Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2018, Article ID 4181626, 10 pages
https://doi.org/10.1155/2018/4181626
Research Article

Superposition Coded Modulation Based Faster-Than-Nyquist Signaling

1State Key Laboratory of ISN, Xidian University, Xi’an, China
2Science and Technology on Communication Networks Laboratory, Shijiazhuang, China
3Department of EEIS, University of Science and Technology of China, Hefei, China

Correspondence should be addressed to Baoming Bai; nc.ude.naidix.liam@iabmb

Received 24 November 2017; Accepted 31 March 2018; Published 16 May 2018

Academic Editor: Luca Reggiani

Copyright © 2018 Shuangyang Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

A structure of faster-than-Nyquist (FTN) signaling combined with superposition coded modulation (SCM) is considered. The so-called FTN-SCM structure is able to achieve the constrained capacity of FTN signaling and only requires a low detection complexity. By deriving a new observation model suitable for FTN-SCM, we offer the power allocation based on a proper detection method. Simulation results show that, at any given spectral efficiency, the bit error rate (BER) curve of FTN-SCM lies clearly outside the minimum signal-to-noise ratio (SNR) boundary of orthogonal signaling with a larger alphabet. The achieved data rates are also close to the maximum data rates of the certain shaping pulse.

1. Introduction

With the demand and the growth of advanced signal processing capabilities at base stations, the need of efficient backhauling solutions to transmit a large amount of data increases significantly. Thus, as one of the most important parts of deploying the fifth-generation (5G) cellular network, more efficient backhauling techniques need to be applied [2]. Conventionally, the capacity of networks is enlarged by consuming more time/bandwidth/spatial resources. However, this solution may not always be possible, due to the practical reasons. Hence, as an alternative method to gain more capacity, FTN signaling has recently received a lot of attention. An overview of FTN signaling for 5G communication systems was provided in [3].

FTN signaling is an extension of traditional linear modulation and a classical way of nonorthogonal signal transmission, which was first proposed by Mazo in 1975 [4]. Mazo discovered that, with sinc pulse as the shaping pulse, the minimum squared Euclidean distance of binary phase shift keying (BPSK) modulated pulses remains the same even when the symbol rate is, to some extent, higher than the Nyquist criterion. His work indicates that there are roughly 25% more bits that could be transmitted in the same bandwidth compared to that of Nyquist signaling, with almost the same error performance over additive white Gaussian noise (AWGN) channels. Recently, Rusek et al. proved that FTN signaling is able to bring more degrees of freedom (DoF) over the AWGN channel [5, 6] compared to orthogonal signaling. As a result, a higher spectral efficiency is expected for FTN signaling and, indeed, fascinating simulation results have already been reported. In [7], a precoded FTN system with quadrature phase shift keying (QPSK) modulation was presented, which, as simulation results imply, requires lower SNR to reach the BER < compared to that of the constrained capacity of 8-PSK for orthogonal signaling with the same spectral efficiency. However, there is still no such signaling method existing in the literature that is able to outperform orthogonal signaling constrained by a larger alphabet at any preferred spectral efficiency. The reason for this problem lies in the complexity of maximum-likelihood (ML) detection for FTN signals growing exponentially with the size of the alphabet and with the number of taps of intersymbol interference (ISI), respectively. When the system requires high spectral efficiency, conventional FTN signaling systems need either an alphabet with a larger size or a compression factor of a smaller value to meet the requirements. Consequently, the required ML detection complexity becomes prohibitively high and a suboptimal detection method has to be utilized, which in return somehow damages the performance. Hence, in this paper, we attempt to solve such an issue by considering SCM [813].

SCM is a special case of multilevel coding (MLC) [8], which offers an excellent solution to transmissions with severe interference. With the use of the fast Fourier transform- (FFT-) based technique proposed in [9], the detection complexity of SCM system is , where is denoted as the frame length [10]. Moreover, with proper Gaussian assumption, the optimization for SCM systems is easier than that of conventional bit interleaved coded modulation (BICM) systems [10]. SCM has also been proven to have promising performance over a variety of channels [11, 12]. More advantages of SCM can be found in [10] and the references therein.

