Mapper & De-Mapper System Document

Similar documents
Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10

Chapter 7: Channel coding:convolutional codes

Error Correction and Trellis Coding

Coding theory: Applications

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Message-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras

Lecture 12. Block Diagram

The E8 Lattice and Error Correction in Multi-Level Flash Memory

Revision of Lecture 4

Consider a 2-D constellation, suppose that basis signals =cosine and sine. Each constellation symbol corresponds to a vector with two real components

Rapport technique #INRS-EMT Exact Expression for the BER of Rectangular QAM with Arbitrary Constellation Mapping

Turbo Codes for xdsl modems

a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics.

New EPoC Burst Markers with Data Field

EE6604 Personal & Mobile Communications. Week 15. OFDM on AWGN and ISI Channels

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

PUNCTURED 8-PSK TURBO-TCM TRANSMISSIONS USING RECURSIVE SYSTEMATIC CONVOLUTIONAL GF ( 2 N ) ENCODERS

2013/Fall-Winter Term Monday 12:50 Room# or 5F Meeting Room Instructor: Fire Tom Wada, Professor

Maximum mutual information vector quantization of log-likelihood ratios for memory efficient HARQ implementations

Lecture 5b: Line Codes

The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals

Channel Coding and Interleaving

Bit-wise Decomposition of M-ary Symbol Metric

AALTO UNIVERSITY School of Electrical Engineering. Sergio Damian Lembo MODELING BLER PERFORMANCE OF PUNCTURED TURBO CODES

Chapter 7 Reed Solomon Codes and Binary Transmission

A Simple Example Binary Hypothesis Testing Optimal Receiver Frontend M-ary Signal Sets Message Sequences. possible signals has been transmitted.


Layered Orthogonal Lattice Detector for Two Transmit Antenna Communications

Notes on a posteriori probability (APP) metrics for LDPC

The E8 Lattice and Error Correction in Multi-Level Flash Memory

A First Course in Digital Communications

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise

The PPM Poisson Channel: Finite-Length Bounds and Code Design

Error Correction Code (1)

Analysis of Receiver Quantization in Wireless Communication Systems

COMMITTEE T1 TELECOMMUNICATIONS Working Group T1E1.4 (DSL Access) Lisle, IL, May 3, 2000

Logic. Combinational. inputs. outputs. the result. system can

IEEE C80216m-09/0079r1

Design of Multidimensional Mappings for Iterative MIMO Detection with Minimized Bit Error Floor

Design at the Register Transfer Level

Trellis-based Detection Techniques

The Turbo Principle in Wireless Communications

Introduction to Convolutional Codes, Part 1

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems

OFDM Modulation Recognition Using Convolutional Neural Networks

Turbo Codes. Manjunatha. P. Professor Dept. of ECE. June 29, J.N.N. College of Engineering, Shimoga.

channel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes.

A Hyper-Trellis based Turbo Decoder for Wyner-Ziv Video Coding

R. A. Carrasco and M. Johnston, Non-Binary Error Control Coding Cork 2009

Abstract. Heiko Frederik Bloch Quadrature Amplitude Modulation (QAM) in C++ November 21, / 35

National University of Singapore Department of Electrical & Computer Engineering. Examination for

EE4512 Analog and Digital Communications Chapter 4. Chapter 4 Receiver Design

Constellation Shaping for Communication Channels with Quantized Outputs

False Packet Acceptance for HDLC framing

ELECTRONICS & COMMUNICATIONS DIGITAL COMMUNICATIONS

Carrier Transmission. The transmitted signal is y(t) = k a kh(t kt ). What is the bandwidth? More generally, what is its Fourier transform?

