Professional Documents
Culture Documents
Djordjevic
Advanced Optical
and Wireless
Communications
Systems
Advanced Optical and Wireless Communications
Systems
Ivan B. Djordjevic
Advanced Optical
and Wireless
Communications Systems
Ivan B. Djordjevic
Department of Electrical and Computer Engineering
University of Arizona
Tucson, AZ, USA
The purpose of this book is to introduce the reader to most advanced topics of
(i) wireless communications, (ii) free-space optical (FSO) communications, (iii)
indoor optical wireless (infrared, IR) communications, and (iv) fiber-optics com-
munications. So far these different types of communication systems have been
considered as separate disciplines. However, the fundamental concepts, such as
propagation principles, modulation formats, channel coding, diversity principles,
MIMO signal processing, multicarrier modulation, equalization, adaptive modula-
tion and coding, detection principles, and software-defined transmission, are com-
mon. The key idea of this book is to consider these different types of
communication systems in a unified fashion. The fundamental concepts, listed
above, are described first, followed by a detailed description of each particular
system. The book is self-contained and structured to provide straightforward
guidance to readers looking to capture fundamentals and gain theoretical and
practical knowledge about wireless communications, free-space optical communi-
cations, and fiber-optics communications, which can be readily applied in their
research and practical applications.
This book unifies wireless, free-space optical, IR, and fiber-optics communica-
tions. Unique features of the book include as follows:
• This book integrates wireless communications, free-space optical communica-
tions, indoor IR (optical wireless) communications, and fiber-optics communi-
cation technologies.
• This book does not require prior knowledge in communication systems.
• This book does not require any prerequisite material except basic concepts on
vector algebra at undergraduate level.
• This book offers in-depth exposition on propagation effects in different media
(free space, fiber optics, atmospheric turbulence channels), channel impairments
in these media, noise sources, key components and modules enabling wireless
and optical communications, channel capacity studies, advanced modulation and
multiplexing techniques, advanced detection and channel compensation
vii
viii Preface
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Historical Perspective of Optical and Wireless
Communication Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Wireless Communication Historical Perspective . . . . . 2
1.1.2 Optical Communication Historical Perspective . . . . . . 6
1.2 Optical Communication Systems and Networks Fundamentals . . . . 8
1.3 Wireless Communication Systems Fundamentals . . . . . . . . . . . 14
1.4 Organization of the Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.5 Concluding Remarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2 Propagation Effects in Optical and Wireless Communications
Channels, Noise Sources, and Channel Impairments . . . . . . . . . . . 31
2.1 Electromagnetic Field and Wave Equations . . . . . . . . . . . . . . . 32
2.1.1 Vector Derivatives (Grad, Div, and Curl)
in Orthogonal Curvilinear Coordinate System . . . . . . . 34
2.1.2 Vector Derivatives (Grad, Div, and Curl)
in Cylindrical Polar and Spherical
Coordinate Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.2 Propagation of Electromagnetic Waves . . . . . . . . . . . . . . . . . . 38
2.2.1 Propagation of Plane Waves . . . . . . . . . . . . . . . . . . . . 38
2.2.2 Vectorial Nature of the Light, Snell’s Law
of Refraction, Reflection Coefficients,
and Total Internal Reflection . . . . . . . . . . . . . . . . . . . 40
2.2.3 Electromagnetic Potentials and Electromagnetic
Waves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
2.2.4 Interference, Coherence, and Diffraction in Optics . . . . 70
2.2.5 Laser Beam Propagation over the Atmospheric
Turbulence Channels . . . . . . . . . . . . . . . . . . . . . . . . . 85
ix
x Contents
The earliest optical and wireless communication systems consisted of fire or smoke
signals, signaling lamps, and semaphore flags to convey a single piece of informa-
tion [1–4]. For example, a relatively sophisticated ancient communication system,
along the Great Wall of China, was composed of countless beacon towers [5].
In this ancient communication system, the number of lanterns or the color of smoke
was used as a means to inform the size of an invading enemy, which represents a
crude form of simultaneously digital communication and multilevel signaling. By
using the beacon towers, with the guards in each tower positioned at regular
distances along the Great Wall, a message could be transmitted from one end of
the Great Wall to the other, more than 7300 km, in slightly more than 1 h
[5]. Therefore, this ancient communication system has many similarities with
today’s relay or regeneration systems, in which the beacon towers can be consid-
ered as relays. Relay or regeneration systems were further studied by Claude
Chappe in 1792 to transmit coded messages optically over distance of 100 km
[1]. In next two subsections, we describe the evolution of both wireless communi-
cation systems [2, 6–10] and optical communication systems [1, 3–5, 11–15].
Toward these goals, the FCC recently approved the new spectrum for 5G,
including the 28, 37, and 39 GHz bands [18]. Key enabling technologies for 5G
include [19]:
(i) The employment of a wireless software-defined network (WSDN).
(ii) The use of network function virtualization (NFV).
(iii) Introduction of massive MIMO.
(iv) Much higher network density.
(v) The utilization of the millimeter wave spectrum.
(vi) The breakthroughs in big data and mobile cloud computing.
(vii) High-mobility device-to-device connections.
(viii) Better energy efficiency communications.
(ix) The introduction of new radio access technologies.
(x) Scalable Internet of Things techniques.
Regarding the wireless LANs (WLANs), the most relevant is the IEEE 802.11
standard family, representing the set of MAC and PHY standards implementing
WLAN computer communications in 0.9, 2.4, 3.6, 5, and 60 GHz frequency bands
[20–25]. The first wireless networking standard from this family was 802.11–1997;
however, the 802.11b was widely accepted one, which was followed by 802.11a,
802.11g, 802.11n, and 802.11ac. Other standards in this family (such as c–f, h, j)
represent the service amendments to the existing ones that are used to extend the
scope, or eventually the amendments represent the corrections to the previous
specification. The IEEE 802.11 g PHY standard is very similar to 801.11a, except
that it is related to the 2.4 GHz unlicensed ISM band (2.4–2.497 GHz).
