Abstract
The objective of this work is to analyze the importance of the product in determining low density parity check (LDPC) code performance, as far as its influence on the weight distribution function and on the decoding thresholds. This analysis is based on the 2006 paper by Di et al., as far as the weight distribution function is concerned, and on the 2018 paper by Vatta et al., regarding the LDPC decoding thresholds. In particular, the first paper Di et al. analyzed the relation between the above mentioned product and the minimum weight of an ensemble of random LDPC codewords, whereas in the second some analytical upper bounds to the LDPC decoding thresholds were determined. In the present work, besides analyzing the performance of an ensemble of LDPC codes through the outcomes of Di et al.’s 2006 paper, we give the relation between one of the upper bounds found in Vatta et al.’s 2018 paper and the above mentioned product , thus showing its role in also determining an upper bound to LDPC decoding thresholds.
1. Introduction
Low Density Parity Check (LDPC) codes, belonging to the class of block channel codes, were introduced for the first time in the 1960s in Robert Gallager’s doctoral thesis [1]. Now they are counted among the most promising and cutting-edge coding techniques in contemporary channel coding. Due to the technological impediments of the time in which they were introduced and of the decoder complexity, these codes were hardly contemplated for about 30 years, with the exception of Tanner’s graphical description, introduced in [2], and successively designated as the Tanner graph. Appearing independently of Gallager’s work, the authors of [3,4] were the re-inventors of LDPC codes in the mid 1990s. Afterwards, because of their astonishing performance approaching the Shannon limit along with Turbo codes [5], they were rapidly comprehended in current communication standards [6,7,8].
The asymptotic performance of a block channel code, such as an LDPC code, is determined by its minimum distance, i.e., by its minimum weight codewords and by their multiplicities. These determine its correction capability and its asymptotic performance expressed in terms of bit error rate (BER) and frame error rate (FER) vs. the signal-to-noise ratio (SNR) from moderate to high SNRs, i.e., away from capacity. Moreover, as far as LDPC codes are concerned, as first observed in [1], it presents the well-known “threshold phenomenon”. In other words, the noise threshold defines a channel noise upper bound under which the lost information probability can be maintained as low as needed.
Since it is extremely difficult to study the performance of a LDPC codes ensemble analytically as the determination of its weight enumerating function is a complicated task, in this work we try to give an insight into this problem analyzing the importance of the product in influencing not only this function, that, as said above, determines the asymptotic BER and FER performance, away from capacity, but also the decoding thresholds, i.e., the performance next to the Shannon limit. Namely, on the basis of the results of [9,10], respectively, we are interested in determining, on one side, the relationship between the above mentioned product and the minimum distance of a LDPC codes ensemble, and, on the other side, the relationship between this product and the noise threshold of a LDPC codes ensemble. The first, namely the minimum distance, is related to LDPC’s codewords weight distribution, i.e., to their distance spectrum. The second, namely the noise threshold, is related to the convergence behavior of their iterative decoding algorithm, which is particularly important because LDPC codes, as well as turbo-like codes, are “capacity-achieving” codes.
As far as the first of the above cited papers, namely [9], is concerned, its main result asserts that the minimum distance growth rate of irregular LDPC codes ensembles is only determined by the value of the product , a number that is related to the degree distribution polynomial couple and . In particular, if , the minimum distance growth with the block length being sublinear, if not, the minimum distance growth with the block length is linear.
As far as the second of the above cited papers, namely Vatta et al.’s 2018 paper [10], is concerned, in this work we derived three computationally light upper bounds to LDPC belief-propagation decoding thresholds, usually determined “exactly” through density evolution, assuming, as in [11], the validity of the Gaussian Approximation (GA) (the employment of which is very convenient when an effective and computationally light method is required. See [10,12,13,14,15]), and by using the derivation of [16] (the clarifying vision and interpretation of [11] allows to determine the threshold as the ultimate value guaranteeing the convergence of the recurrent sequence, therein defined, but the authors of [11] did not provide any mathematical method to calculate it. Thus, in [16] we presented a mathematical method, based on the quadratic degeneracy theory, allowing the evaluation of noise thresholds by means of converting a convergence problem into a mathematical analysis problem. Using the algorithm shown in [16], a computationally light approximation of LDPC belief-propagation decoding thresholds, usually determined “exactly” through density evolution, can be obtained, assuming, as in [11], the validity of the GA) to determine the asymptotic analytical performance of defined, e.g., in [6].