The idea of combining SCM with FTN signaling first appeared in [14], where FTN signals are treated as the sum of several orthogonal signals with different time delays; thus it allows the successive interference cancellation (SIC) detection at the receiver. However, in [1], it has been proven that the aforementioned structure cannot bring any gain in terms of DoF. Hence, a so-called “full-FTN" structure has been proposed in [1] along with its proof of achieving the constrained capacity of FTN signaling. In this structure, the signals are viewed as the sum of several FTN signals of the same compression factor and the SIC is also utilized to reduce the detection complexity. Different from the traditional FTN signaling, to gain a higher spectral efficiency, this structure utilizes more layers rather than a small compression factor. Since, with SIC detection, the detection complexity grows linearly with the number of layers and exponentially with the number of ISI taps, the overall detection complexity of this structure is normally very low. On the other hand, since at each layer, the symbol rate still exceeds the signal bandwidth, the DoF gain of FTN signaling is maintained. However, this structure still lacks a well-designed equalizer to perform SIC, because the common equalizers for FTN signaling, such as the one in [15], require the utilization of the whitening filter in the receiver. This is rather difficult and even impossible when the FTN signal, at each layer, is corrupted by both the colored noise and the signals from other layers. Hence, it is needed to derive a new observation model, which allows the SIC and the detection for each individual layer at the same time. It should also be noted that the combination of FTN signaling and SCM bypasses the obstacle of designing the channel code in terms of different compression factors. Similar to the traditional SCM, an identical code can be utilized for all layers of FTN-SCM, which makes the design and implementation of FTN-SCM system very easy. By simply adjusting the number of superposition layers and the power allocation, FTN-SCM is able to provide a wide range of spectral efficiencies with excellent performance.

The main contributions of this paper are summarized in the following:(1)We adapt the idea from [1] and provide a more generalized FTN-SCM scheme.(2)A new channel observation model suitable for FTN-SCM is introduced.(3)The detection method and the corresponding power allocation for FTN-SCM are also discussed.(4)Simulation results show that, for BER , FTN-SCM requires lower SNR than that of the orthogonal signaling with a larger alphabet at any given spectral efficiency.

The rest of this paper is organized as follows. The diagram of FTN-SCM is provided in Section 2. Then, the new channel observation is derived in Section 3. In Section 4, the detection method is described, along with the power allocation derivation. Our numerical results are presented in Section 5, and finally a brief conclusion is provided in Section 6.

2. System Model

The transmitter structure of FTN-SCM is illustrated in Figure 1. Assume that the sequence carrying information bits is separated into substreams, namely, . Each subsequence of , say , is then encoded by its corresponding encoder generating the codeword of length . is the permuted version of , which is afterward modulated in the form of BPSK with an average symbol energy , where is a pregiven power, is the compression factor, and is the symbol time. represents the modulated symbols at the th layer, which are then superposed directly with the modulated symbols from other layers. The transmitted symbol sequence is obtained as the superposition is finished, where the th symbol of is given as . The FTN modulator is able to shape the transmitted signal for the given input based on a certain -orthogonal pulse . Without loss of generality, an FTN-SCM signal can be expressed as

Figure 1: The transmitter structure of FTN-SCM.

A brief diagram of FTN-SCM signal is given in Figure 2, where and . As shown in the figure, the pulse of each individual symbol is interfered by the pulses from both the current layer and the other layers. It should be mentioned that, in this case, a symbol rate that is higher than the Nyquist criterion is maintained at each layer. Thus, the capacity gain of FTN signaling is preserved. Note that the different power assignment for each layer is not the only way of performing SIC in the receiver, similar to that of the orthogonal signaling; choosing codes of different rate for each layer may also do the work.

Figure 2: A brief diagram of an FTN-SCM signal with and .

Figure 3 illustrates the receiver structure of FTN-SCM. In this paper, as we only focus on AWGN channels, the received signal is presented as , where has one side power spectral density (PSD) . Let represent the autocorrelation function samples of . We havewhere denotes the complex conjugation and is the length of finite ISI tap. The output of the matched filter is denoted as . We thus havewhere is a Toeplitz matrix given asand is the colored-noise vector with zero mean and the covariance matrix . Here, is the expectation operator and is the Hermitian (conjugate) transpose.

Figure 3: The receiver structure of FTN-SCM.

Without loss of generality, the detection can start at the first layer, and after the detection of each layer, the estimation of current layer inputs, say , is stored for the interference calculation of the following layers. Note that, after one complete sweep over all layers, the updated estimation can be reused to perform other sweeps, which is able to further improve the interference calculation. Normally, three complete sweeps would be enough for FTN-SCM systems.

