ArticlePDF Available

A PEG construction of finite-length LDPC codes with low error floor

Authors:

Abstract

The progressive-edge-growth (PEG) algorithm of Hu et al. is modified to improve the error floor performance of the constructed low-density parity-check (LDPC) codes. To improve the error floor, the original PEG algorithm is equipped with an efficient algorithm to find the dominant elementary trapping sets (ETS's) that are added to the Tanner graph of the under-construction code by the addition of each variable node and its adjacent edges. The aim is to select the edges, among the candidates available at each step of the original PEG algorithm, that prevent the creation of dominant ETS's. The proposed method is applicable to both regular and irregular variable node degree distributions. Simulation results are presented to demonstrate the superior ETS distribution and error floor performance of the constructed codes compared to similar codes constructed by the original and other modifications of the PEG algorithm.
1288 IEEE COMMUNICATIONS LETTERS, VOL. 16, NO. 8, AUGUST 2012
A PEG Construction of Finite-Length LDPC Codes with Low Error Floor
Sina Khazraie, Reza Asvadi, Member, IEEE, and Amir H. Banihashemi, Senior Member, IEEE
Abstract—The progressive-edge-growth (PEG) algorithm of
Hu et al. is modified to improve the error floor performance of the
constructed low-density parity-check (LDPC) codes. To improve
the error floor, the original PEG algorithm is equipped with
an efficient algorithm to find the dominant elementary trapping
sets (ETS’s) that are added to the Tanner graph of the under-
construction code by the addition of each variable node and
its adjacent edges. The aim is to select the edges, among the
candidates available at each step of the original PEG algorithm,
that prevent the creation of dominant ETS’s. The proposed
method is applicable to both regular and irregular variable
node degree distributions. Simulation results are presented to
demonstrate the superior ETS distribution and error floor
performance of the constructed codes compared to similar codes
constructed by the original and other modifications of the PEG
algorithm.
Index Terms—Low density parity-check (LDPC) codes, trap-
ping sets, elementary trapping sets, error floor, progressive edge
growth (PEG) algorithm, code construction.
I. INTRODUCTION AND PRELIMINARIES
THE Progressive-edge-growth (PEG) algorithm of [2] is
well-known for the construction of good low-density
parity-check codes with short to medium block length. Since
the introduction of the PEG algorithm, a number of modi-
fications have appeared in the literature, including [8], [10],
[11]. In [10], the error floor performance of the PEG con-
struction was enhanced for irregular codes using the ap-
proximate cycle extrinsic message degree (ACE) metric [7].
In [8], PEG construction and generalized ACE constrained
design of [9] were combined for even superior error floor
performance. In [11], Zheng et al. devised a modified
PEG algorithm, called PEG Approximate-minimum-Cycle-
Set-Extrinsic-message-degree (PEG-ACSE), to design short
irregular LDPC codes. To lower the error floor of PEG
construction, all the existing literature [8], [10], [11], use an
indirect measure of error floor performance. This measure is
ACE in [8], [10], and ACSE in [11]. In addition, both [10],
[11] are limited to the construction of codes with irregular
variable node degree distributions.
In this work, unlike the existing PEG-based constructions,
we use a direct measure of error oor performance, i.e., the
spectrum of elementary trapping sets (ETS’s). For a trapping
Manuscript received April 17, 2012. The associate editor coordinating the
review of this letter and approving it for publication was M. Flanagan.
S. Khazraie is with the Department of Electrical Engineering, Sharif
University of Technology, Tehran, Iran (e-mail: khazraie@alum.sharif.edu).
R. Asvadi is with the Department of Electrical and Computer Engi-
neering, K. N. Toosi University of Technology, Tehran, Iran (e-mail: as-
vadi@ee.kntu.ac.ir).
A. H. Banihashemi is with the Broadband Communications and Wire-
less Systems (BCWS) Center, Department of Systems and Computer En-
gineering, Carleton University, Ottawa, ON K1S 5B6, Canada (e-mail:
ahashemi@sce.carleton.ca).
Digital Object Identifier 10.1109/LCOMM.2012.060112.120844
set S,weusetheterm“(a, b)trapping set”, if Shas size a
and if the induced subgraph G(S)of Sin the code’s Tanner
graph Gcontains bunsatisfied check nodes. An (a, b)trapping
set is called elementary [6] if every check node in G(S)
has either degree 1 or degree 2. Following the general belief
and supported by much experimental evidence, we assume
that the most harmful trapping sets are elementary and that
among ETS’s those with smaller values of aand bare more
harmful (see, e.g., [6], [11]). These ETS’s are categorically
called dominant.Wedenethedepth-dETS spectrum of a
Tanner graph Gas the d-tuple (ξ1,...,ξ
d),whereξa,for
1ad, is the minimum value of bfor all (a, b)ETS’s
in G. To improve the error floor, the goal is thus to achieve
ETS spectrums with components as large as possible. This is
particulary important for the components with smaller indices
(corresponding to smaller ETS’s).