To increase the aggregated data rates in IEEE 802.11n and 802.11 ac PHY
standards, the MIMO-OFDM concept, explained in Chap. 8, is used. Namely,
through MIMO concept, several independent data streams can be simultaneously
transmitted increasing the aggregate data rates. The IEEE 802.11n PHY standard is
applicable to both 2.4 and 5 GHz bands, while 802.11ac to 5 GHz band only. In
IEEE 802.11n standard, the available channel bandwidths are {20 MHz, 40 MHz},
while in 802.11ac the available channel bandwidths are {20, 40, 80, 160} MHz. The
highest data rate in 802.11ac standard, for 160 MHz bandwidth, is 780 Mb/s.
The WiMAX represents one of the most popular broadband wireless access
(BWA) technologies, aiming to provide high-speed bandwidth access for wireless
MANs [22, 26–28]. The WiMAX is based on IEEE 802.16 set of standards, in
particular IEEE 802.16-2004 (fixed-WiMAX) and IEEE 802.16e-2005 (mobile-
WiMAX) standards, which provide multiple PHY and MAC options. The WiMAX
represents the last-mile wireless broadband access alternative to the cable and DSL
services, and it is a direct competitor to the LTE Advanced standard. The IEEE
802.16e-2005 provides several improvements compared to the IEEE 802.16-2004
including [26–28]:
1. Providing support for mobility by enabling the soft and hard handover between
base stations.
6 1 Introduction
2. Introducing the concept of scalable OFDM (SOFDM) by scaling the FFT to the
channel bandwidth to ensure that the carrier spacing is constant across different
channel bandwidths, ranging from 1.25 MHz through 5 MHz and 10 MHz all
way to 20 MHz, and thus improving the spectral efficiency.
3. Introducing the advanced antenna diversity schemes and hybrid automatic repeat
request (HARQ).
4. Introducing the adaptive antenna systems (AAS) and MIMO signal processing.
5. Providing the denser sub-channelization and therefore improving the indoor
penetration.
6. Introducing downlink sub-channelization, in order to trade the coverage for
capacity or vice versa.
7. Introducing the LDPC coding to improve the error-correction strength.
8. Introducing an extra QoS class for VoIP applications.
semiconductor. The bit rate of these systems was limited to <100 Mb/s due to
dispersion in multimode fibers (MMFs). Single-mode fiber (SMF) was then incor-
porated. By 1987 the second generation systems were operating at 2.5 Gb/s at
1.3 μm with repeater spacing of 50 km.
The third generation systems were based on the use of 1.55 μm sources and
detectors and dominated in the first half of 1990s. At this wavelength the attenua-
tion of fused silica fiber is minimal. The deployment of these systems was delayed
however due to the relatively large dispersion at this wavelength. Two approaches
were proposed to solve the dispersion problem. The first approach was to develop
single-mode lasers, and the second was to develop dispersion-shifted fiber (DSF) at
1.55 μm. In 1990, 1.55 μm systems operating at 2.5 Gb/s were commercially
available and were capable of operating at 10 Gb/s for distances of 100 km [1, 3–
5, 11–13]. The best performance was achieved with DSFs in conjunction with
single-mode lasers. A drawback of these systems was the need for electronic
regeneration with repeaters typically spaced every 60–70 km. Coherent optical
detection methods were investigated in late 1980s and early 1990s to increase
receiver sensitivity. However, this approach was superceded by the development
of the optical amplifier.
The 3.5th generation systems are based on the use of optical amplifiers to
increase repeater spacing and wavelength-division multiplexing (WDM) to increase
the aggregate bit rate. Erbium-doped fiber amplifiers (EDFAs) were developed to
amplify signals without electronic regeneration during the 1980s [1, 3–5, 11–13]. In
1991 signals could be transmitted 14,300 km at 5 Gb/s without electronic regener-
ation [1, 3–5, 11–13]. The first transpacific commercial system went into operation
sending signals over 11,300 km at 5 Gb/s, and other systems are being deployed.
System capacity is increased through use of WDM. Multiple wavelengths can be
amplified with the same optical amplifier. In 1996 20 5 Gb/s signals were
transmitted over 9100 km providing a total bit rate of 100 Gb/s and a bandwidth-
length (B-L) product of 910 (Tb/s)-km. In these broadband systems, dispersion
becomes an important issue to be addressed.
