e N e 1 j 1 k = 0 N e j N e j k ( 1 ) k e T 1 ( k + j ) E i ( 1 , T 1 ( k + j ) ) + T 2 e = e N K ( N e ) e T 1 E i ( 1 , T 1 ) P E ( e )
where we can obtain P E ( e ) by replacing e with e in (13). See Appendix B.2 for the derivation of (19). The symbol error probability for an unerased symbol P s | E ¯ is written as (10). The WER is
WER = e = 0 e P E ( e ) · t = N K e 2 + 1 N e N e t P s | E ¯ t ( 1 P s | E ¯ ) N e t + e = e + 1 N K P E ( e ) t = N K e 2 + 1 N e N e t P s | E ¯ t ( 1 P s | E ¯ ) N e t + e = N K + 1 N P E ( e ) .

4. Truncation Only

In this section, we considered truncation as the power control scheme:
E i = E s , f o r   u n e r a s e d   s y m b o l s 0 , f o r   e r a s e d   s y m b o l s ,
where E i is the transmitted energy for the ith symbol in a codeword.
As in the previous section, we considered three different erasure generation schemes. One is ordering; another is comparing a threshold; the other is combining the form of ordering and comparing a threshold.

4.1. Erasure Generation by Ordering Fading Amplitudes

In this subsection, we considered ordering as the erasure generation scheme. The number of erased symbols within a codeword was fixed to e symbols.
It is hard to derive the WER exactly as a function of E b / N 0 for this system because the received powers of the unerased symbols within a codeword are not independent random variables after ordering. The proof of the fact that ordering does not preserve the independence of independent and identically distributed (i.i.d.) random variables is in Appendix A.
If we assume the independence of unerased symbol powers as [5], the WER is derived as follows. After ordering the fading amplitudes, the pdf of a i 2 , where a i is the fading amplitude of the ith reliable symbol, is written as (4). The pdf of an unerased symbols is
g ( x ) = i = 1 N e 1 N e · f i ( x ) = N N e i = 1 N e N 1 i 1 F N i ( x ) { 1 F ( x ) } i 1 f ( x ) .
The symbol error probability for an unerased symbol is
P s | E ¯ = 0 α · Q ( β x ) · g ( x ) d x = α N 2 ( N e ) i = 2 N e N 1 i 1 j = 0 N i N i j ( 1 ) j 1 ( i + j ) 1 β β + 2 i + 2 j
where β = 3 M 1 · K N e log 2 M · E b / N 0 . The WER is written as (11). Note that (11) assumes the independence of unerased symbol powers.

4.2. Erasure Generation by Comparing Fading Amplitudes with a Threshold

In this subsection, we erase code symbols that have smaller fading amplitudes than the threshold T 1 .
The average energy per codeword is
E c w = e = 0 N K E s ( N e ) P E ( e )
where P E ( e ) is (13). See that we do not transmit any power for the codeword that has more than N K erasures. The symbol error probability for the unerased symbol is
P s | E ¯ = T 1 α · Q ( β x ) · e ( x T 1 ) d x = α e T 1 e T 1 Q ( β T 1 ) β β + 2 · Q ( ( β + 2 ) T 1 )
where α = 4 and β = 3 M 1 · E s / N 0 = 3 M 1 · K N log 2 M · E b / N 0 . The WER is written as (18).

4.3. Erasure Generation by Ordering and Comparing Fading Amplitudes with a Threshold

In this subsection, we considered the erasure generation scheme that includes both ordering and comparing fading amplitudes with a threshold as special cases. At least e symbols are erased in a codeword, and the fading amplitudes of all unerased symbols are larger than the threshold T 1 . For this system, we found the WER by computer simulation. It is hard to derive the GER since the received powers of unerased symbols are dependent after ordering.

5. Results

Throughout the numerical results, we used 16-QAM modulation for a code symbol and 16-ary (16,8) RS codes. Thus, the DFT and IFFT size was 256. As the performance measure, the WER was used.