To avoid the creation of dominant ETS’s, we use the original
PEG algorithm of [2] in conjunction with an efficient recursive
search algorithm that can find the dominant ETS’s of the
under-construction Tanner graph at each step of the PEG
algorithm. Among the candidates available for the edges of
a given variable node, we then select those that prevent the
creation of dominant ETS’s (those that satisfy a target ETS
spectrum). Our search algorithm for finding dominant ETS’s
is a modification of the recursive algorithms presented in [3]
and [4], for regular and irregular LDPC codes, respectively.
The direct application of the algorithms of [3], [4] to our
search problem appears to be too complex to implement.
The modifications are made to simplify the original search
algorithms, without sacrificing the accuracy, by tailoring them
to the problem of finding those dominant ETS’s that contain
a specific variable node of the graph (not all the dominant
ETS’s in the graph). In the context of this work, this variable
node is the one that is being added to the Tanner graph at
each step of the PEG algorithm.
The proposed PEG algorithm, referred to as ETS-
constrained PEG, is applicable to codes with both regular and
irregular variable node degree distributions. In Section III, we
demonstrate that the proposed construction provides signifi-
cant improvement over the existing PEG-based constructions
in terms of both the ETS spectrum and the error floor
performance. One should also note that instead of ETS’s,
the proposed algorithm can target other graphical objects of
interest such as absorbing sets [1]. This is due to the fact that
the search algorithms of [3] and [4] can be easily tailored to
find graphical objects other than ETS’s.
II. PROPOSED PEG ALGORITHM
We use the notation vi,1in, to denote the variable
node that is being added to the under-construction Tanner
1089-7798/12$31.00 c
2012 IEEE
KHAZRAIE et al.: A PEG CONSTRUCTION OF FINITE-LENGTH LDPC CODES WITH LOW ERROR FLOOR 1289
graph at the current step of the PEG algorithm, where nis the
block length of the code. Corresponding to vi,wedenethe
graph Giand the integer gias the constructed Tanner graph
at step iof the PEG algorithm (the subgraph of Ginduced
by {v1,...,v
i}) and the size of the shortest cycle(s) in Gi
containing vi, respectively. Similar to [11], we consider ETS’s
Swhose induced subgraphs G(S)are connected, and each of
whose variable nodes is connected to at least two satisfied
check nodes in G(S). Such ETS’s are denoted by Tand are
the only ETS’s that are checked for satisfying the target ETS
spectrum. As the size of the ETS’s in Tis at least g,where
gis the girth of the Tanner graph, we are only interested in
the components of ETS spectra with indices at least equal to
g/2. In the rest of this paper, we thus consider ETS spectra
of the general form ξ=(ξg/2,...,ξ
d).
Starting from a target ETS spectrum ξ,1the general frame-
work of the proposed construction is as follows:
1) Apply the PEG construction of [2] to establish the edges
of the Tanner graph one variable node at a time (select
all the edges connected to the variable node viunder
consideration based on the original PEG algorithm).
2) Using Algorithm A, find the set Siof dominant ETS’s
of Giin Tthat contain vi, and check to see if all the
elements of Sisatisfy the target ETS spectrum, i.e., if
every (a, b)ETS in Siwith gi/2adsatisfies
bξa. If they do, then accept the addition of the edges
to the Tanner graph and move to the next variable node
vi+1. If they do not, then select a new set of edges for vi
by randomly choosing another set within the framework
of the PEG algorithm. In this case, continue the process
of selecting new set of edges for viuntil the target ETS
spectrum is satisfied or a maximum number of trials is
reached. In the latter case, declare a construction failure.
3) Continue the construction until all the edges of the
Tanner graph are established or a construction failure
is declared.
Algorithm A, used in Step 2 of the proposed construction,
is responsible for finding those dominant ETS’s of Giof size
up to dthat contain vi. This algorithm is described below.
Algorithm A: Finding the dominant (a, b)ETS’s of Giin T
with adthat contain vi.
1: if the variable node degree distribution is regular, then
2: Inputs: vi,Gi,gi,lmax,β
3: Recursively apply Algorithm 1 of [3] by initializing G
with Gi,kwith d,andthesetLin with all the cycles
of length gi,...,g
i+(2lmax 2) in Githat contain vi.
At each recursion, for each value of a, only the (a,b
)
ETS’s with the βsmallest values of bare considered,
and further expanded.
4: else
5: Inputs: vi,Gi,gi,lmax,TAC E and β
6: Recursively apply Algorithm 3 of [4] (except for the
1To achieve a desirable ETS spectrum in our simulations, we aim at
maximizing the components of the target ETS spectrum in a greedy fashion
starting from components with smaller indices.
command on Line 4) by initializing Gwith Gi,k
with d,andthesetLin with all the cycles of length
gi,...,g
i+(2lmax 2) in Githat contain viplus all
the cycles of larger size up to size 2dcontaining viwith
ACE value up to TACE . At each recursion, for each
value of a, only the (a,b
)ETS’s with the βsmallest
values of bare considered, and further expanded.
7: if at any stage of running Algorithm 1 of [3] (within
the recursions of Algorithm 3 of [4]), an input ETS
contains a 2-chain, then
8: step 8 of Algorithm 1 is only executed for the check
node cthat is connected to a degree-2 variable node
at the tail of the ETS.