In Section 2 we recall LDPC codes graphical representation and, in Section 3, the Gaussian Approximation approach. In Section 4 we review the mathematical method deduced in [16] to explain how the upper bounds of [10] were obtained. Furthermore, to analyze the relationship between the product and the minimum distance of a LDPC codes ensemble, in Section 6 the results of [9] are recalled, and, to analyze the relationship between this product and the noise threshold of a LDPC codes ensemble, in Section 7 we present a Lemma specifying the relationship between the third noise threshold upper bound found in [10] and the product . In Section 8, the numeric results of these two analyses are reported. These results are discussed in Section 9 which also will report some simulation results to support the discussion. Finally, Section 10 summarizes the conclusions.
2. Graphical Representation of LDPC Codes
LDPC codes can be represented in a graphical way through a commonly named bipartite graph, commonly known as the Tanner graph [2]. As the trellis diagram gives an efficient graphical representation of a convolutional code behavior, so does the Tanner graph in providing an efficient graphical representation of how a LDPC encoder and decoder work.
The nodes in a Tanner graph are classified in variable nodes and check nodes. In the drawing of the Tanner graph, the following rule must be respected: An edge connects a variable node i to a check node j when the corresponding element in the parity-check matrix H is a 1. From this it may be deduced that there is a check node for each of the check equations, and that there is a variable node for each of the n code bits .
As far as irregular LDPC codes are concerned [4], the parameters and specify the maximum degrees of the nodes distributions in their Tanner graphs, defined, e.g., in [17]. In particular, the polynomial () defines the variable (check) nodes edge-perspective degree distribution:
A LDPC code rate can be expressed as [18]:
The edge-perspective degree distributions and are related to the node perspective degree distributions and as follows [9]:
being,
3. Gaussian Approximation
Following the assumptions made in [11], the distributions of the messages involved in the LDPC iterative decoding process under appropriate hypotheses may be approximated as Gaussians. Since it may be observed that to totally specify a Gaussian only its mean and variance are needed, and during the iterative decoding process it is necessary to specify only the means and variances of a generic check node output message, u, and of a generic variable node output message, v. Furthermore, since in [11], assuming the validity of the symmetry condition, the variance was shown to be connected to the mean m by the relation , the means only can be kept in the computation process. The means of u and v have been denoted by and at the l-th iteration, respectively. Furthermore, the log-likelihood ratio (LLR) message from the channel can be taken as Gaussian with a mean of and a variance of , being the variance of the channel noise.
The mean of the output of a degree-i variable node at the iteration is:
where is the mean of and is the mean of u at the -th iteration.
Defining as in Definition 1 in [11], the update rule for an irregular code becomes:
The output of a variable node is specified by its mean , that can be calculated as the linear combination of the means :
4. Mathematical Method of [16]
As noted in [16], the problem of the determination of the convergence of Equation (10) may be solved by converting it to a problem of quadratic degeneracy, the solution of which can be given in charge to a commercial software. If the second partial derivative of with respect to t, , is , the problem of the determination of the convergence of Equation (10) becomes the search for the solution of the following system:
where is the first partial derivative of with respect to t. Its solution is the value , which is the minimum guaranteeing the convergence of Equation (10).
Its solution gives an estimate of the belief-propagation decoding threshold that may be determined exactly using density evolution. To solve Equation (17), an invertible approximation of the function is needed (see, e.g., [11,19,20]).