In the 3.75th generation systems, the effort is primarily concerned with the fiber
dispersion problem. Optical amplifiers solve the loss problem but increase the
dispersion problem since dispersion effects accumulate over multiple amplification
stages. An ultimate solution is based on the novel concept of optical solitons [1, 31,
32]. These are pulses that preserve their shape during propagation in a loss less fiber
by counteracting the effect of dispersion through fiber nonlinearity. Experiments
using stimulated Raman scattering as the nonlinearity to compensate for both loss
and dispersion were effective in transmitting signals over 4000 km [1, 31,
32]. EDFAs were first used to amplify solitons in 1989 [1, 31, 32]. By 1994 a
demonstration of soliton transmission over 9400 km was performed at a bit rate of
70 Gb/s by multiplexing seven 10 Gb/s channels [1, 31, 32]. In parallel, dispersion
compensating fibers (DCFs) were invented to deal with chromatic dispersion, and
various dispersion maps were proposed [1, 31, 32]. The WDM channel count
increased to maximum 128, with data rates per single wavelength ranging from
2.5 Gb/s to 10 Gb/s. The operating wavelength region ranges from 1530 nm to
8 1 Introduction
A generic WDM optical network, which can be used to identify the key optical
components, concepts, and system parameters is provided in Fig. 1.1. The end-to-
end optical transmission involves both electrical and optical signal paths. To
1.2 Optical Communication Systems and Networks Fundamentals 9
demultiplexer
(OA)
Wavelength
Wavelength
Client 2 SMF Data 2
multiplexer
Tx 2 Rx 2
data ROADM OA OA
…
…
…
…
Client N Data N
Tx N Rx N
data
Fig. 1.1 A generic WDM optical network identifying key optical components, concepts, and
parameters
perform conversion from electrical to optical domain, the optical transmitters are
used, while to perform conversion in the opposite direction (optical-to-electrical
conversion), the optical receivers are used. The single-mode fiber (SMF) serves as a
foundation of an optical transmission system because the optical fiber is used as
medium to transport the optical signals from the source to destination. The optical
fibers attenuate the signal during transmission, and someone has to use optical
amplifiers, such as EDFAs, Raman amplifiers, or parametric amplifiers, to restore
the signal level. Unfortunately, the amplification process is accompanied with the
noise addition. For better exploitation of enormous bandwidth of SMF, the WDM
concept is introduced, which corresponds to the scheme with multiple optical
carriers at different wavelengths that are modulated by using independent electrical
bit streams, as shown in Fig. 1.1, and then transmitted over the same SMF. During
transmission of WDM signals, occasionally several wavelengths have to be added/
dropped, which is performed by the reconfigurable optical add-drop multiplexer
(ROADM), as shown in Fig. 1.1. The optical networks require the switching of
information among different fibers, which is performed by the optical cross-connect
(OXS). To combine several distinct wavelength channels into composite channel,
the wavelength multiplexers are used. On the other hand, to split the composite
WDM channel into distinct wavelength channels, the wavelength demultiplexers
are used. To impose the information signal and perform electro-optical conversion,
the optical modulators are used. The optical modulators are commonly used in
combination with semiconductor lasers.
The optical transmission systems can be classified according to different criteria.
When bit rate is used as classification criteria, the optical transmission systems can
be classified as low speed (tens of Mb/s), medium speed (hundreds Mb/s), high
speed (Gb/s), and ultra-high speed (tens of Gb/s). From application perspective
point of view, the systems can be either power budget (loss) limited or bandwidth
(transmission speed) limited. If transmission length is used for classification, we
can identify very short reach (hundreds of meters), short reach (from several
kilometers to several tens of km), long reach (hundreds of kilometers), and ultra-
long reach (thousands of kilometers) optical transmission systems.
To provide a global picture, we describe a typical optical network shown in
Fig. 1.2. We can identify three ellipses representing the core network, the edge
10 1 Introduction
Access network
EN
Edge node Core node
End
(EN) (CN)
node
CN EN
EN
EN
ENEN CN
EN CN
EN
Core network
EN
Edge network
network, and the access network [3, 4]. The long-haul core network interconnects
big cities, major communications hubs, and even different continents by means of
submarine transmission systems. The core networks are often called the wide area
networks (WANs) or interchange carrier networks. The edge optical networks are
deployed within smaller geographical areas and are commonly recognized as
metropolitan area networks (MANs) or local exchange carrier networks. The access
networks represent peripheral part of optical network and provide the last-mile
access or the bandwidth distribution to the individual end users.
The ultimate goal of an optical signal transmission system is usually defined as
achieving desired bit error rate (BER) performance between two end users or
between two intermediate nodes in network reliably and at affordable cost. In
order to achieve so, an optical transmission system needs to be properly designed,
which includes the management of key optical communication systems engineering
parameters. These parameters can be related to power, time, and wavelength or be
interrelated. The parameters related only to power are power level, fiber loss,
insertion loss, and extinction ratio (the ratio of powers corresponding to bit “1”
and bit “0”). The parameters related only to time are jitter, first-order PMD, and
bit/data rate. The parameters related to wavelength include optical bandwidth and
wavelength stability. The parameters, signal impairments, and additive/multiplica-
tive noise sources related to both power and wavelength are optical amplifier gain,
optical noise (such as amplified spontaneous emission (ASE) noise), different
crosstalk effects, four-wave mixing (FWM), and stimulated Raman scattering
(SRS). The parameters related to time and wavelength are laser chirp, second-
order PMD, and chromatic dispersion. The parameters related to power and time are
BER, modulation format, polarization-dependent loss (PDL), and quantum noise.
Finally, the channel impairments related to time, power, and wavelength simulta-
neously are self-phase modulation (SPM), cross-phase modulation (CPM), and
1.2 Optical Communication Systems and Networks Fundamentals 11
stimulated Brillouin scattering (SBS). Any detection scenario must include elec-
tronic noise, such as thermal noise, which is associated with receiver design. These
different parameters, noise sources, and channel impairments are subject of inves-
tigation in Chap. 2.
Different high-speed optical transmission enabling technologies can be related
to the usage of novel/better devices, such as Raman and parametric amplifiers, PMD
and chromatic dispersion compensators, and modulators, or be related to the novel
methods, such as advanced modulation formats (various multilevel modulation
schemes with both direct and coherent optical detections and OFDM), forward
error correction (FEC), coded modulation, constrained (modulation/line) coding,
advanced detection schemes including maximum likelihood sequence detection/
estimation (MLSD/E) and maximum a posteriori probability (MAP) detection
(BCJR algorithm-based equalizers), and various multiplexing schemes including
polarization multiplexing, optical time-division multiplexing (OTDM), subcarrier
multiplexing (SCM), code-division multiplexing (CDM), OFDM, and spatial-
division multiplexing. These various enabling technologies will be described in
incoming chapters of the book.