9: end if
10: end if
The main idea behind the Algorithms of [3], [4] is to
start from an initial set of ETS’s and then expand them
recursively to larger ETS’s. The initial set for regular codes
contains short cycles of the Tanner graph up to a certain
length, and for irregular codes, in addition to short cycles,
it contains larger cycles with small ACE values and low-
degree variable nodes.2In the proposed PEG construction,
Algorithm A is executed numerous times. It is thus important
to reduce the complexity of the search algorithms of [3], [4].
To achieve this in Algorithm A, we have made the following
two modifications: (i)Instead of initiating the search with all
the short cycles of up to a certain length, we only use the short
cycles that contain vi. This makes the results less accurate if
the maximum cycle length in the initial set is not changed. To
ensure high accuracy, we include longer cycles by choosing a
large enough value for lmax;(ii)Step 4 of Algorithm 3 (the
addition of low-degree variable nodes as part of the initial
ETS’s) is removed. Instead, and to maintain the accuracy of
the algorithm, Steps 7 and 8 are added to Algorithm A. Our
experiments show that in all cases considered in this paper
and a few others, the ETS’s obtained by Algorithm A are
identical to those obtained by the Algorithms of [3], [4]. In
such experiments, the algorithms of [3], [4] are applied to Gi,
and then among all the obtained ETS’s, those that contain vi
are compared to the ones obtained by Algorithm A.
Increasing the values of lmax,βand TAC E, in general,
increases the accuracy of Algorithm A, but at the cost of
higher complexity. In Section III, proper values for these
parameters that strike the right balance between the accuracy
and complexity are given.
III. SIMULATION RESULTS AND DISCUSSIONS
In this section, we report a number of code construction
examples using the proposed algorithm, for both irregular and
regular variable node degree distributions. All the simulation
results presented in this section are for BPSK modulation over
the AWGN channel. The iterative decoding algorithm is belief
propagation in log-likelihood ratio domain with maximum
2Under certain conditions [5], algorithms of [3] and [4] are guaranteed to
find all the dominant ETS’s (up to a certain size and with a certain number
of unsatisfied check nodes). Extensive simulation results are also provided
in [5] to demonstrate the effectiveness of the algorithms.
1290 IEEE COMMUNICATIONS LETTERS, VOL. 16, NO. 8, AUGUST 2012
number of iterations equal to 50. To obtain each point on the
error rate curves, simulations are run until 100 block (frame)
errors occur.
Example 1: For this example, we design a rate-1/2
(1008,504) code with the variable node degree distribution
λ1(x)=0.25105x+0.30938x2+0.00104x3+0.43853x9.
This distribution is optimized by density evolution and has
also been used in Example C of [11].
We use the proposed PEG algorithm with parameters
lmax =4,β=4,TAC E =4,andd=14to construct a code
with variable node degree distribution λ1(x). The constructed
code has the following ETS spectrum for 6a14:
ξa=3if 6a10
2if 11 a14
For comparison, we also construct two codes with the same
rate, block length and variable node degree distribution using
the original PEG algorithm of [2] and the generalized-ACE-
constrained PEG algorithm of [8].
Although all the three constructed codes have the same girth
6, they differ greatly in their ETS distribution. The distribution
of (a, b)ETS’s for 6a14 and b2, are reported in
Table I for the three codes. (For 3a5, none of the codes
has any (a, b)ETS with b2.) These results are obtained by
Algorithm 3 of [4]. A careful inspection of the table shows that
although the generalized-ACE-constrained PEG construction
eliminates some of the smaller ETS’s with small values of
bthat exist in the original PEG construction, it still has a
great number of dominant (a, b)ETS’s which are absent in
the ETS-constrained PEG construction proposed in this work.
Monte Carlo simulation results of the three codes are
presented in Fig. 1. This figure demonstrates that the ETS-
constrained PEG code outperforms the other PEG codes,
particularly in the error floor region. This is consistent with
the superior ETS distribution of the former in comparison
with the latter. The ETS-constrained code also outperforms the
similar PEG-ACSE code constructed in Example C of [11].
For example, the code of [11] achieves bit error rate (BER)
values of 1.19 ×107and 8.79 ×108,atEb/N0values
2.8dB and 3dB, respectively [11], where Ebis the energy
per information bit and N0is the one-sided power spectral
density of the AWGN. The corresponding values for the ETS-
constrained code are 4.76×108and 1.30×108, respectively.
Example 2: In this example, we design a rate-1/2
(504,252) code with variable node degree 3. With design
parameters lmax =4,β=2,andd= 13, we obtain a code
with the following ETS spectrum for 4a13:
ξa=
5if a=5,7,9
4if a=4,6,8,10,12
3if a= 11,13
Similar codes are also constructed using the PEG algorithms
of [2] and [8]. The ETS distributions and the error rate
curves for all three codes are given in Table II and Fig.2,
respectively. The results in Table II are obtained by using
Algorithm 1 of [3]. (For a=4, none of the codes has
any (a, b)ETS with b3.) Note that although all three
codes have the same girth of 8, the ETS-constrained code
has a significantly superior ETS distribution compared to both
1.6 1.8 2 2.2 2.4 2.6 2.8 3
10−8
10−7
10−6
10−5
10−4
10−3
10−2
10−1
Eb/N0 (dB)
FER/BER
FER: Solid lines, BER: Dashed lines
Original PEG [2]
Generalized−ACE−Constrained PEG [8]
ETS−Constrained PEG
Fig. 1. Bit error rate (BER) and frame error rate (FER) performance of the
LDPC codes designed in Example 1.