5. Upper Bounds on LDPC Codes Decoding Thresholds
The upper bounds on thresholds have been determined in [10] from the asymptotic performance of Equation (17). The first bound, called in [10], was obtained determining an approximation of the function valid for when . To obtain the second upper bound, called in [10], we have used the approximation Equation (16) of [10] (that was implicitly used in [11]). Finally, involving the Jensen’s inequality to manipulate the second upper bound, the third bound, called in [10], was determined.
5.1. Upper Bound on LDPC Codes Decoding Thresholds Holding for
As far as the above mentioned first upper bound on LDPC codes thresholds (called in [10]) is concerned, in [20] the following lemma was proved.
Lemma: Given of minimum degree , and defining as and as , being the Lambert-W function, the following asymptotic approximation holds:
Recalling that :
Its solution (, ) determines the bound , which is valid , unlike the other two ( and ) reported in [10], which hold both for only.
5.2. Further Upper Bounds on LDPC Codes Decoding Thresholds Holding for
With , Equation (18) can be rewritten as:
Assuming that the following simplified approximation holds:
calling , and being for , we find a much simpler asymptotic expression for (simpler than the one of Equation (18)):
Thus, the asymptotic performance of is given by:
This is the same asymptotic expression obtained, following a different derivation, in [11], where the approximation in Equation (23) was implicitly used in the proof of Lemma 3.
The solution of Equation (29) is:
Taking we obtain the third upper bound of [10]. Since, for the Jensen’s inequality for Equation (28):
it results and thus , i.e., gives a tighter upper bound.
6. Role of the Product in Determining the Weight Distribution of LDPC Codes
In Reference [9] it was demonstrated that occupies a key position in determining LDPC codes performance, both theoretically and in practice. In particular, the minimum distance growth rate, namely, whether it is linear or not, was shown to depend only on the product . Namely, if , the minimum distance growth rate is sublinear with the block length, otherwise, i.e., if , it is linear with the block length.
Moreover, in Reference [9] it was demonstrated that, when (condition examined in this paper), for any integer l such that:
being n the codeword length, the probability that a randomly chosen code has any weight-l codeword is:
7. Role of the Product in Determining the Decoding Threshold of LDPC Codes
The bound of Equation (30) is strictly related to the product investigated in this paper, but this relationship was not explicitly put in evidence in [10]. In particular, extending the result of [10], the following Lemma can be easily proven.
Lemma 1.
The above mentioned third bound on threshold in Equation (30) may be rewritten as:
Proof of Lemma 1.
Remembering the expression of and in (1) and (2), respectively, may be alternatively expressed as
and as,
Thus, remembering the expression of found in Equation (30), which holds for only, this can be rewritten as:
and thus, given the above mentioned expressions found for and , also as:
from which we get the result. □
Taking , the third upper bound of [10] may be rewritten as:
8. Numeric Results
In Table 1, Table 2, and Table 3 we report and for the irregular LDPC codes of Table I and II in [18]. For each pair of degree distributions, we also report the values of the product and of the parameter . Moreover, we give the values obtained in [18] by applying the density evolution analysis, jointly with the upper bound defined in Equation (30).
Table 1.
Computed parameters and decoding threshold bound regarding rate- codes deduced from Table I of [18], with , 6, 7, and 8.
Table 2.
Computed parameters and decoding threshold bound regarding rate- codes deduced from Table I of [18], with , 10, 11, and 12.
Table 3.
Computed parameters and decoding threshold bound regarding rate- codes deduced from Table II of [18] with , 20, 30, and 50.
Besides these results, we also reported the and values in dB, given by:
defining the gap from the Shannon limit of the bounds . In Equations (41) and (42), was evaluated using an approximation or a spline interpolation of , respectively, both recalled in the Appendix A. Applying the approximation , we get the Shannon limit as , which in good agreement with [21]. Applying the spline interpolation we find is in good agreement with [18]. In regards to the noise power, the Shannon limit is given by and .