An important concept to be introduced here is related to the so-called lightwave
path, which can be defined as the trace that optical signal passes between the source
and destination without experiencing any opto-electrical-opto (O-E-O) conversion
[3, 4]. Generally speaking, the lightwave paths may differ in lengths and in the
information capacity that is carried along and can traverse though different portions
of an optical network. The lightwave path can be considered as bandwidth wrapper
for lower-speed transmission channels, which form virtual circuit services
[3, 4]. The time-division multiplexing (TDM) technique is applied to aggregate
the bandwidth of virtual circuits before it is wrapped in the lightwave path. TDM of
virtual circuits can be either fixed (each circuit receives a guaranteed amount of the
bandwidth – a bandwidth pipe) or statistical (in packet switching, the data content is
divided into data packets, which can be handled independently). The fixed
multiplexing of virtual circuits is defined by SONET/SDH standards. Bit rates of
different bandwidth channels, for both synchronous and asynchronous transmis-
sion, are given in Table 1.1 based on [3, 4] (and references therein).
Optical fiber is the key ingredient of an optical transmission system because it
has much wider available bandwidth, lower signal attenuation, and smaller signal
distortions compared to any other wired or free-space physical media. The total
bandwidth is approximately 400 nm, or around 50 THz, when related to the
wavelength region with fiber attenuation being bellow 0.5 dB/km. The usable
optical bandwidth is commonly split into several wavelength bands, as summarized
in Table 1.2 based on refs [3, 4] and [13]. The bands around the minimum
attenuation point, usually referred to as C and L bands, are the most suitable for
high channel count DWDM transmission. The wavelength region around 1300 nm
is less favorable for optical signal transmission because signal attenuation is higher
than attenuation in S, C, and L bands. On the other hand, it is quite suitable for
CATV signals, and the course-WDM (CWDM) technique is usually employed in
this region.
12 1 Introduction
Table 1.1 Bit rates for different synchronous/asynchronous optical communication systems (both
introduced and envisioned)
TDM/synchronous channels Bit rate Data/asynchronous channels Bit rate
DS-1 1.544 Mb/s 10-BaseT Ethernet 10 Mb/s
E-1 2.048 Mb/s 100-BaseT Ethernet 100 Mb/s
OC-1 51.84 Mb/s FDDI 100 Mb/s
OC-3 , STM-1 155.52 Mb/s ESCON 200 Mb/s
OC-12 , STM-4 602.08 Mb/s Fiber Channel-I 200 Mb/s
Fiber Channel-II 400 Mb/s
Fiber Channel-III 800 Mb/s
Fiber Channel IV 4 Gb/s
OC-48 , STM-16 2.488 Gb/s 1 Gb Ethernet 1 Gb/s
OC-192 , STM-64 9.953 Gb/s 10 Gb Ethernet 10 Gb/s
OC-768 , STM-256 39.813 Gb/s 40 Gb Ethernet 40 Gb/s
100 Gb Ethernet 107–125 Gb/s
400 Gb Ethernet 428–500 Gb/s
1 Tb Ethernet 1.07–1.25 Tb/s
4 Tb/10 Tb Ethernet 4 Tb/s /
10 Tb/s
Table 1.2 The wavelength Wavelength band Descriptor Wavelength range (nm)
bands for fiber-optics
O-band Original 1260–1360
communications
E-band Extended 1360–1460
S-band Short 1450–1530
C-band Conventional 1530–1565
L-band Long 1565–1625
U-band Ultra-long 1625–1675
The key optical components, which will be described in the next chapter, can be
classified as follows:
(i) Semiconductor light sources including light-emitting diodes (LEDs) and
semiconductor lasers: Fabry-Perot (FP), distributed feedback (DFB), distrib-
uted Bragg reflector (DBR), vertical-cavity surface-emitting laser (VCSEL),
and tunable lasers (external cavity laser, multilaser chip, three-section tunable
laser).
(ii) Optical modulators including both direct optical modulators and external
modulators: Mach-Zehnder modulator (MZM), electro-absorption modulator,
and I/Q modulator.
(iii) Optical fibers (MMFs and SMFs).
(iv) Optical amplifiers such as semiconductor optical amplifier (SOA), EDFA,
Raman amplifiers, and parametric amplifiers.
(v) Photodiodes including PIN, avalanche photodiodes (APDs), and metal-semi-
conductor-metal (MSM) photodetectors.
1.2 Optical Communication Systems and Networks Fundamentals 13
A typical, generic, point-to-point single input single output (SISO) wireless com-
munication system, used in various wireless applications, is provided in Fig. 1.3.
The binary data sequence is first channel encoded [see Fig. 1.3a], and the encoder
output is written into interleaver. Typical channel codes include convolutional
codes, concatenated convolutional and RS codes, turbo codes, or LDPC codes
[3, 8, 52–54]. For turbo coding s-random interleaver can be used, while for
LDPC coding properly designed block interleaver can be used [55]. For block
interleaver, log2(M ), where M is signal constellation size, codewords are written
in row-wise fashion into interleaver. Notice that arbitrary two-dimensional (2-D)
constellation can be used. Then log2(M ) bits are taken into from the interleaver and
used to select a point from 2-D constellation such as QAM, by applying appropriate
mapping rule. After digital-to-analog conversion (DAC), the corresponding RF
signal is up-converted, amplified, and transmitted by using a transmit antenna.