2.2 2.4 2.6 2.8 3 3.2 3.4 3.6 3.8 4 4.2
10−9
10−8
10−7
10−6
10−5
10−4
10−3
10−2
10−1
Eb/N0 (dB)
FER/BER
FER: Solid lines, BER: Dashed lines
Original PEG [2]
Generalized−ACE−Constrained PEG [8]
ETS−Constrained PEG
Fig. 2. BER/FER performance of the LDPC codes designed in Example 2.
the original PEG and the generalized-ACE-constrained PEG
codes. Correspondingly, the former code outperforms the latter
in the error floor region.
Example 3: In this example, we construct two rate-1/2
irregular codes with lengths n= 1008 and 2016, both with a
density evolution optimized variable node degree distribution
given by: λ2(x)=0.23802x+0.20997x2+0.03492x3+
0.12015x4+0.01587x6+0.00480x13 +0.37627x14 .This
degree distribution has also been used to design codes of the
same block lengths in Examples A and B of [11], respectively.
For both block lengths, we use the parameters lmax =3,
β=4,TACE =4and d=16in the construction. The
ETS distribution of the ETS-constrained code, in both cases,
is superior to those of the PEG constructions of [2] and [8].
For example, for the (1008,504) code, the ETS spectra of the
ETS-constrained code and the generalized-ACE-constrained
code for 6a16 are respectively (for a5, none of
KHAZRAIE et al.: A PEG CONSTRUCTION OF FINITE-LENGTH LDPC CODES WITH LOW ERROR FLOOR 1291
TAB L E I
DOMINANT ETS DISTRIBUTIONS OF THE (1008,504) CODES CONS TRUCTED BY THE PROPOSED ETS-CONSTRAINED PEG ALGORITHM,THE
ORIGINAL PEG ALGORITHM OF [2] AND THE GENERALIZED-ACE-CONSTRAINED PEG ALGORITHM OF [8]. THE THREE NUMBERS OF EAC H
ELEMENT OF THE TABLE FROM LEFT TO RIGHT ARE THE MULTIPLICITY OF (a, b)ETS’SWITHb=0,1,AND 2,RESPECTIVELY (EXAMPLE 1).
ETS size aOriginal PEG [2] Generalized-ACE-Constrained PEG [8] ETS-Constrained PEG
(6,b< 3) 0; 0; 27 0; 0; 0 0; 0; 0
(7,b< 3) 0; 1; 49 0; 0; 43 0; 0; 0
(8,b< 3) 0; 1; 60 0; 2; 64 0; 0; 0
(9,b< 3) 0; 0; 74 0; 1; 59 0; 0; 0
(10,b<3) 0; 8; 130 0; 0; 90 0; 0; 0
(11,b<3) 0; 13; 254 0; 19; 163 0; 0; 133
(12,b<3) 0; 18; 431 0; 10; 346 0; 0; 411
(13,b<3) 1; 31; 666 1; 23; 597 0; 0; 582
(14,b<3) 1; 49; 1012 0; 35; 887 0; 0; 711
TAB L E I I
DOMINANT ETS DISTRIBUTIONS OF THE (504,252) CODES CONSTRUCTED BY THE PROPOSED ETS-CONSTRAINED PEG ALGORITHM,THE ORIGINAL
PEG ALGORITHM OF [2] AND THE GENERALIZED-ACE-CONSTRAINED PEG ALGORITHM OF [8]. THE FOUR NUMBERS OF EAC H ELEMENT OF THE
TABLE FROM LEFT TO RIGHT ARE THE MULTIPLICITY OF (a, b)ETS’SWITHb=0,1,2AND 3,RESPECTIVELY (EXAMPLE 2).
ETS size aOriginal PEG [2] Generalized-ACE-Constrained PEG [8] ETS-Constrained PEG
(5,b< 4) 0; 0; 0; 14 0; 0; 0; 1 0; 0; 0; 0
(6,b< 4) 0; 0; 0; 0 0; 0; 0; 0 0; 0; 0; 0
(7,b< 4) 0; 0; 0; 57 0; 0; 0; 18 0; 0; 0; 0
(8,b< 4) 0; 0; 5; 0 0; 0; 1; 0 0; 0; 0; 0
(9,b< 4) 0; 1; 0; 156 0; 0; 0; 71 0; 0; 0; 0
(10,b<4) 0; 0; 6; 0 0; 0; 3; 0 0; 0; 0; 0
(11,b<4) 0; 0; 0; 605 0; 0; 0; 366 0; 0; 0; 155
(12,b<4) 0; 0; 25; 0 0; 0; 17; 0 0; 0; 0; 0
(13,b<4) 0; 1; 0; 2824 0; 1; 0; 1523 0; 0; 0; 941
the two codes has any (a, b)ETS with b3):
ξa=3if 6a11
2if 12 a16
ξPEGAC E
a=
3if a=6
2if a=7
1if a=8,9,10,11,13,14
0if a= 12,15,16
As it can be seen, the latter spectrum is much inferior to the
former one. Correspondingly, the error floor performance of
the ETS-constrained code is superior to those of the other
two PEG constructions. Moreover, the ETS-constrained codes
outperform the similar codes constructed in Examples A and
B of [11], in the error floor region, respectively. For example,
for n= 2016 and Eb/N0=2.4dB, the BER of the two codes
are about 6×109and 1.46 ×108, respectively.