9. Discussion and Simulation Results
Given the pairs and of Table 1, Table 2, and Table 3, for each of them, an ensemble with a random rate-1/2 LDPC codes has been generated, and their performance simulated using a customized software built on the basis of [22], assuming a memoryless binary input with an additive white Gaussian noise (BI-AWGN) channel.
Since l in Equation (33) is upper bounded by Equation (32), the discussion of the results may be conducted separately for the following two conditions:
- and
- .
9.1. Case 1:
The rate r of the codes whose pairs and were listed in Table 1, Table 2, and Table 3, is 1/2. It follows that, for the examples considered in the paper, . Thus, the degree distributions fulfilling the condition are those with , i.e., . This condition is fulfilled by the distributions having , 6, and 8 of Table 1. This implicates that for all these codes, i.e., that l is fixed. Given this fixed l value, the performance of the random selected LDPC codes having degree distributions given in the 2-nd, 3-rd, and last column of Table 1, are characterized by an asymptotic BER performance that depends on the probability of Equation (33) only, i.e., only on the value of the product . Taken these three degree distributions, the random selected LDPC code having a pair and that minimizes Equation (33), and thus is characterized by the best asymptotic BER performance, is the one for which the product is minimum. This is the case of the code ensemble with in Table 1. On the other hand, the random selected LDPC code having a pair and that maximize Equation (33) is the one for which the product is the maximum. This is the case of the code ensemble with in Table 1. Moreover, the minimization of the product implies, as expected from Equation (39), the maximization of and, thus, a minimization of and of .
Figure 1 illustrates the BER performances of two randomly generated codes with pairs and having and 8, respectively, minimizing and, respectively, maximizing the product .
Figure 1.
BER with respect to in dB with and , , and iterations number .
As shown in the figure above, the simulated performance achieved by the codes having is better than that achieved by the codes having . For instance, at dB, the BER obtained with is ∼3 ×, whereas the BER obtained with is ∼5 ×.
9.2. Case 2:
Since, as said above, for the examples considered in the paper, , it follows that the degree distributions fulfilling the condition are those with , i.e., . This condition is fulfilled by the codes with of Table 1, and by all the other codes of Table 2 and Table 3. This implies that for all these codes, i.e., that, given the block length n, l varies with . In this case, we expect that a higher upper bound of Equation (32) on the codeword weight l will provide in general a better BER performance. Thus, the dependence of this performance from the product must be evaluated case by case. For instance, considering Figure 2, Figure 3, and Figure 4, where the performances of three randomly generated codes with pairs and having , 9 and 10 are shown respectively, the BER curve obtained with (Figure 2) is the worse of the three (at dB the BER is ∼2 × ) and the one obtained with (Figure 3) is the best of the three (at dB the BER is ∼2 × ), whereas the one obtained with (Figure 4) is intermediate between the above mentioned two (at dB the BER is ∼4 × ) since the code with presents the lowest value (), that with presents the highest value (), whereas the one with presents an intermediate value () in respect to the other two. As far as the role of the product is concerned, in this case it may be seen that, even if the code with presents a higher value of this product with respect to the code with (1.69321 vs. 1.59749), its performance is better (at dB the BER is ∼2 × ) than that of the code with (presenting at dB a BER of ∼4 × ) because it presents a higher value of .
Figure 2.
BER with respect to in dB with , , and iterations number .
Figure 3.
BER with respect to in dB with , , and iterations number .
Figure 4.
BER with respect to in dB with , , and iterations number .
Thus, in conclusion, the randomly generated code having a degree distribution with (Figure 3) is the best since as it has the highest value of (0.49128) even if it presents an intermediate value of the product (1.69321). Moreover, the code with the lowest value of the product (1.59749), i.e., the one with also presents, as expected from (39), the highest value of (1.03314).