3. Channel Observation Model

We consider the minimum distance detector in this paper. Based on the receiver structure, for detecting the th layer, we havewhererepresents the estimation of the signal of the th layer. By expanding the equation and dropping the irrelevance, (5) yieldswhere represents the real part of a complex number. By switching the integral sequence, (7) can be further derived asThus, with respect to the matched filter outputs, we getwhere

It is obvious that (9) enables the implementation of the Viterbi algorithm [16]. Similarly, as for soft-in soft-out (SISO) algorithms, for example, the BCJR algorithm [17], (9) implies the recursive probabilistic factorization of the formin which is assumed to be Gaussian, and its variance is denoted as . Hence, the derivation of the channel observation model is complete.

4. Detection Method and Power Allocation

To detect FTN-SCM signal, a well-designed equalizer that accepts nonwhite noise is necessary. Thus, we choose the original method from [18] as the method detecting each layer. The method has been proven to offer promising performance based on the Ungerboeck observation model [19]. As an extension of the traditional -algorithm BCJR (-BCJR) algorithm, the detection method selects the best states not only based on the current symbol but also considering the influence of some “future" symbols. At each trellis section, for each possible state , the method calculates the metrics of the path that induces and all possible paths from the section till that are extended from . However, new concerns arise due to the presence of other layers. In the following, we aim to offer a performance analysis for the detection of each layer and we further give the power allocation of each layer.

We believe slightly abusing the notation is acceptable. We henceforth use and in place of and , respectively, and then the sequence of can be represented as . Without loss of generality, we assume equiprobably taking values in the alphabet. Hence, in our case, for detecting the th layer, based on the description in [18] and the aforementioned observation model, the metric of path with a random error pattern is represented aswhere is the norm operator and is the lower triangular matrix with zero main diagonal of the size that is denoted asAs we define size and size , by substituting (3) into (12), we havein which represents the accuracy of the estimation and is given aswith the variance .

Furthermore, we consider the difference of the metrics of two individual erroneous paths. Define the two paths as and and further define . After several manipulations [18], we obtainwhere

In the following, we focus on the detection performance of each stage. Since the detection at each stage is interfered by the signals from the other stages, it is necessary to make sure that the algorithm is still able to offer a correct detection, for which we offer the following theorem.

Theorem 1 (correct detection criterion). In FTN-SCM systems, the th stage can be successfully detected without the presence of noise, if the maximum variance of , say , satisfieswhere represents the minimum squared Euclidean distance of BPSK modulated FTN signals with normalized signal energy, i.e. BPSK modulated FTN signal satisfies .

Proof. The proof is given in Appendix A.

Clearly, Theorem 1 is a sufficient condition for the th stage being successfully detected. Thus, we have proved that the algorithm is able to provide a correct detection, as long as (18) is satisfied. It is straightforward to offer the power allocation based on (18). However, this may not be a good choice for three reasons. Firstly, the derivation for (18) involves the scaling of inequalities; thus the power allocation based on (18) is not the best. Secondly, the algorithm operates on a reduced ISI trellis, where the certain error patterns that have a larger metric may not be included during the detection. Thirdly, practically speaking, Theorem 1 is not the necessary condition for the successful detection. Since error-correcting codes are normally implemented in FTN-SCM systems which helps in the detection in a certain level, thus the power allocation should also take the influence of the corresponding codes into account.

All these three reasons suggest that the power allocation may not necessarily be derived in such a strict way. Hence, we slightly adjust the detection criterion by calculating the probability of instead of , where the detection algorithm is assumed with and is the correct state that is preserved at the th section. Thus, at th section, the log likelihood ratio (LLR) of the input can be obtained by the following theorem.

Theorem 2 (the correct tail path). We claim that is the correct tail path (CTP) if and only if the last elements are correct, which is . Then at th section, for the CTPs and of the states and that are induced by the correct state , we have

Proof. The proof is given in Appendix B.

With Theorem 2, it is possible to evaluate the error event rate (EER) of each layer. We assume the two CTPs are and with , respectively. Thus, for the error event , we haveBy considering the Gaussian assumption, and the steep decrease of function, (20) can be simplified aswhere

In the following, we offer a power allocation with respect to individual error-correcting codes. Without loss of generality, we assume that the code at the th layer successfully recovers the information sequence at over the FTN channel. Meanwhile, according to (21), the signal-to-interference plus noise ratio (SINR) for the th layer is defined asTherefore, to successfully decode , must hold. Thus, we haveHence, by noticing the natural power assignment constraint that , the required for all can be obtained recursively starting from . The numerical results based on the above power allocation are demonstrated in the next section.