REFERENCES
[1] L. Dolecek, P. Lee, Z. Zhang, V. Anantharam, B. Nikolic, and M.
Wainwright, “Predicting error floors of LDPC codes: deterministic
bounds and estimates,” IEEE J. Sel. Areas Commun., vol. 27, no. 6,
pp. 908–917, Aug. 2009.
[2] Y. Hu, E. Eleftheriou, and D. M. Arnold, “Regular and irregular
progressive edge growth Tanner graphs, IEEE Trans. Inf. Theory,vol.
51, no. 1, pp. 386–398, Jan. 2005.
[3] M. Karimi Dehkordi and A. H. Banihashemi, “An efficient algorithm
for finding dominant trapping sets of LDPC codes,” in Proc. 2010 Int.
Symp. on Turbo Codes and Iterative Inform. Proc.
[4] M. Karimi and A. H. Banihashemi, “An efficient algorithm for finding
dominant trapping sets of irregular LDPC codes,” Proc. 2011 IEEE ISIT.
[5] M. Karimi and A. H. Banihashemi, “An efficient algorithm
for finding dominant trapping sets of LDPC codes, CoRR,
arxiv.org/pdf/1108.4478.pdf.
[6] O. Milenkovic, E. Soljanin, and P. Whiting, “Asymptotic spectra of
trapping sets in regular and irregular LDPC code ensembles, IEEE
Trans. Inf. Theory, vol. 53, no. 1, pp. 39–55, Jan. 2007.
[7] T. Tian, C. Jones, J. D. Villasenor, and R. D. Wesel, “Selective avoidance
of cycles in irregular LDPC code construction,” IEEE Trans. Commun.,
vol. 52, no. 8, pp. 1242–1248, Aug. 2004.
[8] D. Vukobratovi´
candV.˘
Senk, “Generalized ACE constrained progres-
sive edge-growth LDPC code design, IEEE Commun. Lett., vol. 12, no.
1, pp. 32–34, Jan. 2008.
[9] D. Vukobratovi´
candV.˘
Senk, “Evaluation and design of irregular LDPC
codes using ACE spectrum,” IEEE Trans. Commun.,vol.57,no.8,pp.
2272–2278, Aug. 2009.
[10] H. Xiao and A. H. Banihashemi, Improved progressive-edge-growth
(PEG) construction of irregular LDPC codes, IEEE Commun. Lett.,
vol. 8, no. 12, pp. 715–717, Dec. 2004.
[11] X. Zheng, F. C. M. Lau, and C. K. Tse, “Constructing short-length
irregular LDPC codes with low error floor,” IEEE Trans. Commun.,vol.
58, no. 10, pp. 2823–2834, Oct. 2010.
... Different schedules can then be represented with different permutations of numbers from 1 to 10. For example, permutation (1,2,3,4,5,6,7,8,9,10) refers to the updating schedule of column layers from left to right (in the same order as they appear in Fig. 4a). ...
... We then apply our estimation technique based on accurate DE to the chosen schedules to find the one that has the lowest error floor. As a result, we find the schedule corresponding to the permutation (2,9,7,8,5,3,6,1,10,4), shown in Fig. 5 with a full square. For comparison, we have also selected one of the schedules with the worst error floor, (6,5,2,7,8,4,3,10,1,9), as well as the original one, (1,2,3,4,5,6,7,8,9,10). ...
... As a result, we find the schedule corresponding to the permutation (2,9,7,8,5,3,6,1,10,4), shown in Fig. 5 with a full square. For comparison, we have also selected one of the schedules with the worst error floor, (6,5,2,7,8,4,3,10,1,9), as well as the original one, (1,2,3,4,5,6,7,8,9,10). These schedules are specified in Fig. 5 The results show that, unlike the row layered schedules where there is a substantial difference between the error floor of the best and the worst schedules, the difference in the error floor of the best and the worst column layered schedules is rather small (less than an order of magnitude). ...
Preprint
In this paper, we analyze the error floor of column layered decoders, also known as shuffled decoders, for low-density parity-check (LDPC) codes under saturating sum-product algorithm (SPA). To estimate the error floor, we evaluate the failure rate of different trapping sets (TSs) that contribute to the frame error rate in the error floor region. For each such TS, we model the dynamics of SPA in the vicinity of the TS by a linear state-space model that incorporates the information of the layered message-passing schedule. Consequently, the model parameters and the failure rate of the TS change as a result of the change in the order by which the messages of different layers are updated. This, in turn, causes the error floor of the code to change as a function of scheduling. Based on the proposed analysis, we then devise an efficient search algorithm to find a schedule that minimizes the error floor. Simulation results are presented to verify the accuracy of the proposed error floor estimation technique.