10. Conclusions
The objective of this work was the analysis of the importance of the product in determining LDPC codes performance, as far as both the weight distribution function and the decoding thresholds are concerned. This analysis was based on [9], as far as the weight distribution function was concerned, and on [10], regarding the LDPC decoding thresholds. The analysis was conducted on two main conditions, i.e., the one for which (being r the code rate) and the one for which . In the first case, the role of the product alone was fundamental in determining the performance. In the second, parameter was also important with the product. The best case was that presenting the highest value of together with the lowest value of the product . Moreover, a lower value of the product implied, as expected from (39), a higher value of the upper bound on the decoding threshold and thus, in terms of noise power, a smaller gap from the Shannon limit.
Author Contributions
Conceptualization, F.V. and F.B.; methodology, F.V.; software, F.E. and M.N.; validation, F.V., G.B., and M.C.; formal analysis, F.V.; investigation, F.V. and F.B.; resources, F.B. and M.C.; data curation, F.E. and M.N.; writing—original draft preparation, F.V.; writing—review and editing, F.V. and F.B.; visualization, F.V.; supervision, M.C.; project administration, M.C.; funding acquisition, F.V., G.B., and M.C.
Funding
This research was partly funded by the Italian Ministry of University and Research (MIUR) within the project FRA 2018 (University of Trieste, Italy), entitled “UBER-5G: Cubesat 5G networks—Access layer analysis and antenna system development.”
Acknowledgments
The authors wish to thank Alessandro Soranzo for his kind support in the formal analysis.
Conflicts of Interest
The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.
Appendix A. Approximation of the Functions and
We approximated the function , reported in Equation (8) of [16], with Mathematica®, using a numeric integration therein specified.
Here we report 66 (approximate) values () of , corresponding to with steps of 0.05. (The first value is 0.1314, the second is 0.1889, and so on.)
Figure A1 reports a graph of obtained with the same software.
Figure A1.
Graph of the function .
Figure A1.
Graph of the function .

To implement an approximation of the inverse we used a spline interpolation of the above approximatively reported values , with :
- s[y_] = Interpolation[v, y];
where v is the array of the 66 pairs of values .
Moreover, in [16] we also reported a couple of functions, one inverse of the other, approximating and its inverse , with forms, respectively,
with
References
- Gallager, R.G. Low-Density Parity-Check Codes; MIT Press: Cambridge, UK, 1963. [Google Scholar]
- Tanner, R.M. A recursive approach to low complexity codes. IEEE Trans. Inf. Theory 1981, 5, 533–547. [Google Scholar] [CrossRef]
- Mackay, D.J.C. Good error correcting codes based on very sparse matrices. IEEE Trans. Inf. Theory 1999, 2, 399–431. [Google Scholar] [CrossRef]
- Luby, M.G.; Mitzenmacher, M.; Shokrollahi, M.A.; Spielman, D.A. Improved low-density parity-check codes using irregular graphs. IEEE Trans. Inf. Theory 2001, 2, 585–598. [Google Scholar] [CrossRef]
- Babich, F.; Vatta, F. Turbo Codes Construction for Robust Hybrid Multitransmission Schemes. J. Commun. Softw. Syst. (JCOMSS) 2011, 4, 128–135. [Google Scholar] [CrossRef]
- Vatta, F.; Soranzo, A.; Comisso, M.; Buttazzoni, G.; Babich, F. Performance Study of a Class of Irregular LDPC Codes through Low Complexity Bounds on Their Belief-Propagation Decoding Thresholds. In Proceedings of the 2019 AEIT International Annual Conference, AEIT’19, Florence, Italy, 18–20 September 2019. [Google Scholar]