5.1. Truncated Channel Inversion

In Figure 2, Figure 3 and Figure 4, we considered the systems with truncated channel inversion.
In Figure 2, we show the WER vs. E b / N 0 for the system with ordering as the erasure generation scheme. We found that that there is an optimum number of erased symbols in a codeword and that is e = 6 when the (16,8) RS code is used.
In Figure 3, we show the WER vs. E b / N 0 for the system with comparing a threshold as the erasure generation scheme. For small E b / N 0 , the system with the large threshold T 1 is better because the gain by erasing unreliable symbols is larger than the loss by erasing reliable symbols. For large E b / N 0 , the system with the small threshold T 1 is better because the loss by erasing reliable symbols is large. The optimum threshold is a decreasing function of E b / N 0 since we do not have to erase symbols when we have enough power.
In Figure 4, we show the WER vs. E b / N 0 for the system with ordering and comparing a threshold as the erasure generation scheme. For T 1 = 0.008 , we found that the plot is the same as Figure 2. For T 1 = 0.128 , we can see the error floor at large E b / N 0 . We can see that the combining of ordering and comparing a threshold has no power gain over the ordering only.

5.2. Truncation Only

In Figure 5, Figure 6 and Figure 7, we considered the systems with only truncation.
In Figure 5, we show the WER vs. E b / N 0 by simulation for the system with ordering as the erasure generation scheme. We found that that there is an optimum number of erased symbols in a codeword, and that is e = 6 , as shown in Figure 2. We also show that the WER by mathematical analysis is larger than the simulation results since the WER by mathematical analysis was obtained by assuming the independence of the unerased symbols and the dependency of the unerased symbols make burst errors.
In Figure 6, we show the WER vs. E b / N 0 for the system with comparing a threshold as the erasure generation scheme. Similar results were found as in Figure 3.
In Figure 7, we show the WER vs. E b / N 0 for the system with ordering and comparing a threshold as the erasure generation scheme. For T 1 = 0.008 , we found that the plot is the same as Figure 5. For T 1 = 0.128 , we can see the error floor by the large threshold T 1 . We can see that the combining of ordering and comparing a threshold has no power gain over the ordering only, as in Figure 4.

5.3. Performance Comparison of Systems

In Figure 8, we plot the WERs of not only power-controlled systems, but also systems with no power control. The WER comparison was based on computer simulations. All the formulae are exact except the cases with ordering. Since the ordering makes the unerased symbol powers dependent, the mathematically derived WER for the system with ordering is an upper bound. “Error-only decoding” is the system that has no fading information both at the transmitter and receiver. “Order” and “Threshold” are systems that have fading information only at the receiver. In “Error-only decoding”, “Order”, and “Threshold”, we cannot use power control since the transmitter does not have the fading information. “Order” erases e symbols in a codeword. “Threshold” erases the symbol that has a fading amplitude smaller than T 1 . All parameters, which are T 1 or e in each system, were optimized as a function of E b / N 0 . It is shown that truncated channel inversion with ordering gave the same and lowest WER as truncated channel inversion with ordering and comparing a threshold. Truncation with ordering gave the same WER as truncation with ordering and comparing a threshold. Thus, we can see that combining ordering and comparing a threshold had no gain over ordering only. For WER = 10 3 , truncated channel inversion with ordering provided a 4.9 dB gain over ordering and a 7.7 dB gain over error-only decoding. For WER = 10 6 , truncated channel inversion with ordering provided a 7.4 dB gain over ordering and a 12.1 dB gain over error-only decoding. For large E b / N 0 , fading compensation techniques provided a larger gain than for small E b / N 0 , since fading, rather than Gaussian noise, was the major reason for the errors for large E b / N 0 . We see that ordering is a better erasure generation scheme than comparing a threshold.
In Table 1, required E b / N 0 are shown when the WER’s are 10 3 and 10 6 . It was shown that channel inversion with ordering provides the lowest WER. In Table 2, E b / N 0 gains are shown for different coded OFDM schemes. It is shown that coded scheme with channel inversion power control provides the best performance.

6. Conclusions

Power control of RS-coded OFDM systems in Rayleigh fading channels were considered. The transmitter cuts off its power for for the symbols to be erased, and error-and-erasure correction was performed at the receiver. We found that the erasure generation by ordering fading amplitudes was better than the erasure generation by comparing fading amplitudes with a threshold, also for the systems with no power control. It was shown that the combining of ordering and comparing a threshold had no gain over ordering only. We found that truncated channel inversion in combination with the erasure generation scheme by ordering fading amplitudes provided the lowest codeword error rate (WER) among the considered systems. Our analysis can be generalized to other modulation schemes that have the Q-function as the symbol error rate formula.