... Example 3. For the same LETS structure discussed in Example 2, the model matrices corre- 19 sponding to the second layer of row layered schedule are the followings: ...
Preprint
In this paper, we analyze the error floor of quasi-cyclic (QC) low-density parity-check (LDPC) codes decoded by the sum-product algorithm (SPA) with row layered message-passing scheduling. For this, we develop a linear state-space model of trapping sets (TSs) which incorporates the layered nature of scheduling. We demonstrate that the contribution of each TS to the error floor is not only a function of the topology of the TS, but also depends on the row layers in which different check nodes of the TS are located. This information, referred to as TS layer profile (TSLP), plays an important role in the harmfulness of a TS. As a result, the harmfulness of a TS in particular, and the error floor of the code in general, can significantly change by changing the order in which the information of different layers, corresponding to different row blocks of the parity-check matrix, is updated. We also study the problem of finding a layer ordering that minimizes the error floor, and obtain row layered decoders with error floor significantly lower than that of their flooding counterparts. As part of our analysis, we make connections between the parameters of the state-space model for a row layered schedule and those of the flooding schedule. Simulation results are presented to show the accuracy of analytical error floor estimates.
... The PEG algorithm is suited to construct the unstructured finite length LDPC code with large girth. (Khazraie et al. 2012). ...
Article
Full-text available
Outstanding bit error rate LDPC design in waterfall region and error floor region is one of the challenging tasks for the past decade. This chapter, focuses on the design of LDPC encoder with the low error floor and waterfall region of BER with minimum trapping set. Scheduled Progressive Edge-Growth (SPEG) LDPC encoder is used, and the simulation result of density evolution and exit chart are giving the better convergence of LDPC encoder. BER performance in error floor can controlled by minimum trapping set and waterfall region controlled by scheduled PEG LDPC encoder (1000, 500) with code length (n) is less than 600. The girth of the SPEG encoder is 8. SPEG with minimum trapping set will perform well for short length code also and it converges faster than the other PEG encoder.
Article
In this paper, we propose a novel state-space model to represent the behavior of sum-product algorithm (SPA) in the vicinity of a trapping set (TS) of a low-density parity-check (LDPC) code over the additive white Gaussian noise (AWGN) channel in the error floor region. The proposed model takes into account the non-linear behavior of SPA in the initial iterations using a quadratic approximation, and dynamically adjusts the operating point of the model in accordance to the statistical properties of TS messages. This is in contrast to the existing linear state-space models which linearly approximate the non-linear behavior of SPA at around the operating point of zero in all iterations. Simulation results are provided to demonstrate the higher accuracy of the proposed model in estimating the error floor of LDPC codes compared to the linear state-space model. We also make connections to the semi-analytical code-dependent technique proposed in [1] for the error floor estimation of LDPC codes, and demonstrate that the proposed state-space model not only is a fully-analytical code-independent counterpart to that method, but also has less complexity and, in some cases, more accuracy.
Article
Quasi-cyclic low-density parity-check (QC-LDPC) codes have efficient hardware implementation and excellent correcting performance. However, the existence of trapping sets can affect the decoding performance. In this letter, a novel class of QC-LDPC codes based on integer sequence with column weight 3 and girth at least 8 is proposed. If the numbers in the sequence are different, the QC-LDPC codes free of elementary trapping sets ( ${a}$ , ${b}$ ) with ${a} \leq10$ and ${b} \leq $ 3 can be constructed. The row weight of the parity check matrix can be arbitrary and we give a lower bound of the circulant permutation matrix (CPM) size. Simulation results show that the generated codes have good performance with low error floor over AWGN channels.
Article
Full-text available
In long haul optical fiber communication networks, whichcan span thousands of kilometers, bandwidth is at a premium due to the relatively low availability of optical fibers when compared with network traffic demands. Therefore, these networks require the highest performance in the physical layer, with transceivers that are capable of extracting all the available capacity from each optical fiber. Digital coherent transmitters and receivers, which enhance optical transmission systems by using digital signal processing, are essential for achieving this goal. This tutorial discusses the digital signal processing techniques that are used in the design of high performance coherent modems to compensate for adverse channel effects such as fiber impairments and optoelectronic device non-idealities.
Article
In this paper, we analyze the error floor of quasi-cyclic (QC) low-density parity-check (LDPC) codes decoded by the sum-product algorithm (SPA) with row layered message-passing scheduling. For this, we develop a linear state-space model of trapping sets (TSs) which incorporates the layered nature of scheduling. We demonstrate that the contribution of each TS to the error floor is not only a function of the topology of the TS, but also depends on the row layers in which different check nodes of the TS are located. This information, referred to as TS layer profile (TSLP), plays an important role in the harmfulness of a TS. As a result, the harmfulness of a TS in particular, and the error floor of the code in general, can significantly change by changing the order in which the information of different layers, corresponding to different row blocks of the parity-check matrix, is updated. We also study the problem of finding a layer ordering that minimizes the error floor, and obtain row layered decoders with error floor significantly lower than that of their flooding counterparts. As part of our analysis, we make connections between the parameters of the state-space model for a row layered schedule and those of the flooding schedule. Simulation results are presented to show the accuracy of analytical error floor estimates.