5. Numerical Results

We choose the root raised cosine (RRC) (with roll-off factor and a time-truncation to around = 0) (without loss of generality, we assume ) as the shaping pulse . Meanwhile, the outer code is chosen as the code rate asymmetric Turbo code in [18], with the generator polynomial and . As we transmit 20000 information bits per layer, we have as the codeword length, wherein redundant bits are included to terminate the trellis. The two-dimensional normalized spectral efficiency is defined as .

The simulation results of FTN-SCM with to and are plotted in Figure 4, wherein the power allocation is shown in Table 1. The parameters for the detection method are chosen as and . There are 50 Turbo iterations between the FTN and Turbo code at each layer and 3 complete sweeps in total. Figure 5 shows the corresponding achieved data rate (for details on the data rate, please refer to [5]) at BER . As figures imply, the BER results of FTN-SCM lie clearly outside the constrained capacity boundary with a larger alphabet of orthogonal signaling. We also observe that FTN-SCM is able to achieve a wide range of spectral efficiencies with a simple binary modulation format at each layer. In order to better illustrate the performance of FTN-SCM, we make a comparison between our method and the method in [1]. The BER results of two methods are given in Figure 6, where the simulation parameters are the same as the case of in Figure 4, except the power allocation for method in [1] is given as and . Note that, in [1], the authors utilize an optimal FTN equalizer in order to gain a very good performance. However, such equalizers are normally impractical, especially when there are a lot of layers; for example, . On the other hand, for BER , our method only needs no more than 0.1 dB to achieve the same performance as the optimal result, but with much less complexity, which proves that our method exhibits a better trade-off between performance and complexity than the method in [1]. For a detailed complexity comparison, please refer to [18]. It should be mentioned that the BER results can be improved by choosing a better outer code or a better detection method, which is a future topic for us.

Table 1: Power allocation for the simulations in Figure 4.
Figure 4: BER results of FTN-SCM with layers and compared to constrained capacities of orthogonal signaling, where    represents the two-dimensional normalized spectral efficiency.
Figure 5: Achieved data rate (BER ) compared to both the constrained and unconstrained capacity of orthogonal signaling as well as the ultimate capacity of RRC with .
Figure 6: BER result of FTN-SCM with compared to the result of the method in [1].

6. Conclusion

In this paper, we considered the FTN-SCM structure. Based on the transceiver structure, we derived a new observation model and further offered the power allocation with respect to the detection method of each layer. Simulation results show that, in a wide range of spectral efficiencies, FTN-SCM requires lower SNR than that for orthogonal signaling with a larger alphabet. It should be noted that the proposed scheme is easy to be extended to nonbinary modulation cases and other types of channels.

Appendix

A. Proof of Theorem 1

According to [18], the probabilities of the correct state and the wrong state with the error sequence satisfy the following equation:where and represent the th path of the probability calculation for and , respectively. Without loss of generality, we assume that and have the same error pattern . Thus, by considering (16), (A.1) can be further simplified aswhereand , representing the squared Euclidean distance between the erroneous path and the correct path at the current stage. As is assumed to be Gaussian with variance , the right-hand side of (A.2) can be upper-bounded in the noiseless regime byBy noticing the fact that , the right-hand side of (A.4) can further be extended asThis completes the proof of Theorem 1.

B. Proof of Theorem 2

Clearly, since is the correct state at section and the states in the trellis are Markovian, the LLR of the input is determined by the probabilities of the states and . According to the description in [18], in our case, the probability of followswhere , with , representing the th possible path that is extended from . The calculation implies a process of generating the marginal probability from all joint probabilities, as combinations are all taken into account.

For derivation brevity, we use and representing the paths extended from and , respectively. We further require that the same subscript represents the same error pattern. Thus, it is fair to assume that and are the CTPs from states and , respectively. Hence, we obtainWithout loss of generality, we consider , where is not the CTP. Recall (16); we havewhere

Since is no longer part of the equation, the only variable in the equation is . Thus, as all the combinations of are included in (B.2), we can safely draw the conclusion thatThis completes the proof of Theorem 2.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grants 61771364, 91438101, and 61601346, by the Science and Technology on Communication Networks Laboratory under Grant 614210403070717, by the Fundamental Research Funds for the Central Universities under Grant WK2100060020, by the Key Research Program of Frontier Sciences of CAS under Grant QYZDY-SSW-JSC003, by the China Postdoctoral Science Foundation under Grant 2015M580819, and by the Shaanxi Province Postdoctoral Science Foundation.