Funding

This work was supported by the 2019 Research Fund of the University of Seoul.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

Appendix A. Proof of the Fact that Ordering Does Not Preserve Independence

Here, we prove that ordering does not preserve the independence of i.i.d. random variables. Assume that we have N i.i.d. random variables, where the pdf and the cumulative distribution function of a random variable are f ( x ) and F ( x ) , respectively. We assumed that N 2 symbols are erased by ordering. Thus, we have only two unerased symbols. A 1 and A 2 denote the two unerased symbols, respectively.
The pdf of A 1 is
f A 1 ( x ) = N F N 1 ( x ) f ( x ) .
The pdf of A 2 is
f A 2 ( x ) = N ( N 1 ) F N 2 ( x ) { 1 F ( x ) } f ( x ) .
B 1 and B 2 are reordered random variables from A 1 and A 2 .
The pdf of B 1 is
f B 1 ( x ) = 1 2 f A 1 ( x ) + 1 2 f A 2 ( x ) = 1 2 N F N 1 ( x ) f ( x ) + 1 2 N ( N 1 ) F N 2 ( x ) { 1 F ( x ) } f ( x ) .
The pdf of B 2 is the same as (A1). The joint pdf of B 1 and B 2 is
f B 1 , B 2 ( x , y ) = 1 2 N ( N 1 ) F N 2 ( x ) f ( x ) f ( y ) + 1 2 N ( N 1 ) F N 2 ( y ) f ( y ) f ( x ) = N ( N 1 ) 2 f ( x ) f ( y ) { F ( N 2 ) ( x ) + F ( N 2 ) ( y ) } .
B 1 and B 2 are not independent because f B 1 , B 2 ( x , y ) f B 1 ( x ) f B 2 ( y ) . Thus, we proved that ordering does not preserve the independence of i.i.d. random variables.

Appendix B. Derivation of (5) and (19)

Here, we derive (5) and (19).

Appendix B.1. Derivation of (5)

In the system using truncated channel inversion with ordering, we erased e symbols. We used channel inversion so that the average received energy of an unerased symbol is equal to T 2 . Thus, the average transmitted energy per codeword is
E c w = i = 1 N e 0 T 2 x · f i ( x ) d x = N T 2 i = 1 N e N 1 i 1 0 1 x ( 1 e x ) N i ( e x ) i 1 e x d x = N T 2 i = 1 N e N 1 i 1 0 ( 1 ) N i ( e x 1 ) N i e i x d x x .
In [12],
0 e p x ( e x 1 ) n d x x = k = 0 n ( 1 ) k n k ln ( p + n k ) .
If we substitute i for p and N i for n,
0 ( e x 1 ) N i e i x d x x = k = 0 N i ( 1 ) k N i k ln ( N k ) .
Thus,
E c w = N T 2 i = 1 N e N 1 i 1 ( 1 ) N i + 1 j = 0 N i ( 1 ) j N i j ln ( N j )
where we used j instead of k as a summation index.

Appendix B.2. Derivation of (19)

In the system using truncated channel inversion with ordering and comparing a threshold, we erased e unreliable symbols by comparing a threshold. If e < e , we erased e e symbols additionally so that the total number of erased symbols is equal to e. If e e , we did not erase anymore. Thus, the minimum number of erased symbols in a codeword is e. First, assume that e < e . The pdf of the jth unerased symbols is
f j ( x ) = ( N e ) ! ( N e j ) ! ( j 1 ) ! F N e j ( x ) { 1 F ( x ) } j 1 f ( x )
where F ( x ) = ( 1 e ( x T 1 ) ) u ( x T 1 ) and f ( x ) = e ( x T 1 ) u ( x T 1 ) . u ( x ) is the unit step function. The transmitted energy for the jth unerased symbol is
T 1 T 2 x f j ( x ) d x = T 1 T 2 x ( N e ) ! ( N e j ) ! ( j 1 ) ! F N e j ( x ) { 1 F ( x ) } j 1 f ( x ) d x = ( N e ) ! ( N e j ) ! ( j 1 ) ! k = 0 N e j T 1 T 2 x N e j k ( 1 ) k e k ( x T 1 ) e ( j 1 ) ( x T 1 ) e ( x T 1 ) d x = ( N e ) ! ( N e j ) ! ( j 1 ) ! k = 0 N e j T 2 N e j k ( 1 ) k T 1 1 x e ( k + j ) ( x T 1 ) d x = ( N e ) ! ( N e j ) ! ( j 1 ) ! k = 0 N e j T 2 N e j k ( 1 ) k e T 1 ( k + j ) E i ( 1 , ( k + j ) T 1 )
when the number of erased symbols by comparing the threshold T 1 is e . When e < e , the transmitted energy of a codeword E 1 ( e ) is the sum of the N e symbol energy.
E 1 ( e ) = j = 1 N e ( N e ) ! ( N e j ) ! ( j 1 ) ! k = 0 N e j T 2 N e j k ( 1 ) k e T 1 ( k + j ) E i ( 1 , ( k + j ) T 1 ) = ( N e ) T 2 j = 1 N e N e 1 j 1 k = 0 N e j N e j k ( 1 ) k e T 1 ( k + j ) E i ( 1 , T 1 ( k + j ) ) .
When e e N K , the transmitted energy of a codeword E 2 ( e ) is the sum of the N e symbol energy.
E 2 ( e ) = T 2 ( N e ) e T 1 E i ( 1 , T 1 ) .
When e > N K , we transmit no energy for this codeword. Thus, the average transmitted energy per codeword is written as
e = 0 e 1 E 1 ( e ) P E ( e ) + e = e N K E 2 ( e ) P E ( e ) .
We can see that (A3) is equal to (19).