Article
In this paper, we propose a design technique for the construction of variable-regular time-invariant spatially-coupled low-density parity-check (SC-LDPC) codes with small constraint length and low error floor. The proposed technique reduces the error floor by imposing simple constraints on the short cycles in the code’s Tanner graph, which in turn, result in the elimination of the most dominant trapping sets of the code. In some cases, we also derive lower bounds on the syndrome former memory for satisfying such constraints. The designed codes are superior to the state-of-the-art in terms of error floor performance and/or decoding complexity and latency.
Article
Full-text available
A random marker code is inserted into the information sequences periodically, and a novel symbol-level decoding algorithm considering the weighted Levenshtein distance (WLD) is designed for correcting insertions, deletions, as well as substitutions in the received sequences. In this method, branch quantities in the decoding trellis are calculated by measuring the WLD, which is done using the dynamic programming. A simulation study is performed to demonstrate the effectiveness of the presented scheme in the practical system, especially for channels with weak synchronization problems.
Article
In this paper, we design finite-length irregular protograph-based quasi-cyclic (QC) low-density parity-check (LDPC) codes with good waterfall performance and low error floor. To achieve a low error floor, we eliminate a targeted set of dominant elementary trapping sets (ETS) L in the Tanner graph of the code. For a given rate and girth, the codes are designed to be free of the largest set of problematic ETSs for a given block length, or to have the shortest block length while a given set of ETSs is avoided. The design is based on a search algorithm that identifies whether any instance of any structure within L exists in the Tanner graph of the constructed code or not. The search algorithm performs this task with minimal complexity, making it feasible to construct practical codes by running the search algorithm a large number of times. Simulation results are provided to demonstrate the superior performance of designed codes compared to similar state-of-the-art irregular QC-LDPC codes.
Article
Full-text available
This paper presents an efficient algorithm for finding the dominant trapping sets of a low-density parity-check (LDPC) code. The algorithm can be used to estimate the error floor of LDPC codes or to be part of the apparatus to design LDPC codes with low error floors. For regular codes, the algorithm is initiated with a set of short cycles as the input. For irregular codes, in addition to short cycles, variable nodes with low degree and cycles with low approximate cycle extrinsic message degree (ACE) are also used as the initial inputs. The initial inputs are then expanded recursively to dominant trapping sets of increasing size. At the core of the algorithm lies the analysis of the graphical structure of dominant trapping sets and the relationship of such structures to short cycles, low-degree variable nodes and cycles with low ACE. The algorithm is universal in the sense that it can be used for an arbitrary graph and that it can be tailored to find other graphical objects, such as absorbing sets and Zyablov-Pinsker (ZP) trapping sets, known to dominate the performance of LDPC codes in the error floor region over different channels and for different iterative decoding algorithms. Simulation results on several LDPC codes demonstrate the accuracy and efficiency of the proposed algorithm. In particular, the algorithm is significantly faster than the existing search algorithms for dominant trapping sets.
Conference Paper
Full-text available
The progressive-edge-growth (PEG) algorithm (X.-Y. Hu et al., 2001; 2002) is known to construct low-density parity-check codes at finite block lengths with very good performance. We propose a very simple modification to the PEG construction for irregular codes, which considerably improves the performance at high signal-to-noise ratios (SNR) with no sacrifice in low-SNR performance.
Article
Full-text available
We evaluate the asymptotic normalized average distributions of a class of combinatorial configurations in random, regular and irregular, binary low-density parity-check (LDPC) code ensembles. Among the configurations considered are trapping and stopping sets. These sets represent subsets of variable nodes in the Tanner graph of a code that play an important role in determining the height and point of onset of the error-floor in its performance curve. The techniques used for deriving the spectra include large deviations theory and statistical methods for enumerating binary matrices with prescribed row and column sums. These techniques can also be applied in a setting that involves more general structural entities such as subcodes and/or minimal codewords, that are known to characterize other important properties of soft-decision decoders of linear block codes
Article
This paper presents an efficient algorithm for finding the dominant trapping sets of a low-density parity-check (LDPC) code. The algorithm can be used to estimate the error floor of LDPC codes or as a tool to design LDPC codes with low error floors. For regular codes, the algorithm is initiated with a set of short cycles as the input. For irregular codes, in addition to short cycles, variable nodes with low degree and cycles with low approximate cycle extrinsic message degree (ACE) are also used as the initial inputs. The initial inputs are then expanded recursively to dominant trapping sets of increasing size. At the core of the algorithm lies the analysis of the graphical structure of dominant trapping sets and the relationship of such structures to short cycles, low-degree variable nodes, and cycles with low ACE. The algorithm is universal in the sense that it can be used for an arbitrary graph and that it can be tailored to find a variety of graphical objects, such as absorbing sets and Zyablov-Pinsker trapping sets, known to dominate the performance of LDPC codes in the error floor region over different channels and for different iterative decoding algorithms. Simulation results on several LDPC codes demonstrate the accuracy and efficiency of the proposed algorithm. In particular, the algorithm is significantly faster than the existing search algorithms for dominant trapping sets.