- Babich, F.; Comisso, M. Multi-Packet Communication in Heterogeneous Wireless Networks Adopting Spatial Reuse: Capture Analysis. IEEE Trans. Wirel. Commun. 2013, 10, 5346–5359. [Google Scholar] [CrossRef]
- Babich, F.; D’Orlando, M.; Vatta, F. Distortion Estimation Algorithms for Real-Time Video Streaming: An Application Scenario. In Proceedings of the 2011 International Conference on Software, Telecommunications and Computer Networks, SoftCOM’11, Split, Croatia, 15–17 September 2011. [Google Scholar]
- Di, C.; Richardson, T.J.; Urbanke, R. Weight distribution of low-density parity-check codes. IEEE Trans. Inf. Theory 2006, 11, 4839–4855. [Google Scholar] [CrossRef]
- Vatta, F.; Soranzo, A.; Babich, F. Low-Complexity bound on irregular LDPC belief-propagation decoding thresholds using a Gaussian approximation. Electron. Lett. 2018, 17, 1038–1040. [Google Scholar] [CrossRef]
- Chung, S.-Y.; Richardson, T.J.; Urbanke, R. Analysis of sum-product decoding of low-density parity-check codes using a Gaussian approximation. IEEE Trans. Inf. Theory 2001, 2, 657–670. [Google Scholar] [CrossRef]
- Babich, F.; Noschese, M.; Soranzo, A.; Vatta, F. Low complexity rate compatible puncturing patterns design for LDPC codes. In Proceedings of the 2017 International Conference on Software, Telecommunications and Computer Networks, SoftCOM’17, Split, Croatia, 21–23 September 2017. [Google Scholar]
- Babich, F.; Noschese, M.; Vatta, F. Analysis and design of rate compatible LDPC codes. In Proceedings of the 27th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ’16, Valencia, Spain, 4–8 September 2016. [Google Scholar]
- Tan, B.S.; Li, K.H.; Teh, K.C. Bit-error rate analysis of low-density parity-check codes with generalised selection combining over a Rayleigh-fading channel using Gaussian approximation. IET Commun. 2012, 1, 90–96. [Google Scholar] [CrossRef]
- Chen, X.; Lau, F.C.M. Optimization of LDPC codes with deterministic UEP properties. IET Commun. 2011, 11, 1560–1565. [Google Scholar] [CrossRef]
- Babich, F.; Soranzo, A.; Vatta, F. Useful mathematical tools for capacity approaching codes design. IEEE Commun. Lett. 2017, 9, 1949–1952. [Google Scholar] [CrossRef]
- Vatta, F.; Babich, F.; Ellero, F.; Noschese, M.; Buttazzoni, G.; Comisso, M. Performance study of a class of irregular LDPC codes based on their weight distribution analysis. In Proceedings of the 2019 International Conference on Software, Telecommunications and Computer Networks, SoftCOM’19, Split, Croatia, 19–21 September 2019. [Google Scholar]
- Richardson, T.J.; Shokrollahi, A.; Urbanke, R. Design of capacity- approaching irregular low-density parity-check codes. IEEE Trans. Inf. Theory 2001, 2, 619–637. [Google Scholar] [CrossRef]
- Vatta, F.; Soranzo, A.; Comisso, M.; Buttazzoni, G.; Babich, F. New explicitly invertible approximation of the function involved in LDPC codes density evolution analysis using a Gaussian approximation. Electron. Lett. 2019, 22, 1183–1186. [Google Scholar] [CrossRef]
- Vatta, F.; Soranzo, A.; Babich, F. More accurate analysis of sum-product decoding of LDPC codes using a Gaussian approximation. IEEE Commun. Lett. 2019, 2, 230–233. [Google Scholar] [CrossRef]
- Chung, S.-Y. On the Construction of Some Capacity-Approaching Coding Schemes. Ph.D. Thesis, MIT, Cambridge, MA, USA, 2000. Available online: http://dspace.mit.edu/handle/1721.1/8981 (accessed on 9 December 2019).
- Boscolo, A.; Vatta, F.; Armani, F.; Viviani, E.; Salvalaggio, D. Physical AWGN channel emulator for Bit Error Rate test of digital baseband communication. Appl. Mech. Mater. 2013, 241–244, 2491–2495. [Google Scholar] [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).