Tx antenna
Data modulation section
Binary Encoding & Bit QAM I/Q
DAC RF Tx
input data puncturing interleaver mapper modulator
(a)
Rx
antenna cos(wct)
AGC
Pre-select
filter ADC
LPF
QAM Output
Deinterleaver Decoding
de-mapping data
LPF ADC
LNA
VGA
sin(wct)
(b)
Fig. 1.3 A typical, generic, wireless communication system. DAC digital-to-analog converter,
LNA low-noise amplifier, LPF low-pass filter, ADC analog-to-digital converter, AGC automatic
gain control, VGA variable-gain amplifier
1.3 Wireless Communication Systems Fundamentals 15
On receiver side, shown in Fig. 1.3b, the signal from receive antenna is
pre-filtered to select the desired frequency band, followed by low-noise amplifica-
tion, down-conversion, and analog-to-digital conversion (ADC). The automatic
gain control (AGC) ensures that the signal level at the output of variable-gain
amplifier (VGA) is constant. After that the QAM demapping takes place, followed
by de-interleaver and channel decoder. The purpose of interleaving process is to
spread the burst errors due to fading effects so that the channel code deals only with
random errors. When soft-decision decoding is employed, such as in either turbo or
LDPC coding, the QAM demapping block is in fact the a posteriori probability
(APP) demapper, where symbol log-likelihood ratios (LLRs) calculated, followed
by bit LLR calculation that get passed to the soft-decision decoder, being either
turbo decoder or LDPC decoder [3, 8, 52–55].
In wireless communications, multiple users can share the same spectrum, which
is commonly referred to as multiaccess communications. Multiaccess communica-
tions suffer from multiaccess interference, which can be both intentional and
unintentional, such as crosstalk or multipath fading. Moreover, the system design,
such as in code-division multiple access (CDMA), can introduce the crosstalk
among the users. The performances of multiaccess communication are also depen-
dent on the fact if the multiaccess communication link is a downlink channel (one
transmitter to many receivers scenario) or an uplink channel (many transmitters to
one receiver scenario), as illustrated in Fig. 1.4. The downlink channel is also
known as the forward or broadcast channel as well as point-to-multipoint channel,
and all signals are typically synchronous as they originate from the same transmit-
ter. In contrast, in the uplink channel, also known as multiaccess channel or reverse
link as well as multipoint-to-point channel, the signals are typically asynchronous
as they originate from different users at different locations. In frequency-division
parameter known as the coherence bandwidth, so that each subchannel will expe-
rience the flat fading. This is an efficient way to deal with frequency-selective
fading effects. The key idea behind the diversity-combining techniques is to use
several independent realizations of that same transmitted signal to improve toler-
ance to channel impairments. The independent signal copies transmitted over
different paths or degrees of freedom will have a low probability of experiencing
the same level of channel distortion. In wireless communications, the probability
that all independent fading paths are in deep fade will be low. The independent
realizations of the same signal will be properly combined to improve the overall
reliability of transmission. In MIMO systems, multiple transmitters and receivers
can exploit the knowledge about the channel to determine the rank of so-called
channel matrix H, which is related to the number of independent data streams that
can be simultaneously transmitted. The basic concept of wireless MIMO commu-
nication is illustrated in Fig. 1.5, where the number of transmit antennas is denoted
as MTx and the number of receive antennas is denoted as MRx.
The 2-D symbol transmitted on the m–th transmit antennas is denoted by xm
(m ¼ 1, 2,. . ., MTx), while the received symbol on the n-th receive antenna is
denoted as yn. The channel coefficient relating the received symbol on n-th receive
antenna and transmitted symbol on the m-th transmit antenna is denoted as hmn.
With MIMO signal processing, we can improve the signal-to-noise ratio (SNR) of
SISO system, improve the symbol-error rate slope (vs. SNR), and improve the
overall data rate multiple times. In adaptive modulation techniques, we adapt the
transmitter to time-varying wireless channel conditions to enable reliable and high
spectral-efficient transmission. Various wireless communication system’s parame-
ters can be adapted including the data rate, power, code rate, and error probability.
In adaptive coding, we adapt error-correction strength (code rate) depending on
time-varying wireless channel conditions. When channel conditions are favorable,
hMRx 2 hMRx 1
…
Base
station
Cells
the weaker (higher rate) channel code is used. On the other hand, when channel
conditions deteriorate, the stronger (lower code rate) channel code is used. In
adaptive modulation and coding (AMC), the channel code and modulation formats
are simultaneously adapted.
Before concluding this section, we briefly describe the cellular concept, which is
illustrated in Fig. 1.6. A cellular network consists of large number of mobile users
(subscribers) and fixed number of base stations, arranged in particular way to
provide the coverage to the mobile users. The area covered by a particular base
station (BS) is called the cell. For better utilization of resources, the cells are of
hexagonal shape. However, in practice the base station is typically arranged
irregular, which is dictated by the configuration of terrane, location of building,
and so on. The key idea of cellular concept is to reuse the channels, to improve the
efficiency. The cells denoted by the same color in Fig. 1.6 employ the same
frequency in FDMA, the same time slot in TDMA, or the same signature sequence
(code) in CDMA. However, the channel reuse introduces the interference known as
intercell interference.
The spatial separation of the cells that use the same channel, known as the reuse
distance, should be as small as possible, but should not exceed the maximum
tolerable intercell interference threshold. The different base stations, in a given
geographical area, are connected to the mobile telephone switching office (MTSO),
also known as the mobile switching center (MSC). Base stations and MTSOs
coordinate handoff (of a user from one BS to the other) and control functions.
Shrinking cell size increases the capacity, but on the other hand, it increases the
networking burden. The MTSO is connected by the high-speed link to the public
switched telephone network (PSTN), typically by SMF, coaxial cable, or micro-
wave link. The MTSO can provide the Internet access or route the voice calls. The
incoming call from a mobile user is connected to the base station, which is on the
other hand connected to the MTSO. The MTSO is further connected to the wired
network. The destination could be an ordinary wire telephone or another mobile
user. If another mobile user, the corresponding MTSO will be identified, and in
MTSO, the base station through which destination mobile user is supposed to be
1.4 Organization of the Book 19
connected to will be identified as well. Finally, the call from one mobile use to
another remote mobile user will be established.