JOINT ITERATIVE DETECTION AND DECODING IN THE PRESENCE OF PHASE NOISE AND FREQUENCY OFFSET

Es e j4φ +4N n. 16 KE s /N 0. σ 2ˆφ4 1 γ s. p(φ e )= exp 1 ( 2πσ φ b cos N 2 φ e 0

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems

A POLAR-BASED DEMAPPER OF 8PSK DEMODULATION FOR DVB-S2 SYSTEMS

APPLICATIONS. Quantum Communications

Optimum Soft Decision Decoding of Linear Block Codes

Ralf Koetter, Andrew C. Singer, and Michael Tüchler

Modulation & Coding for the Gaussian Channel

16.36 Communication Systems Engineering

Approximate BER for OFDM Systems Impaired by a Gain Mismatch of a TI-ADC Realization

Summary: SER formulation. Binary antipodal constellation. Generic binary constellation. Constellation gain. 2D constellations

UTA EE5362 PhD Diagnosis Exam (Spring 2011)

ELEC E7210: Communication Theory. Lecture 10: MIMO systems

On the Use of Division Algebras for Wireless Communication

Efficient LLR Calculation for Non-Binary Modulations over Fading Channels

A Thesis for the Degree of Master. An Improved LLR Computation Algorithm for QRM-MLD in Coded MIMO Systems

An Introduction to Low Density Parity Check (LDPC) Codes

PCM Reference Chapter 12.1, Communication Systems, Carlson. PCM.1

Compound Polar Codes

Summary II: Modulation and Demodulation

Analog Electronics 2 ICS905

BASICS OF DETECTION AND ESTIMATION THEORY

Orthogonal Frequency Division Multiplexing with Index Modulation

Carrier and Timing Synchronization in Digital Modems

Blind phase/frequency synchronization with low-precision ADC: a Bayesian approach

Constrained Detection for Multiple-Input Multiple-Output Channels

New Designs for Bit-Interleaved Coded Modulation with Hard-Decision Feedback Iterative Decoding

Digital Modulation 1

Decision-Point Signal to Noise Ratio (SNR)

Expected Error Based MMSE Detection Ordering for Iterative Detection-Decoding MIMO Systems

Square Root Raised Cosine Filter

An Analytical Packet Error Rate Prediction for Punctured Convolutional Codes and an Application to CRC Code Design

Graph-based codes for flash memory

Utilizing Correct Prior Probability Calculation to Improve Performance of Low-Density Parity- Check Codes in the Presence of Burst Noise

EFFICIENT DECODING ALGORITHMS FOR LOW DENSITY PARITY CHECK CODES

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Communication Theory II

This examination consists of 11 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS

Pipelined Viterbi Decoder Using FPGA

Error Correction Methods

Adaptive Space-Time Shift Keying Based Multiple-Input Multiple-Output Systems

Transcription:

Mapper & De-Mapper System Document

Mapper / De-Mapper Table of Contents. High Level System and Function Block. Mapper description 2. Demodulator Function block 2. Decoder block 2.. De-Mapper 2..2 Implementation of De-Mapper into Hardware

. High Level System and Function Block As seen in Figure, the high level modem system consists of a transmitter (Tx) and a receiver (Rx) section. The encoder and modulator in the transmitter receives data from the general purpose multiplexer (GPM) and creates the data frame for transmission through the DAC and analog radio frequency devices to the antenna. The encoder consists of two forward error correction codes: one is a Reed-Solomon (R-S) encoder and the other is a low density parity check (LDPC) encoder. GScom uses concatenated encoders of R-S and LDPC for high order modulation QAM signals and a single LDPC encoder for low order QAM signals. The encoder adds parity symbols and bits to inputted data symbols and bits, respectively, to make R-S encoded data and LDPC encoded data formats for forward error correction. The encoded data bits go to a Mapper to map those bits into symbols according to the selected modulation scheme. The symbols are then modulated into real signals (I) and imaginary signals (Q). The digital format of the airframe is converted to analog signals by a digital to analog converter (DAC) and is then sent for transmission. At the receiver, the analog to digital converter (ADC) receives the analog signal, converts the received analog signal to a digital signal and then sends it to the demodulator block. The digital signals are processed by the demodulator, sent to the De-mapper for converting the demodulated symbols to bits according to the selected modulation scheme, and then sent to the decoder for error correction and for decoding. The decoder consists of two forward error correction codes: one is a Reed-Solomon (R-S) decoder and the other is a low density parity check (LDPC) decoder. GScom uses concatenated decoders of R-S and LDPC for high order modulation QAM signals and a single LDPC decoder for low order QAM signals. Tx Encoder Modulator DAC Rx Decoder Demodulator ADC Figure, High level modem system 2

.. Mapper The Mapper module takes a stream of coded bits, divides them into groups of m bits, maps each group of m bits in one of M (=2 m ) signal constellations using Gray code mapping rule, and generates the stream of corresponding symbols as follows; s k,m s k,m 2 s k,m 3..s k,0 map I k, Q k In the above equation, s k,i (i = 0,,2,., m-) represents the i th bit in the k th symbol to be coded by the Gray code mapping, and I k and Q k represents the in-phase and quadrature components of the k th symbol, respectively. The Gray mapping for mapping for coded binary bits into symbols can be done with the following recursive formula. gray (k) = 2 n + gray (2 n k), 2 n k < 2 n with gray (0) = 0, gray () =, as initial values. The Mapper is programmable to support different signal constellations and different modulations up to 4096QAM. The Mapper supports six standard gray mapped constellations: QPSK, 6QAM, 64QAM, 256QAM, 024QAM, and 4096QAM. In case of 64QAM, as an example, m = 6 and its corresponding signal constellation is as follows; 3

4

2. Demodulator Functional Block The demodulator in the receiver receives a stream of symbol data from ADC (analog to digital converter). The demodulator performs frequency and timing (symbol and frame) synchronization process with keeping AGC (automatic gain control) process on the received symbols. After obtaining the synchronization, the demodulator performs an equalization process to mitigate the channel effect on the received symbols. Then the output of the Equalizer goes to De-mapper (or Slicer) and then goes to the LDPC decoder for data correction. The following Figure 2 shows the functional block diagram of demodulator. Rcv d analog signal Analog to Digital Converter Equalization Timing & Frame Synchronization Rx Impairment Correction Rx Interpolator Root Raised Cosine (Rx RRC) Internal AGC Carrier Synchronization De-mapper (Slicer) Decoder (R-S +LDPC) Figure 2: Demodulator Functional Block Diagram 5

2. Decoder Block The Rx decoder consists of a De-Mapper (or Slicer), an LDPC decoder, and a Reed-Solomon decoder. The Rx decoder receives demodulated symbols from demodulator, converts the demodulated symbols to bit stream through a de-mapping process, and then performs the error correction on the received bit streams of data. 2... De-Mapper The Mapper module takes the coded bits and maps the bit stream into symbol streams. The Mapper is programmable to support different signal constellations and different modulations up to 4096QAM. The Mapper supports six standard gray mapped constellations: QPSK, 6QAM, 64QAM, 256QAM, 024QAM, and 4096QAM. The modulator in the transmitter receives a stream of symbol data from Mapper. The symbols are then modulated into real signals (I) and imaginary signals (Q). The digital format of the airframe is converted to analog signals by digital to analog converter (DAC) and is sent for transmission. The receiver receives the transmitted signal through an analog to digital converter (ADC) and demodulates the received signal symbols. The De-Mapper receives the demodulated symbols from demodulator, converts the received symbols into the soft values of the corresponding bit stream through a soft decision decoding process. The De-Mapper output signals are the soft decision value of the bit stream of the corresponding symbols. It is well established that LDPC provides the best performance when the soft value of bit is used as its input. We can represent the demodulated received signal, R k, as follows; R k = X k + jy k = g k (I k + jq k ) + (n k I + jn k Q ) where X k and Y k are the in-phase and quadrature components of the modulated signal, respectively, g k is the transmission path gain of the signal, n k I and n k Q are independently distributed zero mean white Gaussian noise. The estimation of bit, S k,i (i = 0,, 2 m), in symbol S k is obtained by taking the log likelihood ratio (LLR) of the conditional probability of the bit being correct, as follows; Λ(S k,i ) = log Pr{ S k,i=0 X k,y k } Pr{ S k,i = X k,y k }, i = 0,, 2,., m- The above LLR can be approximated by dual minimum metric approximation as follows; [Equation ] Λ(S k,i ) = log exp{ /σ n 2 z i [ R k z k (S k,i =0) ] 2 } exp { /σ n 2 z i [ R k z k (S k,i = ) ] 2 }. { min [R k - z k (S k,i = ) ] 2 - min [R k - z k (S k,i = 0) ] 2 }. = (2n k,i ) { [R k - z k (S k,i = n k,i ) ] 2 - min [R k - z k (S k,i = n k,i ) ] 2 } 6

Where z k (S k,i =0) and z k (S k,i =) are the values of I k +jq k when S k,i =0 and S k,i =, respectively. In the above equation, n k,i represent the value of the i th bit of the symbol which is the closest to the received symbol, R k. The n k,i represent the negative value of n k,i. As seen from the above equation, the LLR can be calculated by finding the values of z k (S k,i = ) and z k (S k,i = 0) which minimize the values of [R k - z k (S k,i = ) ] 2 and [R k - z k (S k,i = 0) ] 2, respectively. The values of z k (S k,i = ) and z k (S k,i = 0) which minimize the values of [R k - z k (S k,i = ) ] 2 and [R k - z k (S k,i = 0) ] 2 can be determined by the range of the values of the in-phase and quadrature components of the received symbol, R k. The first term in the third line in [Equation ] can be represented using the in-phase and quadrature components of the received symbol (or signal) as follows; [Equation 2] [R k - z k (S k,i = n k,i ) ] 2 = (X k - U k ) 2 + (Y k - V k ) 2 The U k and V k are the in-phase and quadrature components of the received symbol on a signal constellation, respectively. The second term in the third line in [Equation ] can be represented using the in-phase and quadrature components of the received symbol (or signal) as follows; [Equation 3] min [R k - z k (S k,i = n k,i ) ] 2 = (X k - U k,i ) 2 + (Y k - V k,i ) 2 The U k,i and V k,i are the in-phase and quadrature components of the received symbol on a signal constellation, respectively, which minimize [R k - z k (S k,i = n k,i ) ] 2. Using the [Equation 2] and [Equation 3] in [Equation ], the LLR can be obtained as follows; [Equation 4] Ʌ(S k,i ) = (2n k,i -) [ { (X k -U k ) 2 + (Y k -V k ) 2 } - { (X k -U k,i ) 2 + (Y k -V k,i ) 2 } ]. = (2n k,i -) [ (U k +U k,i - 2X k ) (U k - U k,i ) + (V k +V k,i - 2Y k ) (V k - V k,i ) ] We can use [Equation 4] to derive the soft decision value of the LLR of any M-ary QAM for the input of the decoder. As we support from 4QAM up to 4096QAM in the modem, we need to derive six sets of those soft decision value of the LLRs for those of 4QAM, 6QAM, 64QAM, 256QAM, 024QAM, and 4096QAM. As seen in [Equation 4], there is need to find the values of U k, U k,i, V k, and V k,i for the corresponding received symbol S k,i ( = X k + jy k ) as a function of bit position of i ( = 0,,.., m- ) to obtain the soft decision value of the LLR, Ʌ(S k,i ), of the received symbol. 7

LLR Derivation For 256QAM GScom illustrates the derivation methodology for the soft decision values of the LLR for 256QAM as an example. For the 256QAM, the following two tables (Table & Table 2) show the range of the quadrature component Y k and in-phase component X k of the received symbol R k, their corresponding bit values, and their corresponding representative values of the V k and U k in those ranges. [Table ] Y k (n k,7 n k,6 n k,5 n k,4 ) V k Y k > 4a (0000) 5a 2a < Y k < 4a (000) 3a 0a < Y k < 2a (00) a 8a < Y k < 0a (000) 9a 6a < Y k < 8a (00) 7a 4a < Y k < 6a (0) 5a 2a < Y k < 4a (00) 3a 0 < Y k < 2a (000) a -2a < Y k < 0 (00) -a -4a < Y k < -2a (0) -3a -6a < Y k < -4a () -5a -8a < Y k < -6a (0) -7a -0a < Y k < -8a (00) -9a -2a < Y k < -0a (0) -a -4a < Y k < -2a (00) -3a Y k < -4a (000) -5a [Table 2] X k (n k,3 n k,2 n k, n k,0 ) U k X k > 4a (0000) 5a 2a < X k < 4a (000) 3a 0a < X k < 2a (00) a 8a < X k < 0a (000) 9a 6a < X k < 8a (00) 7a 4a < X k < 6a (0) 5a 2a < X k < 4a (00) 3a 0 < X k < 2a (000) a -2a < X k < 0 (00) -a -4a < X k < -2a (0) -3a -6a < X k < -4a () -5a -8a < X k < -6a (0) -7a -0a < X k < -8a (00) -9a -2a < X k < -0a (0) -a -4a < X k < -2a (00) -3a X k < -4a (000) -5a 8

The following Table 3 shows the bit sequence {m k,7, m k,6,.., m k,2, m k,, m k,0 } in the symbol which minimize [R k - z k (S k,i = n k,i ) ] 2 for each bit position of i (i=0,,2,.,7), their representation in terms of {n k,7, n k,6,.., n k,2, n k,, n k,0 }, their corresponding in-phase component U k,i, and the quadrature component V k,i of the symbol z k (S k,i = n k,i ). [Table 3] i { m k,7 m k,6 m k,5 m k,4 m k,3 m k,2 m k, m k,0 } V k,i U k,i 7 { n k,7 0 0 n k,3 n k,2 n k, n k,0 } V k,7 U k 6 { n k,7 n k,6 0 n k,3 n k,2 n k, n k,0 } V k,6 U k 5 { n k,7 n k,6 n k,5 n k,3 n k,2 n k, n k,0 } V k,5 U k 4 { n k,7 n k,6 n k,5 n k,4 n k,3 n k,2 n k, n k,0 } V k,4 U k 3 { n k,7 n k,6 n k,5 n k,4 n k,3 0 0 } V k U k,3 2 { n k,7 n k,6 n k,5 n k,4 n k,3 n k,2 0 } V k U k,2 { n k,7 n k,6 n k,5 n k,4 n k,3 n k,2 n k, } V k U k, 0 { n k,7 n k,6 n k,5 n k,4 n k,3 n k,2 n k, n k,0 } V k U k,0 The values of V k,i and U k,i obtained by using the values of (m k,7, m k,6, m k,5, m k,4 ) and (m k,3, m k,2, m k,, m k,0 ), respectively, as a function of bit position i in the above table are shown in the next two tables (Table 4 & Table 5) as a function of the value of bits, n k,i ( i = 0,,.., m ). [Table 4] (n k,7 n k,6 n k,5 n k,4 ) V k,7 V k,6 V k,5 V k,4 (0000) -a 7a a 3a (000) -a 7a a 5a (00) -a 7a 3a 9a (000) -a 7a 3a a (00) -a 9a 3a 5a (0) -a 9a 3a 7a (00) -a 9a 5a a (000) -a 9a 5a 3a (00) a -9a -5a -3a (0) a -9a -5a -a () a -9a -3a -7a (0) a -9a -3a -5a (00) a -7a -3a -a (0) a -7a -3a -9a (00) a -7a -a -5a (000) a -7a -a -3a 9

[Table 5] (n k,3 n k,2 n k, n k,0 ) U k,3 U k,2 U k, U k,0 (0000) -a 7a a 3a (000) -a 7a a 5a (00) -a 7a 3a 9a (000) -a 7a 3a a (00) -a 9a 3a 5a (0) -a 9a 3a 7a (00) -a 9a 5a a (000) -a 9a 5a 3a (00) a -9a -5a -3a (0) a -9a -5a -a () a -9a -3a -7a (0) a -9a -3a -5a (00) a -7a -3a -a (0) a -7a -3a -9a (00) a -7a -a -5a (000) a -7a -a -3a The values of the Ʌ(S k,i ) of the received symbol obtained by using the values of the U k, U k,i, V k, and V k,i from the above tables ( [Table ], [Table 2], [Table 4], [Table 5]) in [Equation 4] are shown in the following two tables ( [Table 6] & [Table 7] ) as a function of the value of bits, n k,i ( i = 0,,.., m ). [Table 6] Y k Range Ʌ(S k,7 ) Ʌ(S k,6 ) Ʌ(S k,5 ) Ʌ(S k,4 ) Y k > 4a 8Y k - 56a 4Y k - 44a 2Y k - 26a Y k - 4a 2a < Y k < 4a 7Y k - 42a 3Y k - 30a Y k - 2a Y k - 4a 0a < Y k < 2a 6Y k - 30a 2Y k - 8a Y k - 2a Y k + 0a 8a < Y k < 0a 5Y k - 20a Y k - 8a 2Y k - 22a Y k + 0a 6a < Y k < 8a 4Y k - 2a Y k - 8a -2Y k + 0a Y k - 6a 4a < Y k < 6a 3Y k - 6a 2Y k - 4a -Y k + 4a Y k - 6a 2a < Y k < 4a 2Y k - 2a 3Y k - 8a -Y k + 4a -Y k + 2a 0 < Y k < 2a Y k 4Y k - 20a -2Y k + 6a -Y k + 2a -2a < Y k < 0 Y k 4Y k - 20a 2Y k + 6a Y k + 2a -4a < Y k < -2a 2Y k + 2a 3Y k - 8a Y k + 4a Y k + 2a -6a < Y k < -4a 3Y k + 6a 2Y k - 4a Y k + 4a Y k - 6a -8a < Y k < -6a 4Y k + 2a Y k - 8a 2Y k + 0a Y k - 6a -0a < Y k < -8a 5Y k + 20a Y k - 8a -2Y k - 22a Y k + 0a -2a < Y k < -0a 6Y k + 30a 2Y k - 8a Y k - 2a Y k + 0a -4a < Y k < -2a 7Y k + 42a -3Y k - 30a Y k - 2a Y k - 4a Y k < -4a 8Y k + 56a -4Y k - 44a 2Y k - 26a Y k - 4a 0

[Table 7] X k Range Ʌ(S k,3 ) Ʌ(S k,2 ) Ʌ(S k, ) Ʌ(S k,0 ) X k > 4a 8X k - 56a 4X k - 44a 2X k - 26a X k - 4a 2a < X k < 4a 7X k - 42a 3X k - 30a X k - 2a X k - 4a 0a < X k < 2a 6X k - 30a 2X k - 8a X k - 2a X k + 0a 8a < X k < 0a 5X k - 20a X k - 8a 2X k - 22a X k + 0a 6a < X k < 8a 4X k - 2a X k - 8a -2X k + 0a X k - 6a 4a < X k < 6a 3X k - 6a X k - 4a -X k + 4a X k - 6a 2a < X k < 4a 2X k - 2a 3Y k - 8a -X k + 4a -X k + 2a 0 < X k < 2a X k 4X k - 20a -2X k + 6a -X k + 2a -2a < X k < 0 X k 4X k - 20a 2X k + 6a X k + 2a -4a < X k < -2a 2X k + 2a 3Y k - 8a X k + 4a X k + 2a -6a < X k < -4a 3X k + 6a 2Y k - 4a X k + 4a X k - 6a -8a < X k < -6a 4X k + 2a X k - 8a 2X k + 0a X k - 6a -0a < X k < -8a 5X k + 20a X k - 8a -2X k - 22a X k + 0a -2a < X k < -0a 6X k + 30a 2X k - 8a X k - 2a X k + 0a -4a < X k < -2a 7X k + 42a -3X k - 30a X k - 2a X k - 4a X k < -4a 8X k + 56a -4X k - 44a 2X k - 26a X k - 4a The LLR of the Ʌ(S k,i ) can be obtained by applying the following transform variable to [Table 6] and [Table 7] which does not require a lookup table or memory for the calculation of the Ʌ(S k,i ). The transform variable used are as follows; Z k = Y k - 8a, Z 2k = Z k - 4a, = Z 2k - 2a, Z k = X k - 8a, Z 2k = Z k - 4a, = Z 2k - 2a, Under the assumption of the possibility of using sign bit to represent the sign of those value of transform variables (X k, Y k, Z k, Z 2k,, Z k, Z 2k, ), the LLR tables for the calculation of Ʌ(S k,i ) of the received symbol obtained can be found by representing the values of LLR in terms of the transform variables in the [Table 6] and [Table 7]. The resulting tables are shown in [Table 8] and [Table 9], respectively.

[Table 8] MSB(Y k ) MSB(Z k ) MSB(Z 2k ) MSB( ) Ʌ(S k,7 ) Ʌ(S k,6 ) Ʌ(S k,5 ) Ʌ(S k,4 ) 0 0 0 Y k + 7Z k Y k - 2 Z k + 5Z 2k Z 2k + Y k + 7 Z k - Y k - Z 2k + Z 2k 0 3 0 3Y k - 2 Z k Z 2k - 3Y k - 3 Z k - Z 2k 0 0 Y k 2Z k - 2 Z 2k + Y k - 2Z k - Z 2k 0 2Y k + 2 Z k Z 2k - 2Y k + Z k + Z 2k 0 0 Y k - 7Z k - Y k - 2 Z k + Z 2k + 0 5Z 2k Y k - 7 Z k + - Y k - Z 2k + Z 2k 3 0 3Y k + 2 Z k Z 2k - 3Y k + 3 Z k - Z 2k 0 0 Y k 2Z k - 2 Z 2k + Y k + 2Z k - Z 2k 0 2Y k - 2 Z k Z 2k - 2Y k - Z k + Z 2k [Table 9] MSB(X k ) 0 MSB(Z k ) MSB(Z 2k ) MSB( 0 0 ) Ʌ(S k,3 ) Ʌ(S k,2 ) Ʌ(S k, ) Ʌ(S k,0 ) + Z 2k + 0 0 X k + 7Z k X k - 2 Z k X k + 7 Z k 5Z 2k 0 3X k - 2 3X k - 3 Z k - 0 0 X k 2Z k - 2 X k - 2Z k - 0 2X k + 2 Z k 2X k + Z k + 0 0 X k - 7Z k - X k - 2 Z k X k - 7 Z k 0 3X k + 2 3X k + 3 - X k - Z 2k + 3 Z k Z 2k - Z 2k Z 2k + Z 2k Z 2k - Z 2k 5Z 2k + Z 2k Z 2k + + - X k - Z 2k + 3 Z k Z 2k - Z k - Z 2k Z 2k 2

0 0 Y k 2Z k - 2 Z 2k + X k + 2Z k - Z 2k 0 2X k - 2 Z k Z 2k - 2X k - Z k + Z 2k The soft decision values of LLR for the upper 4 bits ( Ʌ(S k,7 ), Ʌ(S k,6 ), Ʌ(S k,5 ), Ʌ(S k,4 ) ) can be obtained by exploiting the information in [Table 8] as follows; Ʌ(S k,7 ) = αy k + δ( βz k + γ ) Ʌ(S k,6 ) = ay k + bz k + cz 2k + d Ʌ(S k,5 ) = Z 2k + f Ʌ(S k,4 ) = Where the values of α, δ, β, γ, a, b, c, d, and f are coefficient constants and can be obtained by exploiting the information in [Table 8]. The soft decision values of LLR for the lower 4 bits ( Ʌ(S k,3 ), Ʌ(S k,2 ), Ʌ(S k, ), Ʌ(S k,0 ) ) can be obtained by exploiting the information in [Table 9] as follows; Ʌ(S k,3 ) = α X k + δ ( β Z k + γ ) Ʌ(S k,2 ) = a X k + b Z k + c Z 2k + d Ʌ(S k, ) = Z 2k + f Ʌ(S k,0 ) = Where the values of α, δ, β, γ, a, b, c, d, and f are coefficient constants and can be obtained by exploiting the information in [Table 9]. 2..2. Implementation of De-Mapper into Hardware As seen from the above LLR equations, the soft decision values of LLR of one symbol for 256QAM can be obtained by using six bit clocks. One symbol in 256-QAM consists of eight bits. The demapping process developed here is a real time process. GScom uses the same principle to derive real time mapping & de-mapping processors for QPSK, 6QAM, 64QAM, 024QAM, and 4096QAM. 3