Appendix C. Verification of (19) and (20)

In the erasure generation scheme that combines ordering and comparing a threshold, at least e symbols are erased in a codeword, and the symbols with smaller fading amplitudes than T 1 are also erased. Thus, this erasure generation scheme has two parameters, e and T 1 .

Appendix C.1. Verification of (19)

Here, we verified that (19) is the same as (5) when T 1 = 0 and the same as (16) when e = 0 . (19) with T 1 = 0 is written as
E c w = lim T 1 0 N T 2 j = 1 N e N 1 j 1 k = 0 N j N j k ( 1 ) k E i ( 1 , T 1 ( k + j ) )
since e = 0 .
E c w = lim T 1 0 N T 2 j = 1 N e N 1 j 1 k = 0 N j N j k ( 1 ) k 1 e ( k + j ) T 1 t t d t = lim T 1 0 N T 2 j = 1 N e N 1 j 1 k = 0 N j N j k ( 1 ) k T 1 e ( k + j ) p p d p = N T 2 j = 1 N e N 1 j 1 0 k = 0 N j N j k ( 1 ) k e k p e j p d p p = N T 2 j = 1 N e N 1 j 1 0 ( 1 ) k ( e p 1 ) N j ( 1 ) N j k e j p d p p .
Using (A2), we can see that (A5) is equal to (5).
Now, we verified that (19) is the same as (16) when e = 0 . (19) with e = 0 is written as
T 2 e = 0 N K ( N e ) e T 1 E i ( 1 , T 1 ) P E ( e ) ,
which is the same as (16).

Appendix C.2. Verification of (20)

Here, we verified that (20) is the same as (11) when T 1 = 0 and the same as (18) when e = 0 . (20) with T 1 = 0 is written as
WER = P E ( 0 ) · t = N K e 2 + 1 N e N e t P s | E ¯ t ( 1 P s | E ¯ ) N e t
which is the same as (11).
Now, we verified that (20) is the same as (18) when e = 0 . (20) with e = 0 is written as
WER = P E ( 0 ) · t = N K 2 + 1 N N t P s | E ¯ t ( 1 P s | E ¯ ) N t + e = 1 N K P E ( e ) t = N K e 2 + 1 N e N e t P s | E ¯ t ( 1 P s | E ¯ ) N e t + e = N K + 1 N P E ( e )
which is the same as (18).