Other wires communication systems include satellite systems; wireless broad-
band access systems such as WiMAX, providing fixed and fully mobile internet
access; paging systems; radio broadcast systems (AM radio, FM radio, analog TV,
digital audio broadcasting, digital video broadcasting); cordless phone systems;
Bluetooth; wireless LAN (WiFi); and ultra-wideband (UWB) radio, to mention
few, with the most important systems to be described in incoming chapters.
detailed description of laser beam propagation effects over the atmospheric turbu-
lence channels, we describe the simulation models suitable to study atmospheric
turbulence effects. In the section devoted to wireless communication channel
effects, we describe path loss, shadowing, and multipath fading propagation effects.
Both ray theory-based and statistical multipath wireless communication channel
models are described. The focus is then moved to signal propagation effects in
optical fibers including fiber attenuation and insertion loss, chromatic dispersion
effects, PMD effects, fiber nonlinearities. Regarding the fiber nonlinearities, both
Kerr nonlinear effects (self-phase modulation, cross-phase modulation) and
nonlinear scattering effects, such as stimulated Raman scattering, are described.
The generalized nonlinear Schr€odinger equation is then introduced to study the
propagation effects over both single-mode and few-mode fibers, as well as the
corresponding split-step Fourier algorithms to solve it. The following noise sources
related to optical communication are further described: mode partition noise,
relative intensity noise, laser phase noise, modal noise, thermal noise, spontaneous
emission noise, noise beating components, quantum shot noise, dark current noise,
and crosstalk. Finally, in section devoted to indoor optical wireless communica-
tions, the channel models for both infrared and visible light communications are
described.
In Chapter 3, basic components, modules, and subsystems relevant in both
optical and wireless communications are described. The first half of the chapter is
related to key components, modules, and subsystems for optical communications.
After describing optical communication basic, focus is changed to optical trans-
mitters. The following classes of lasers are introduced: Fabry-Perot, distributed
feedback (DFB), and distributed Bragg reflector (DBR) lasers. Regarding the
external modulators both Mach-Zehnder modulator and electro-absorption modu-
lator are described. Regarding the external modulator for multilevel modulation
schemes, phase modulator, I/Q modulator, and polar modulator are described. In
subsection on optical receivers, after the photodetection principle, the p-i-n photo-
diode, avalanche photodiode (APD), and metal-semiconductor-metal (MSM) pho-
todetectors are briefly described. In the same subsection, both optical receiver high-
impedance front end and trans-impedance front end are described. In section on
optical fibers, both single-mode fiber (SMF) and multimode fiber (MMF) are
introduced. In subsection on optical amplifiers, after describing optical amplifica-
tion principles, the following classes of optical amplifiers are described: semicon-
ductor optical amplifier (SOA), Raman amplifier, and Erbium-doped fiber amplifier
(EDFA). In subsection on optical processing components and modules, the follow-
ing components/modules are described: optical couplers, optical filters, and WDM
multiplexers/demultiplexers. After that, the principles of coherent optical detection
are introduced, followed by the description of optical hybrids. In subsection on
coherent optical balanced detectors, both homodyne and heterodyne optical bal-
anced detectors for both binary and multilevel (QAM, PSK, APSK) modulations
are described.
In the second half of Chap. 3, basic components and modules of relevance to
modern wireless communications are described. First, the DSP basics, including
1.4 Organization of the Book 21
various discrete-time realizations are provided. Then the direct digital synthesizer
(DDS), relevant in discrete-time (DT) wireless communication systems, is
described. In subsection on multirate DSP and resampling, various upsampling,
downsampling, and resampling schemes/modules are described. In the same sub-
section, the polyphase decomposition of the system (transfer) function is introduced
and employed in resampling. In subsection on antenna array antennas, the linear
array antennas are described. Finally, in subsection on automatic gain control
(AGC), the AGC schemes operating in passband and baseband are described.
Chapter 4 is devoted to both wireless channel and optical channel capacities. The
chapter starts with definitions of mutual information and channel capacity, followed
by the information capacity theorem. We discuss the channel capacity of discrete
memoryless channels, continuous channels, and channels with memory. Regarding
the wireless channels, we describe how to calculate the channel capacity of flat-
fading and frequency-selective channels. We also discuss different optimum and
suboptimum strategies to achieve channel capacity including the water-filling
method, multiplexed coding and decoding, channel inversion, and truncated chan-
nel inversion. We also study different strategies for channel capacity calculation
depending on what is known about the channel state information. Further, we
explain how to model the channel with memory and describe McMillan-Khinchin
model for channel capacity evaluation. We then describe how the forward recursion
of the BCJR algorithm can be used to evaluate the information capacity of channels
with memory. The next topic is related to the evaluation of the information capacity
of fiber-optics communication channels with coherent optical detection. Finally, we
describe how to evaluate the capacity of hybrid free-space optical (FSO)-RF
channels, in which FSO and RF subsystems cooperate to compensate for shortcom-
ing of each other.
Chapter 5 is devoted to advanced modulation and multiplexing techniques
suitable for both wireless and optical communication systems. The chapter starts
with signal space theory concepts applied to wireless communication systems.
After the geometric representations of signals, we describe various
multidimensional modulators and demodulators suitable for wireless communica-
tion applications, in particular the Euclidean distance, correlation, and matched
filter-based detectors, followed by the description of frequency-shift keying (FSK).