Article
The construction of finite-length irregular LDPC codes with low error floors is currently an attractive research problem. In particular, for the binary erasure channel (BEC), the problem is to find the elements of selected irregular LDPC code ensembles with the size of their minimum stopping set being maximized. Due to the lack of analytical solutions to this problem, a simple but powerful heuristic design algorithm, the approximate cycle extrinsic message degree (ACE) constrained design algorithm, has recently been proposed. Building upon the ACE metric associated with a cycle in a code graph, we introduce the ACE spectrum of LDPC codes as a useful tool for evaluation of codes from selected irregular LDPC code ensembles. Using the ACE spectrum, we generalize the ACE constrained design algorithm, making it more flexible and efficient. We justify the ACE spectrum approach through examples and simulation results.
Article
The error-correcting performance of low-density parity check (LDPC) codes, when decoded using practical iterative decoding algorithms, is known to be close to Shannon limits for codes with suitably large blocklengths. A substantial limitation to the use of finite-length LDPC codes is the presence of an error floor in the low frame error rate (FER) region. This paper develops a deterministic method of predicting error floors, based on high signal-to-noise ratio (SNR) asymptotics, applied to absorbing sets within structured LDPC codes. The approach is illustrated using a class of array-based LDPC codes, taken as exemplars of high-performance structured LDPC codes. The results are in very good agreement with a stochastic method based on importance sampling which, in turn, matches the hardware-based experimental results. The importance sampling scheme uses a mean-shifted version of the original Gaussian density, appropriately centered between a codeword and a dominant absorbing set, to produce an unbiased estimator of the FER with substantial computational savings over a standard Monte Carlo estimator. Our deterministic estimates are guaranteed to be a lower bound to the error probability in the high SNR regime, and extend the prediction of the error probability to as low as 10<sup>-30</sup>. By adopting a channel-independent viewpoint, the usefulness of these results is demonstrated for both the standard Gaussian channel and a channel with mixture noise.
Article
Trapping sets (TSs) are known to cause error floors in regular and irregular low-density parity-check (LDPC) codes. By avoiding major error-contributing TSs during the code construction process, codes with low error floors can effectively be built. In it has been shown that TSs labeled as [w;u] are considered as being equivalent under the automorphism of the graph and are therefore contributing equally to the error floor. However, TSs with the same label [w;u] are not identical in general, particularly for the case of irregular LDPC codes. In this paper, we introduce a parameter e that can identify the number of "distinguishable" cycles in the connected subgraph induced by an elementary trapping set. Further, we propose a code construction algorithm, namely the Progressive-Edge-Growth Approximate-minimum-Cycle-Set-Extrinsic-message-degree (PEG-ACSE) method, that aims to avoid small elementary trapping sets (ETSs), particularly detrimental ETSs. We also develop theorems evaluating the minimum possible ETSs formed by PEG construction algorithms in general. We compare the characteristics of the codes built using the proposed method and those built using PEG-only or PEG-Approximate-minimum-Cycle-Extrinsic-message-degree (PEG-ACE) methods. Results from simulations show that the codes constructed using the proposed PEG-ACSE method produce lower error rates, particularly at the high signal-to-noise (SNR) region, compared with codes constructed using other PEG-based algorithms.
Article
In this letter, we propose a generalization of the progressive edge-growth (PEG) algorithm with the aim of designing LDPC code graphs with substantially improved approximated cycle extrinsic message degree (ACE) properties. The proposed realization of generalized PEG algorithm outperforms original PEG algorithm and its subsequent modification proposed by Xiao and Banihashemi.
Article
This letter explains the effect of graph connectivity on error-floor performance of low-density parity-check (LDPC) codes under message-passing decoding. A new metric, called extrinsic message degree (EMD), measures cycle connectivity in bipartite graphs of LDPC codes. Using an easily computed estimate of EMD, we propose a Viterbi-like algorithm that selectively avoids small cycle clusters that are isolated from the rest of the graph. This algorithm is different from conventional girth conditioning by emphasizing the connectivity as well as the length of cycles. The algorithm yields codes with error floors that are orders of magnitude below those of random codes with very small degradation in capacity-approaching capability.
Article
We propose a general method for constructing Tanner graphs having a large girth by establishing edges or connections between symbol and check nodes in an edge-by-edge manner, called progressive edge-growth (PEG) algorithm. Lower bounds on the girth of PEG Tanner graphs and on the minimum distance of the resulting low-density parity-check (LDPC) codes are derived in terms of parameters of the graphs. Simple variations of the PEG algorithm can also be applied to generate linear-time encodeable LDPC codes. Regular and irregular LDPC codes using PEG Tanner graphs and allowing symbol nodes to take values over GF(q) (q>2) are investigated. Simulation results show that the PEG algorithm is a powerful algorithm to generate good short-block-length LDPC codes.