References

  1. Y. J. D. Kim, J. Bajcsy, and D. Vargas, “Faster-Than-Nyquist Broadcasting in Gaussian Channels: Achievable Rate Regions and Coding,” IEEE Transactions on Communications, vol. 64, no. 3, pp. 1016–1030, 2016. View at Publisher · View at Google Scholar · View at Scopus
  2. CISCO, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015-2020, http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.pdf, 2016.
  3. J. B. Anderson, “Faster-than-Nyquist signaling for 5G communication,” in Signal Processing for 5G: Algorithms and Implementations, pp. 24–46, Wiley-IEEE Press, 2016. View at Google Scholar
  4. J. E. Mazo, “Faster-than-Nyquist signaling,” Bell Labs Technical Journal, vol. 54, no. 8, pp. 1451–1462, 1975. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. F. Rusek and J. B. Anderson, “Constrained capacities for faster-than-Nyquist signaling,” IEEE Transactions on Information Theory, vol. 55, no. 2, pp. 764–775, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  6. J. B. Anderson, F. Rusek, and V. Öwall, “Faster-than-Nyquist signaling,” Proceedings of the IEEE, vol. 101, no. 8, pp. 1817–1830, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. F. Rusek and J. B. Anderson, “Serial and parallel concatenations based on faster than nyquist signaling,” in Proceedings of the IEEE International Symposium on Information Theory, pp. 1993–1997, Seattle, WA, USA, 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. T. M. Cover, “Broadcast Channels,” IEEE Transactions on Information Theory, vol. 18, no. 1, pp. 2–14, 1972. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Yuan, Q. Guo, and L. Ping, “Low-complexity iterative detection in multi-user MIMO ISI channels,” IEEE Signal Processing Letters, vol. 15, pp. 25–28, 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. L. Ping, J. Tong, X. Yuan, and Q. Guo, “Superposition coded modulation and iterative linear MMSE detection,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 6, pp. 995–1004, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. K. Wu and L. Ping, “A quasi-random approach to space-time codes,” IEEE Transactions on Information Theory, vol. 54, no. 3, pp. 1073–1085, 2008. View at Publisher · View at Google Scholar · View at MathSciNet
  12. X. Chen, X. Wang, and X. Ma, “Superposition convolutional coded modulation for the Rayleigh fading channel,” in Proceedings of the International Conference on Communications, Circuits and Systems, ICCCAS 2007, pp. 37–41, IEEE, Kokura, Japan, 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. X. Ma and L. Ping, “Coded modulation using superimposed binary codes,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3331–3343, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  14. Y. J. Kim and J. Bajcsy, “Faster than Nyquist broadcast signaling,” in Proceedings of the 2012 26th Biennial Symposium on Communications (QBSC), pp. 186–189, Kingston, Canada, May 2012. View at Publisher · View at Google Scholar
  15. G. Colavolpe, G. Ferrari, and R. Raheli, “Reduced-state BCJR-type algorithms,” IEEE Journal on Selected Areas in Communications, vol. 19, no. 5, pp. 848–859, 2001. View at Publisher · View at Google Scholar · View at Scopus
  16. G. D. Forney, “The Viterbi Algorithm,” Proceedings of the IEEE, vol. 61, no. 3, pp. 268–278, 1973. View at Publisher · View at Google Scholar · View at Scopus
  17. L. R. Bahl, J. Cocke, F. Jelinek, and J. Raviv, “Optimal Decoding of Linear Codes for Minimizing Symbol Error Rate,” IEEE Transactions on Information Theory, vol. 20, no. 2, pp. 284–287, 1974. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Li, B. Bai, J. Zhou, P. Chen, and Z. Yu, “Reduced-Complexity Equalization for Faster-than-Nyquist Signaling: New Methods Based on Ungerboeck Observation Model,” IEEE Transactions on Communications, vol. 66, no. 3, pp. 1190–1204, 2018. View at Publisher · View at Google Scholar · View at Scopus
  19. G. Ungerboeck, “Adaptive Maximum-Likelihood Receiver for Carrier-Modulated Data-Transmission Systems,” IEEE Transactions on Communications, vol. 22, no. 5, pp. 624–636, 1974. View at Publisher · View at Google Scholar · View at Scopus