Both continuous-time (CT) and discrete-time (DT) implementations for pulse
amplitude modulation schemes, suitable for wireless communications, are
described as well. After that the focus is moved to multilevel schemes suitable
for both wireless and optical communication applications, including M-ary PSK,
star-QAM, square-QAM, and cross-QAM. Regarding the optical communications,
the transmitter for M-ary PSK, star-QAM, and square/cross-QAM are described in
detail. The next topic in the chapter is related to multicarrier modulation, including
description multicarrier systems with both non-overlapping and overlapping
subcarriers as well introduction of various approaches to deal with fading effects
at subcarrier level. The concept of OFDM is also introduced, however, details are
provided in Chap. 7. The MIMO fundamentals are then provided, including the
description of key differences with respect to diversity scheme, as well as the
22 1 Introduction
introduction of array, diversity, and multiplexing gains. The parallel MIMO chan-
nel decomposition is briefly described. The details on MIMO signal processing are
postponed for Chap. 8. In section on polarization-division multiplexing (PDM) and
four-dimensional (4-D) signaling, we describe key differences between PDM and
4-D signaling and describe how both types of schemes can be implemented in both
wireless and optical communications. The focused is the moved to the spatial-
division multiplexing (SDM) and multidimensional signaling. We describe how
SDM can be applied in wireless communications first. Then we describe how
various degrees of freedom including amplitude, phase, frequency, polarization
states, and spatial modes can be used to convey the information in optical domain.
In the same sections, the SDM concepts for fiber-optics communications are
described as well. The section concludes with SDM and multidimensional signaling
concepts applied to free-space optical (FSO) communications. The next topic is
devoted to the signal constellation design, including iterative polar modulation
(IPM), signal constellation design for circular symmetric optical channels,
energy-efficient signal constellation design, and optimum signal constellation
design (OSCD). The final section of the chapter is devoted to the nonuniform
signaling, in which different signal constellation points are transmitted with differ-
ent probabilities.
Chapter 6 is related to advanced detection and channel impairments compensa-
tion techniques applicable to both wireless and optical communication systems. To
better understand the principles behind advanced detection and channel impair-
ments compensation, we start the chapter with fundamentals of detection and
estimation theory including optimum receiver design in symbol error probability
sense and symbol error probability derivations. In section on wireless communica-
tion systems performance, we describe different scenarios including outage prob-
ability, average error probability, and combined outage-average error probability
scenarios. We also describe the moment generating function-based approach to
average error probability calculation. We also describe how to evaluate perfor-
mance in the presence of Doppler spread and fading effects. In section on channel
equalization techniques, after short introduction, we first describe how zero-forcing
equalizers can be used to compensate for ISI, chromatic dispersion, and polariza-
tion-mode dispersion (PMD) in fiber-optics communication, ISI and multipath
fading effects in wireless communications, and ISI and multipath effects in indoor
optical wireless communications. After that we describe the optimum linear equal-
izer design in the minimum mean-square error sense as well as Wiener filtering
concepts. The most relevant post-compensation techniques, applicable to both
wireless and optical communications, are described next including feed-forward
equalizer, decision-feedback equalizer, adaptive equalizer, blind equalizers, and
maximum likelihood sequence detector (MLSD) also known as Viterbi equalizer.
The turbo equalization technique is postponed for Chap. 9. The next section is
devoted to the relevant synchronization techniques. In section on adaptive modu-
lation techniques, we describe how to adapt the transmitter to time-varying wire-
less/optical channel conditions to enable reliable and high spectral-efficient
transmission. Various scenarios are described including data rate, power, code
1.4 Organization of the Book 23
The historical perspective of both wireless and optical communication systems has
been described in Sect. 1.1, together with various generations, from early beginning
until today. After that, in Sect. 1.2, the fundamentals of optical systems and
networks have been described, including WDM network architecture, typical
optical networking architecture, bit rates for synchronous/asynchronous optical
communication systems, and wavelength regions for fiber-optics communications.
In the same section, various multiplexing schemes have been described such as
TDM, WDM, FDM, SCM, CDM, PDM, and SDM. The main noise sources and
optical channel impairments have been described, in particular for fiber-optics
communications. After that the key optical devises and modules have been identi-
fied and briefly described. In section related to wireless communications funda-
mentals, Sect. 1.3, we have described a typical wireless communication point-to-
point link and identified key devices/subsystems with brief description of opera-
tional principles. The multiaccess communications have been then described with
key problems being identified. Further, various effects affecting the received power
have been described as well including path loss, shadowing, and multipath fading.
The various approaches to deal with multipath fading have been then introduced
including OFDM, diversity, MIMO, equalization, and adaptive modulation and
coding. The MIMO operation principles have been briefly described next. Finally,
the cellular concept has been introduced. In section on organization of the book,
Sect. 1.4, the detailed description of chapters is provided.
References
41. ITU-T Rec. G. 681: Functional characteristics of interoffice and long-haul line systems using
optical amplifiers, including optical multiplexing, ITU-T (10/96), 1996
42. ITU-T, Rec G.704: Synchronous frame structures used at 1544, 6312, 2048, 8448 and 44 736
kbit/s hierarchical levels, ITU-T (10/98), 1998
43. ITU-T, Rec G.7041/Y.1303: Generic framing procedure (GFP), ITU-T (12/01), 2001
44. ITU-T, Rec G.7042/Y.1305: Link capacity adjustment scheme (LCAS) for virtual
concatenated signals, ITU-T (11/01), 2001
45. ITU-T, Rec G.694.2: Spectral grids for WDM applications: CWDM wavelength grid, ITU-T
(06/02), 2002
46. ITU-T, Rec G.8110/Y.1370.1: Architecture of transport MPLS layer network, ITU-T (11/06),
2006
47. ITU-T, Rec. G.798: Characteristics of Optical Transport Network Hierarchy Functional
Blocks”, ITU-T (02/01), 2009
48. Gringery S, Basch EB, Xia TJ (2012) Technical considerations for supporting bit rates beyond
100 Gb/s. IEEE Commun Magazine 50(2):21–30
49. Djordjevic IB, Shieh W, Liu X, Nazarathy M (2014) Advanced Digital Signal Processing and
Coding for Multi-Tb/s Optical Transport. IEEE Sig. Proc. Mag 31(2):15–142. From the Guest