References

  1. Fossorier, M.P.C.; Lin, S. Soft decision decoding of linear block codes based on ordered statistics for the Rayleigh fading channel with coherent detection. IEEE Trans. Commun. 1997, 45, 12–14. [Google Scholar] [CrossRef]
  2. Hayes, J.F. Adaptive feedback communications. IEEE Trans. Commun. 1968, 16, 29–34. [Google Scholar] [CrossRef]
  3. Goldsmith, A.J.; Chua, S.G. Variable-rate variable-power MQAM for fading channels. IEEE Trans. Commun. 1997, 45, 1218–1230. [Google Scholar] [CrossRef]
  4. Simpson, F.; Holzman, J.M. Direct sequence CDMA power control, interleaving, and coding. IEEE J. Select. Areas Commun. 1993, 11, 1085–1095. [Google Scholar] [CrossRef]
  5. Matsumoto, T.; Higashi, A. Performance analysis of RS-coded M-ary FSK for frequency-hopping spread spectrum mobile radios. IEEE Trans. Veh. Technol. 1992, 41, 266–270. [Google Scholar] [CrossRef]
  6. Hagenauer, J.; Lutz, E. Forward error correction coding for fading compensation in mobile satelite channels. IEEE J. Select. Areas Commun. 1987, 5, 215–225. [Google Scholar] [CrossRef]
  7. Hara, S.; Prasad, R. Overview of multicarrier CDMA. IEEE Commun. Mag. 1997, 35, 126–133. [Google Scholar] [CrossRef]
  8. Lin, S.; Costello, D.J., Jr. Error Control Coding: Fundamentals and Applications; Prentice-Hall: Hoboken, NJ, USA, 1983. [Google Scholar]
  9. Kim, S.W.; Goldsmith, A. Truncated power control in code division multiple access communications. IEEE Trans. Veh. Technol. 2000, 49, 965–972. [Google Scholar] [CrossRef]
  10. Proakis, J.G. Digital Communications; McGraw-Hill: New York, NY, USA, 1995; p. 280. [Google Scholar]
  11. Lakshmi, M.V.; Reddy G., G.; Sucharitha, A.; Akshara, N.; Vaishnavi, N. Performance comparison of channel coding techniques for OFDM system. IOP Conf. Ser. Mater. Sci. Eng. 2022, 1272, 012012. [Google Scholar] [CrossRef]
  12. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series and Products; Academic Press: Oxford, UK, 1980; p. 326. [Google Scholar]
Figure 1. (a) Discrete time system model. (b) Power spectrum of the transmitted signal ( Q = 2 , N = 6 ).
Figure 1. (a) Discrete time system model. (b) Power spectrum of the transmitted signal ( Q = 2 , N = 6 ).
Information 14 00247 g001
Figure 2. WER vs. E b / N 0 for truncated channel inversion with ordering.
Figure 2. WER vs. E b / N 0 for truncated channel inversion with ordering.
Information 14 00247 g002
Figure 3. WER vs. E b / N 0 for truncated channel inversion with comparing a threshold.
Figure 3. WER vs. E b / N 0 for truncated channel inversion with comparing a threshold.
Information 14 00247 g003
Figure 4. WER vs. E b / N 0 for truncated channel inversion with ordering and comparing a threshold.
Figure 4. WER vs. E b / N 0 for truncated channel inversion with ordering and comparing a threshold.
Information 14 00247 g004
Figure 5. WER vs. E b / N 0 for truncation only with ordering.
Figure 5. WER vs. E b / N 0 for truncation only with ordering.
Information 14 00247 g005
Figure 6. WER vs. E b / N 0 for truncation only with comparing a threshold.
Figure 6. WER vs. E b / N 0 for truncation only with comparing a threshold.
Information 14 00247 g006
Figure 7. WER vs. E b / N 0 for truncation only with ordering and comparing a threshold.
Figure 7. WER vs. E b / N 0 for truncation only with ordering and comparing a threshold.
Information 14 00247 g007
Figure 8. Comparison of WERs.
Figure 8. Comparison of WERs.
Information 14 00247 g008
Table 1. Required E b / N 0 for WER 10 3 and 10 6 .
Table 1. Required E b / N 0 for WER 10 3 and 10 6 .
WER = 10 3 WER = 10 6
Error-only decoding [1]2026
Threshold [6]1722
Truncated, Threshold [9]15.821.8
Order [5]1621
Truncated, Order14.519.5
Truncated, Order, and Threshold14.519.5
Channel inversion, Threshold14.317.5
Channel inversion, Order1214
Channel inversion, Order, and Threshold1214
Table 2. E b / N 0 gain for different coded OFDM schemes [11].
Table 2. E b / N 0 gain for different coded OFDM schemes [11].
Coded OFDM SchemeGain over Uncoded OFDM Scheme
Convolutional-coded OFDM2 dB
RS-coded OFDM3.5 dB
RS-coded OFDM with truncated channel inversion7 dB
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kim, Y. Power Control of Reed–Solomon-Coded OFDM Systems in Rayleigh Fading Channels. Information 2023, 14, 247. https://doi.org/10.3390/info14040247

AMA Style

Kim Y. Power Control of Reed–Solomon-Coded OFDM Systems in Rayleigh Fading Channels. Information. 2023; 14(4):247. https://doi.org/10.3390/info14040247

Chicago/Turabian Style

Kim, Younggil. 2023. "Power Control of Reed–Solomon-Coded OFDM Systems in Rayleigh Fading Channels" Information 14, no. 4: 247. https://doi.org/10.3390/info14040247

APA Style

Kim, Y. (2023). Power Control of Reed–Solomon-Coded OFDM Systems in Rayleigh Fading Channels. Information, 14(4), 247. https://doi.org/10.3390/info14040247

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop