Performance Study of Non-Binary Belief Propagation for Decoding Reed-Solomon Codes

Similar documents
An Introduction to Low Density Parity Check (LDPC) Codes

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Chapter 7 Reed Solomon Codes and Binary Transmission

Convergence analysis for a class of LDPC convolutional codes on the erasure channel

Making Error Correcting Codes Work for Flash Memory

Random Redundant Soft-In Soft-Out Decoding of Linear Block Codes

Advanced Hardware Architecture for Soft Decoding Reed-Solomon Codes

Aalborg Universitet. Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes

LDPC Codes. Slides originally from I. Land p.1

Structured Low-Density Parity-Check Codes: Algebraic Constructions

On the Construction and Decoding of Cyclic LDPC Codes

Practical Polar Code Construction Using Generalised Generator Matrices

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Lecture 12. Block Diagram

Quasi-cyclic Low Density Parity Check codes with high girth

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes

A Simplified Min-Sum Decoding Algorithm. for Non-Binary LDPC Codes

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor

Optimum Soft Decision Decoding of Linear Block Codes

Enhancing Binary Images of Non-Binary LDPC Codes

Polar Codes: Graph Representation and Duality

ECEN 655: Advanced Channel Coding

Graph-based codes for flash memory

Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V.

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

Message-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras

LDPC Codes. Intracom Telecom, Peania

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

CHAPTER 3 LOW DENSITY PARITY CHECK CODES

Extended MinSum Algorithm for Decoding LDPC Codes over GF (q)

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

ECC for NAND Flash. Osso Vahabzadeh. TexasLDPC Inc. Flash Memory Summit 2017 Santa Clara, CA 1

Low-complexity error correction in LDPC codes with constituent RS codes 1

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal

SOFT-DECISION DECODING OF REED-SOLOMON CODES USING PATTERN INFORMATION OVER PARTIAL RESPONSE CHANNELS. Soowoong Lee

Progressive algebraic Chase decoding algorithms for Reed Solomon codes

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Low-density parity-check codes

Polar Code Construction for List Decoding

LDPC Decoder LLR Stopping Criterion

Iterative Encoding of Low-Density Parity-Check Codes

Quasi-Cyclic Asymptotically Regular LDPC Codes

Lecture 4 : Introduction to Low-density Parity-check Codes

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

Compressed Sensing Using Reed- Solomon and Q-Ary LDPC Codes

Iterative Soft-Decision Decoding of Binary Cyclic Codes

Girth Analysis of Polynomial-Based Time-Invariant LDPC Convolutional Codes

Coding Techniques for Data Storage Systems

Codes for Partially Stuck-at Memory Cells

Codes on graphs and iterative decoding

Construction and Performance Evaluation of QC-LDPC Codes over Finite Fields

Polar Coding for the Large Hadron Collider: Challenges in Code Concatenation

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems

Codes on graphs and iterative decoding

Efficient design of LDPC code using circulant matrix and eira code Seul-Ki Bae

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission

Coding for loss tolerant systems

Integrated Code Design for a Joint Source and Channel LDPC Coding Scheme

Introducing Low-Density Parity-Check Codes

Error Correction Methods

Weaknesses of Margulis and Ramanujan Margulis Low-Density Parity-Check Codes

Reed-Solomon codes. Chapter Linear codes over finite fields

Decoding of LDPC codes with binary vector messages and scalable complexity

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

Successive Cancellation Decoding of Single Parity-Check Product Codes

Advances in Error Control Strategies for 5G

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION

Fountain Uncorrectable Sets and Finite-Length Analysis

A Proposed Quantum Low Density Parity Check Code

Progressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes

Belief propagation decoding of quantum channels by passing quantum messages

Utilizing Correct Prior Probability Calculation to Improve Performance of Low-Density Parity- Check Codes in the Presence of Burst Noise

Improved Successive Cancellation Flip Decoding of Polar Codes Based on Error Distribution

An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim

Low-Complexity Fixed-to-Fixed Joint Source-Channel Coding

Turbo Codes are Low Density Parity Check Codes

Chapter 7: Channel coding:convolutional codes

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus

Channel Codes for Short Blocks: A Survey

The E8 Lattice and Error Correction in Multi-Level Flash Memory

State-of-the-Art Channel Coding

AN INTRODUCTION TO LOW-DENSITY PARITY-CHECK CODES

R. A. Carrasco and M. Johnston, Non-Binary Error Control Coding Cork 2009

Belief-Propagation Decoding of LDPC Codes

Staircase Codes. for High-Speed Optical Communications

ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Algebraic Soft-Decision Decoding of Reed Solomon Codes

LDPC codes based on Steiner quadruple systems and permutation matrices

REED-SOLOMON CODE SYMBOL AVOIDANCE

Eindhoven University of Technology MASTER. Gauss-Seidel for LDPC. Khotynets, Y. Award date: Link to publication

Non-binary Hybrid LDPC Codes: structure, decoding and optimization

Cyclic codes: overview

Quasi-Cyclic Low-Density Parity-Check Codes With Girth Larger Than

Low-density parity-check (LDPC) codes

VHDL Implementation of Reed Solomon Improved Encoding Algorithm

ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES

Status of Knowledge on Non-Binary LDPC Decoders

Transcription:

Performance Study of Non-Binary Belief Propagation for Decoding Reed-Solomon Codes Bimberg, Marcel; Lentmaier, Michael; Fettweis, Gerhard Published in: [Host publication title missing] Published: 2010-01-01 Link to publication Citation for published version (APA): Bimberg, M., Lentmaier, M., & Fettweis, G. (2010). Performance Study of Non-Binary Belief Propagation for Decoding Reed-Solomon Codes. In [Host publication title missing] IEEE--Institute of Electrical and Electronics Engineers Inc.. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal reuirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal L UNDUNI VERS I TY PO Box117 22100L und +46462220000

Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 14. Aug. 2018

Performance Study of Non-Binary Belief Propagation for Decoding Reed-Solomon codes Marcel Bimberg, Michael Lentmaier, Gerhard P. Fettweis Vodafone Chair Mobile Communications Systems Technische Universität Dresden D-01069 Dresden, Germany Email: {bimberg, lentmaier, fettweis}@ifn.et.tu-dresden.de Abstract In this paper we investigate the frame-error correcting performance of two newly developed, non-binary belief propagation based, soft-in/soft-out decoding algorithms when decoding Reed-Solomon codes. We present results for the AWGN channel indicating that non-binary belief propagation can come close to the performance of the binary adaptive Belief- Propagation algorithm or even slightly better when decoding short Reed-Solomon codes. I. INTRODUCTION Since their discovery in 1960 [1], Reed-Solomon (RS) codes have been probably the most widely applied errorcorrection codes (ECCs) in many digital communications and recording systems. Besides numerous applications in the past, RS codes are still incorporated into today s state-of-the-art communications systems such as WiMAX, DVB, DAB and the newly developed WirelessHD standard [3]. Due to their ability to correct burst errors and the existence of efficient hard-decision based algebraic en- and decoding algorithms, RS codes are still favored over other codes in environments where delay sensitive services combined with robust communication become necessary. Moreover, in order to cope with low latency reuirements in multimedia networks, PHY headers and control messages of MAC protocols demand the usage of shorter block lengths. With their property of being maximumdistance-separable (MDS) codes, RS codes therefore provide good error-correcting performance also at relatively small block lengths. As the rediscovery of low-density parity-check (LDPC) codes in the early 90 s showed, the use of long block codes (in order of tens of thousands bits) combined with iterative, message-passing algorithms allows to asymptotically approach the capacity of the AWGN channel. However, applying the standard belief propagation (BP) decoding to RS codes leads to poor error-correcting capability due to many short cycles in the high-density parity-check (HDPC) matrices. In order to improve the performance of BP also for HDPC matrices, Jiang and Narayanan proposed in [4] the iterative, adaptive belief propagation (ABP) algorithm which operates in GF (2). This algorithm compares favorably with other soft-decision decoding algorithms and can be regarded as a fundamental step towards message passing decoding of RS codes. El-Khamy and McEliece later concatenated in [6] ABP with the Koetter- Vardy [7] algebraic soft-decision decoding (ASD) algorithm, which enabled them to achieve near optimal performance for relatively short, high-rate codes. In [8] a combination of ABP and the ordered-statistics-decoding (OSD) was used to improve the error correcting capability of medium length codes. However, except for the original proposed ABP decoder all of them are restricted to provide only hard decisions as output information (SIHO). In this paper, we investigate two newly developed softin/soft-out (SISO) decoding algorithms. One of them utilizes the matrix adaption step while performing belief propagation decoding in higher order Galois fields (GF-ABP). It has been demonstrated in [10] that GF-BP based decoding can improve error correcting performance compared to binary BP algorithms especially for shorter LDPC codes. As bits are grouped together in the GF-BP decoding approach, it is uite reasonable to assume that GF-BP decoding can perform better than binary decoding on channels with noise bursts. In a second approach we extend the idea of multiple-bases belief propagation (MBBP) [12] also to higher order Galois fields (GF-MBBP). Utilizing MBBP could especially become useful in next-generation s many-core based wireless communications systems as the decoding algorithm can be mapped easily on several computing cores. The remainder of this work is organized as follows. Some preliminaries including the system model are given in Section II. The investigated algorithms are presented in Section III. Simulation results and discussions are provided in Section IV-B. Finally, Section V concludes the paper and suggests further research directions. II. PRELIMINARIES A. Notation and properties of RS codes Let RS(N, K) be a Reed-Solomon code which is defined over a finite field GF (2 ), N and let β be a primitive element of the field. K represents the number of information symbols, while the block length N is eual to N = 2 1. Let m = [m 1, m 2,..., m K ] be a message of K information symbols. These symbols can be associated with an information polynomial m(x) = m 1 + m 2 x +... + m K x K 1, (1)

which is encoded through multiplication by a generator polynomial N K g(x) = (x β j ) (2) j=1 resulting in the polynomial c(x) = m(x)g(x). By this definition, each codeword c = [c 1, c 2,..., c N ], c i GF (2 ) is interpreted as a code polynomial c(x). The decoder verifies the validity of c by evaluating the well known parity-check euation ch T = 0, with H being an (N K) N dimensional matrix consisting of (N K) codewords spanning the dual code of RS(N, K): 1 β... β (N 1) 1 β 2... β 2(N 1) H =......... (3) 1 β (N K)... β (N 1)(N K)) B. System model Before describing the investigated decoding algorithms formally, we first assume that the encoded symbols c j, (j = 1,..., N) are modulated using antipodal BPSK. Therefore, each symbol c j GF (2 ) is mapped into binary symbols (we assume normal basis representation for which the transformation can be found, e.g., in [9]). The binary symbols are transmitted over an AWGN channel (Fig. 1). On the receiver side, the input values can be specified by: r j,t = s j,t + n j,t, (t = 1,..., ) (4) with n j being real valued additive white Gaussian noise. data source data sink RS Encoder RS Decoder c j Symbol [ c j,1,..., c j, ] Bits Fig. 1. Bits Symbol System Model C. Non-binary belief propagation - GF-BP BPSK Mod BPSK Demod [ s,..., s ] j,1 j, j,1 j, n j, t [ r,..., r ] The binary BP algorithm as originally proposed in [2] has found numerous application in the decoding of linear block codes with sparse graph representations, as, e.g., LDPC codes. In [14] it was shown that BP decoding for LDPC codes can approach the Shannon limit for large block lengths. For shorter ones an error-correcting improvement was first observed in [10] by extending the BP algorithm to non-binary LDPC codes. However, this improvement was achieved at the expense of increased decoding complexity. In [11] a reduced complexity GF-BP algorithm in the order of O( log 2 ) was therefore proposed, which is based on Fast-Fourier-Transformation (FFT), enabling efficient decoding even of non-binary LDPC codes defined over very large order Galois fields. In the following the Fourier transform decoding algorithm is described. Suppose a non-binary LDPC code is given, having an (N K) N parity-check matrix H. According to [11], H can be described by a graph consisting of N variable and N K check nodes that are connected with each other by edges if the corresponding entry h ij GF (2 ) (i being row, j being column index) in H is non-zero. Decoding can be accomplished by iteratively exchanging reliability information (called messages) between variable and check nodes. In contrast to the binary algorithm each message is now a vector representing a 2 -point discrete probability set rather than a single value. Furthermore, these vectors are now permuted and reordered each time they are sent from variable to check nodes and vice versa (Fig. 2). Check node messages R (l) i j h 11 h 21 h 12 h 1N h 11 v 1 (0) F 1 v 1 h 21 v 1 h 12 v 2 (0) (0) F 2 variable nodes F N v 2 Π ( l ) Q j i v N ( l ) Ri j permuted ( l ) depermuted Q j i ( l ) h 1N v N Ri j F F F F F F Fig. 2. check nodes Graph of a non-binary LDPC code and variable node messages Q (l) j i passed along the edges are calculated in two stages according to the following decoding euations: 1) Check node update: a) Permutation and Fourier transform: R (l+1) i j = FFT[P (Q (l) j V i\j j i b) Inverse Fourier transform and depermutation R (l+1) i j )] (5) = P 1 (IFFT[ R (l+1) i j ]) (6) 2) Variable node update: Q (l+1) j i = γ ij F (0) j R (l+1) i j (7) i C j\i Notation: l F (0) j γ ij Q j i R i j V i\j C j\i P (.)/P 1 (.) count index for GF-BP iterations initial prior probability vector of symbol j normalization coefficient message vector passed from variable node j to check node i message vector passed from check node i to variable node j set of all variable nodes connecting to check node i except for node j set of all check nodes connecting to variable node j except for node i permutation / inverse permutation

Due to the structure of the Galois fields, the permutation block P (Q (l) j i ) can actually be implemented by cyclically shifting downwards the column vector Q (l) j i, with the exception of the first likelihood, which corresponds to the probability of the coded symbol c j being zero. The number of cyclic shifts is eual to the power of the primitive element that corresponds to the entry h ij. The (.)-operation then performs the termby-term multiplication of the Fourier transformed probability values, where FFT(.) is a -dimension two-point FFT. After inverse transformation and depermutation (cyclically upshifting) the results are sent back to the variable nodes. Before the algorithm iterates on a matrix H, variable node messages Q (l) j i are initialized by the current symbolreliability values. In the first iteration of GF-BP decoding these probabilities are given by the channel values: p(v j c j = 0) F (0) p(v j c j = β 0 ) j =.. (8) p(v j c j = β 2 2 ) As we assume BPSK transmission and all transmitted bits being independent, they can be computed by: p(v j c j = x) = p(r j,t c j,t = x t ) (9) t=1 p(r j,t c j,t = 1) e (r t α) 2 2σ 2, p(r j,t c j,t = 0) e (r t +α)2 2σ 2 (10) with x t being the tth bit of the binary representation of x, x GF (2 ). The value of α is assumed to be known to the receiver. During the last iteration (or meanwhile each variable node update) posterior symbol-reliability values are calculated according to: F (k+1) j = γ j F (k) j i C j R (l+1) i j. (11) The normalization factor γ j ensures that p(v j c j = x) =. 1. (12) x GF(2 ) Based on these posterior likelihoods a tentative decoding decision can be made such that ĉ (k+1) j = arg max x GF(2 ) p(v j c j = x). (13) If ĉh T = 0 decoding stops and outputs ĉ; otherwise a new iteration starts until a valid codeword is found or a maximum number l max of iterations is reached. III. ITERATIVE DECODING OF REED-SOLOMON CODES UTILIZING NON-BINARY BELIEF PROPAGATION A. Non-binary adaptive belief propagation - GF-ABP Due to the high density that parity-check matrices of RS codes possess, off-the-shelf BP based decoding leads to poor error-correcting performance as the large number of short cycles counteracts the independence of messages exchanged between variable and check nodes. To overcome this problem, in [4] a modified version of the binary BP algorithm - namely ABP - was proposed. Using ABP, the binary parity-check sub-matrix corresponding to the (N K) least reliable bits (LRBs) in H b is reduced into an identity matrix before standard BP decoding is applied. Hence, error propagation from the unreliable bits is effectively reduced, which facilitates ABP decoding also to improve the decoding performance of linear block codes having HDPC matrices. Here we extend the idea of adaptively changing the parity-check matrix to the non-binary BP algorithm. As pictured in Fig. 3 we are now separating between inner GF-BP iterations indexed by l and outer matrix adaption steps indexed by k. The maximum number of iterations therefore amounts to k max l max. Before GF-BP is going to be applied, the kth parity-check matrix H (k) is adapted in order to minimize the adverse influence of less reliable symbols onto belief propagation. This is accomplished by diagonalization of the sub-matrix corresponding to the N K least reliable symbols (LRS), (as the matrix H has full rank it is always possible to eliminate exactly N K columns). Each of the LRS therefore participates only in one parity-check euation, which improves extrinsic information exchange originating from the more reliable symbols. One general method to perform diagonalization is to employ standard Gaussian-elimination over GF (2 ) having a polynomial complexity of O((N K)N 2 ). A second, and more powerful method in particular for RS codes, is to employ erasure decoding of the dual code RS (N, N K) of a RS(N, K) code. As we know N K positions in each of the N K parity check rows (corresponding to the LRS part), the missing K positions can be determined using the dual. Hence, each codeword found by dual code can serve as a row in the parity-check matrix of RS(N, K). This method provides a beneficial way for high throughput implementations since all rows can be determined in parallel employing, e.g., the Forney algorithm [5]. Prior to the matrix adaption step, the set of LRS has to be identified. For this purpose the most likely value of each symbol p j,max = max p(v j c j = x) (14) x GF (2 ) is used for determining the overall order of the N symbols. Employing appropriate sorting algorithms the complexity of this step amounts to O(N log 2 N). Different from GF-BP presented in Section II-C we introduce two additional damping coefficients δ and θ for GF-ABP. As the GF-BP algorithm is only suboptimal when decoding dense parity-check matrices, the additional parameters δ and θ attenuate the influence of the extrinsic information. This is different from LDPC codes, where both parameters are usually set to one as the GF-BP decoding is considered to be optimal due to ideally nonexisting short cycles.

( k ) F max = 0.8 0.3 0.4 0.7 0.4 0.9 0.6 0.5 0.9 0.2 3 0 0 0 0 1 2 6 0 0 0 2 0 1 0 2 0 0 4 0 ( k ) H = 0 6 1 0 3 0 4 0 0 0 2 5 0 0 1 1 5 0 3 7 0 0 7 2 0 0 0 3 5 0 H ( k+ 1) 1. Sorting & Systematizing [ ] ( max ) Diagonalize: H = φ H, F ( k+ 1) ( k ) ( k ) 0 1 0 5 0 1 0 0 2 0 6 0 1 3 0 2 4 0 2 0 = 2 0 0 0 1 5 0 0 3 0 5 0 0 0 0 3 6 1 0 0 0 0 0 1 0 4 2 0 4 1 LRS kmax iterations R 2. GF-Belief Propagation Check node update l = P IFFT FFT P ( Q ' ) l iterations max ( l+ 1) 1 ( ) i j j ' Vi \ j j i Variable node update δ ( l+ 1) ( k ) ( l+ 1) Q j i = γ jifj i' j,0 < δ 1 R i ' C j \ i Symbol reliability update ( k + 1) ( k ) ( l+ 1) Fj = γ jfj i ' j,0 < θ 1 R i ' C j θ Fig. 3. Non-binary adaptive belief propagation (GF-ABP) B. Non-binary multiple-bases belief propagation - GF-MBBP in a seuential manner, MBBP employs BP decoding on k parallel parity-check matrices. From the so generated list of codewords one is finally selected by some metric criterion. In order to distinguish different parity-check matrices [12] introduces the so called cyclic group generators (CGG). A CGG is representative of one group, which allows the generation of all other codewords in this group by multiplication or shifting operations. The CGG description can also be extended to RS codes. As they are cyclic codes, the dual code is also cyclic. This means we can construct an (N K) N full-rank parity-check matrices over GF (2 ) just by cyclically shifting a codeword belonging to the dual of RS(N, K). Each row of the matrix then corresponds to a different shift of the selected codeword. In [12] it was observed that the use of redundant rows can not only be advantageous for the BEC but also for the AWGN channel. We therefore employed N N matrices, where each row represents one of the N possible shifts of the CGG. Employing this method eual error protection is assured. Note that other matrices of one group can be generated by multiplying the CGG with elements from GF (2 )\{0}. However, for GF-BP decoding purposes they are euivalent with each other, as the multiplication implies a simply common downward/upward shifting operation of the corresponding message vectors participating in a parity-check euation. The optimal choice of concurrent parity-check matrices for GF-MBBP decoding is an open research problem. Recent results for binary codes in [13] indicate that the stopping set size of a parity-check matrix should be small in order to obtain good error-correcting performance. Nevertheless, finding stopping sets is a difficult task, in particular for codes Although from a practical implementation point of view the different decoding steps of GF-ABP can be pipelined, the MBBP approach introduced in [12] appears suitable for efficient parallel implementations in next-generation manycore systems. Instead of adapting H (k) Fig. 4. Fig. 5. r GF-BP 1 on H ĉ 1 GF-BP 2 on H ĉ2 Metric selection ĉ GF-BP k on Non-binary multiple-bases belief propagation (GF-MBBP) Sort LLRs & adapt H k max GF- BP l max BM min codewords List cˆ k List H Eucl. Dist. GF-ABP concatenated with RS hard-decision decoder defined over GF (2 ). For the codes investigated within this paper, we therefore focused on parity-check matrices generated by CGGs from the dual, having smallest minimum distance d min = K + 1. Employing this restriction, the constructed matrices have a small number of short cycles, which improves BP decoding. Beside decoding aspects, the use of matrices constructed by CGGs also saves significant amount of storage memory since only one row (corresponding to N symbols in GF (2 )) has to be stored for each matrix. As metric criterion we selected the final codeword to be the most freuent one from the list of codewords provided by the k concurrent GF- BP decoders. C. Extension by RS hard-decision decoder In order to further improve decoding performance, [4] suggested to extend the ABP algorithm with an additional, concatenated RS hard-decision decoder, as, e.g., the Berlekamp Massey algorithm. This second decoder operates on an input

list of words assembled from the outputs of the ABP decoder after each BP iteration. The final codeword ĉ is selected from this newly generated list by comparing the Euclidean distances (Fig. 5). Although such a decoder looses the desired softoutput property, we also provide frame error rate curves for a corresponding GF-ABP-BM decoder. 10 0 10 1 10 2 BM ABP, 50/1 GF ABP, 50/1 GF ABP, 50/5 GF MBBP, #mat=7 (N K)xN, 50/1, max. occ. GF MBBP, #mat=1 (NxN), 50/1 A. Cyclic group generators IV. RESULTS AND DISCUSSION In order to find the CGGs of a particular RS code, we applied a modified brute-force search to the dual code. Instead of comparing each and every value of a codeword while searching the space of 2 (N K) codewords of the dual, we compared only the positions of the zero values of the current indexed word (for each such zero-pattern one codeword as a representative - which is the CGG - has to be stored). As described in the previous section, all other codewords can be computed from this CGG by shift and/or multiplication operations. Employing this method, we were able to search even the large space of approximately 10 9 codewords for the dual of a RS(31, 25) code within one day. Table I summarizes the results for the N N parity-check matrices constructed from these CGGs. code rate #parity-check matrices #length-4 cycles RS(7,5) 0.71 1 210 RS(15,11) 0.73 24 4185 RS(31,25) 0.81 546 104160 TABLE I CONSTRUCTED PARITY-CHECK MATRICES FOR GF-MBBP As for the RS(7, 5) only one N N matrix exists, we investigated a second approach employing 7 parallel (N K) N matrices. Each of them corresponds to one of the 7 possible shifts of the matrix: H (0) = and posses 10 length-4 cycles. B. Simulation results [ 0 2 7 2 7 5 5 5 0 2 7 2 7 5 ], (15) In Fig. 6-8 we compare the FER performance of the ABP, GF-ABP and GF-MBBP decoding algorithms. In all simulations the maximum number of outer iterations k max was set to 50. For the smaller RS(7, 5) code ( ˆ=21 bits blocklength) we can observe almost no difference between ABP and GF- ABP when the number of inner iterations is l max = 1. Increasing the number of inner iterations to l max = 5 leads to an improvement of 0.2 db for the GF-ABP approach. Employing the GF-MBBP algorithm on the uniue N N matrix degrades the performance compared to the GF-ABP approach by 0.2 db. However, observe that the 7 parallel (N K) N matrices formed from euation (15) facilitate the same good error-correcting capability as the GF-ABP with l max = 5. FER 10 3 10 4 10 5 10 6 10 7 3 4 5 6 7 8 9 10 Eb/No (db) Fig. 6. Comparison of FER for BM, ABP, GF-ABP and GF-MBBP decoding applied to a RS(7,5) code using AWGN channel Considering the RS(15, 11) code ( ˆ=60 bits blocklength), the GF-ABP algorithm is not able to provide the same FER as the binary counterpart in FER regions above 10 6. As can be observed, the extension of ABP by a hard-decision decoder improves the error-correcting capability especially in lower FER regions. Nevertheless, for the GF-ABP extended version (GF-ABP-BM) we could not observe that large improvements. Again, the GF-MBBP approach employing now 24 parallel matrices gives the best FER performance without the usage of an additional second decoder. Employing only half of the matrices still provides comparable results with the ABP decoder. Particularly the promising results in low FER regions give rise to the uestion if the GF-MBBP decoding will exhibit the same error-floor as it was observed for the ABP algorithm, e.g., in [4]. For the RS(31, 25) code ( ˆ=155 bits blocklength) neither the GF-ABP nor the GF-MBBP decoder are able to reach the ABP error-correcting performance. Compared with ABP the coding gain of the GF-ABP decoder decreases by 1 db and for the GF-MBBP by 0.2 db. Due to long term simulations for the huge amount of 546 concurrent matrices, we are not yet able to provide results in lower FER regions for that code. However, we would like to point out here, that GF-BP based decoding is much faster than the binary case. This can be justified by two facts. First, employing higher order GF-BP demands less permutations for the check-node operations as the absolute number of entries in the parity check matrix is much lower. Secondly, this lower number of permutations facilitates more localized operations like the FFT/IFFT operation on each variable-to-check/check-to-variable node message. For

FER 10 0 10 1 10 2 10 3 10 4 10 5 BM ABP, 50/1 ABP BM, 50/1 GF ABP, 50/1 GF ABP BM, 50/5 GF MBBP, mat=12 (NxN), max occ, 50/1 GF MBBP, mat=24 (NxN), max occ, 50/1 ML simulation [4] V. CONCLUSION In this paper, we investigated the newly developed GF-ABP and GF-MBBP algorithm for the SISO decoding of RS codes. We compared them with the binary ABP decoder and showed that the GF-MBBP approach provides very good results at least for small blocklengths. We believe that the GF-MBBP decoding approach is also very attractive for future many-core systems, as it provides an inherent way for parallelization. Moreover, employing GF-BP based decoding might be an efficient way for coded modulation techniues when nonbinary modulation as, e.g, 64-QAM for bandwith efficient communication is desired. Future research directions may also consider the concatenation of the presented decoders with the Koetter-Vardy [7] algebraic soft-decision decoding algorithm. VI. ACKNOWLEDGMENT The authors are grateful for the use of the high performance computing facilities of the ZIH at the TU Dresden. 10 6 2 3 4 5 6 7 8 9 Eb/No (db) Fig. 7. Comparison of FER for BM, ABP, GF-ABP and GF-MBBP decoding applied to a RS(15,11) code using AWGN channel FER 10 0 10 1 10 2 10 3 10 4 10 5 BM ABP, 50/1 ABP BM, 50/1 GF ABP, 50/1 GF ABP BM, 50/5 GF MBBP, dec7, mat=10 (NxN), 50/1 GF MBBP, dec7, mat=546 (NxN), 50/1 10 6 2 3 4 5 6 7 8 Eb/No (db) Fig. 8. Comparison of FER for BM, ABP, GF-ABP and GF-MBBP decoding applied to a RS(31,25) code using AWGN channel practical VLSI implementations this property is uite useful. Instead of routing each message in an individual way as for the binary case, now, message vectors of size 2 are routed the same way. Hence, the permutation network can be more simplified and structured. REFERENCES [1] I. S. Reed and G. Solomon, Polynomial Codes over Certain Finite Fields, Journal of Society for Industrial and Applied Mathematics, vol. 8, no. 2, pp. 300-304, June 1960. [2] R. Gallager, Low-Density Parity-Check Codes, Ph.D. Thesis, MIT Press, Cambridge, MA, 1963 [3] WirelessHD Specification Version 1.0, www.wirelesshd.org, 2007 [4] J. Jiang and K. R. Narayanan, Iterative soft decision decoding of Reed-Solomon codes based on adaptive parity check matrices, Proc. IEEE Intl. Symp. Inf. Theory, p. 261, 2004 [5] B. Friedrichs, Kanalcodierung,, Springer, 1994 [6] M. El-Khamy and R. J. McEliece, Iterative Algebraic Soft- Decision List Decoding of Reed-Solomon codes, IEEE Journal on Selected Areas in Communications, vol. 24, no. 3, March 2006 [7] R. Koetter and A. Vardy, Algebraic soft-decision decoding of Reed-Solomon codes, IEEE Trans. Inform. Theory, vol. 49, no. 11, pp. 2809-2825, Nov. 2003 [8] A. Kothiyal, O. Y. Takeshita, W. Jin, M. Fossorier, Iterative Reliability-Based Decoding of Linear Block Codes with Adaptive Belief Propagation, IEEE Comm. Lett., vol. 9, no. 12, Dec. 2005 [9] J. Bellorado, Low-Complexity Soft Decoding Algorithms for Reed-Solomon Codes, PhD thesis, Harvard University, 2006 [10] M. Davey and D. MacKay, Low density parity check codes over GF(), IEEE Comm. Letters, vol. 2, no. 6, pp. 165-167, June 1998 [11] L. Barnault and D. Declerc, Fast decoding algorithm for LDPC over GF(2 ), Proc. Inf. Theory Workshop, pp. 70-73, Mar. 2003 [12] T. Hehn, J. Huber, S. Laendner, O. Milenkovic, Multiple-bases belief-propagation decoding for short block-codes, Proc. IEEE Intl. Symp. Inf. Theory, pp. 311-315, June 2007 [13] T. Hehn, J. Huber, O. Milenkovic, S. Laendner, Multiple-Bases Belief-Propagation Decoding of High-Density Cyclic Codes, arxiv:0905.0079v1, May 2009 [14] D. J. C. MacKay and R. M. Neal, Near Shannon limit performance of low density partiy check codes, IEE Electron. Lett., vol. 32, no. 18, pp. 1645-1646, Aug. 1996.