Editors
50. Djordjevic IB, Cvijetic M, Lin C (2014) Multidimensional signaling and coding enabling
multi-Tb/s optical transport and networking. IEEE Sig Proc Mag 31(2):104–117
51. Djordjevic IB (2016) On advanced FEC and coded modulation for ultra-high-speed optical
transmission. IEEE Commun Surv Tut 18(3):1920–1951
52. Lin S, Costello DJ (2004) Error control coding: fundamentals and applications, 2nd edn.
Pearson Prentice Hall, Upper Saddle River
53. Heegard C, Wicker SB (1999) Turbo coding. Springer Science+Business Media, New York
54. Ryan WE, Lin S (2009) Channel codes: classical and modern. Cambridge University Press,
Cambridge, MA
55. Zou D, Lin C, Djordjevic IB (2017) FPGA-based LDPC-coded APSK for optical communi-
cation systems. Opt Express 25(4):3133–3142
56. Glisic S, Vucetic B (1997) Spread spectrum CDMA systems for wireless communications.
Artech House Inc., Boston
57. Verdú S (1998) Multiuser detection. Cambridge University Press, Cambridge, MA
58. Van Nee R, Prasad R (2000) OFDM wireless multimedia communications. Artech House,
Boston
59. Prasad R (2004) OFDM for wireless communications systems. Artech House, Boston
60. Biglieri E, Calderbank R, Constantinides A, Goldsmith A, Paulraj A, Poor HV (2007) MIMO
wireless communications. Cambridge University Press, Cambridge, MA
61. Hampton JR (2014) Introduction to MIMO communications. Cambridge University Press,
Cambridge, MA
62. Pulraj A, Nabar R, Gore D (2003) Introduction to space-time wireless communications.
Cambridge University Press, Cambridge, MA
Chapter 2
Propagation Effects in Optical and Wireless
Communications Channels, Noise Sources,
and Channel Impairments
Abstract This chapter discusses the propagation effects, noise sources, and chan-
nel impairments for wireless communications, free-space optical communications,
and fiber-optics communications. The key idea of the chapter is to derive the wave
equation for a given medium from Maxwell’s equation and determine its solution
subject to corresponding boundary conditions. After the introduction of the vector
derivatives in orthogonal curvilinear, cylindrical polar, and spherical coordinate
systems, we study vectorial nature of the light, derive Snell’s law of refraction from
Maxwell’s equations, study total internal reflection, and explain the light confine-
ment in step-index optical fibers. We also describe how arbitrary polarization state
can be generated by employing three basic polarizing elements, namely, polarizer,
phase shifter (retarder), and rotator. We then introduce the electromagnetic poten-
tials to simplify the study of generation of electromagnetic waves, followed by
antenna theory basics. We then discuss interference, coherence, and diffraction in
optics. After that the detailed description of laser beam propagation effects over the
atmospheric turbulence channels is provided, including the description of simula-
tion models. In the section on wireless communication channel effects, we study
path loss, shadowing, and multipath fading propagation effects. Both ray theory-
based and statistical multipath wireless communication channel models are
described. We then move to signal propagation effects in optical fibers and describe
(1) fiber attenuation and insertion loss, (2) chromatic dispersion effects,
(3) polarization-mode dispersion effects, and (4) fiber nonlinearities. Regarding
the fiber nonlinearities, both Kerr nonlinear effects (self-phase modulation, cross-
phase modulation) and nonlinear scattering effects, such as stimulated Raman
scattering, are described. The generalized nonlinear Schr€odinger equation is then
described for both single-mode and few-mode fibers as well as the corresponding
split-step Fourier algorithms to solve it. The following noise sources related to
optical communication are described: mode partition noise, relative intensity noise,
laser phase noise, modal noise, thermal noise, spontaneous emission noise, noise
beating components, quantum shot noise, dark current noise, and cross talk. Finally,
in section on indoor optical wireless communications, the channel models for both
infrared and visible light communications are described.
Maxwell’s equations are used to describe the change of electric field E and
magnetic field H in space and time [1–5]:
∂B
∇E¼ ð2:1Þ
∂t
∂D
∇H¼Jþ ð2:2Þ
∂t
∇D¼ρ ð2:3Þ
∇B¼0 ð2:4Þ
where B denotes the magnetic flux density, D is the electric flux density, and J ¼ σE
is the current density. The flux densities are related to the field vectors by consti-
tutive relations:
D ¼ ε0 E þ P ð2:5Þ
B ¼ μ 0 ð H þ MÞ ð2:6Þ
ð
1
0 0
0
Pðr; tÞ¼ε0 χ r; t t E r; t dt , ð2:7Þ
1
∂H
∇ E ¼ μ0 : ð2:8Þ
∂t
∂E
∇ H ¼ ε0 : ð2:9Þ
∂t
∇ E ¼ 0: ð2:10Þ
2.1 Electromagnetic Field and Wave Equations 33
∇ H ¼ 0: ð2:11Þ
∇ ð∇ Þ ¼ ∇ð∇ Þ ∇2 ð Þ, ð2:14Þ
and the divergence conditions (2.10) and (2.11), we obtain the wave equations:
2 2
1 ∂ E 1 ∂ H
∇2 E ¼ , ∇2 H ¼ , ð2:15Þ
c2 ∂t2 c2 ∂t2
where
is the speed of light. Therefore, the changes of electric and magnetic fields in
vacuum propagate with a speed equal to the speed of light.
Maxwell’s equations for electric and magnetic fields in nonconducting isotropic
media are the same as those for vacuum, except that constants ε0 and μ0 for vacuum
need to be replaced by the corresponding constants of medium ε and μ. The same
observation is applicable to the wave equations. As a consequence, the speed of
propagation v of electromagnetic fields in a medium is determined by:
v ¼ ðεμÞ1=2 : ð2:17Þ
The medium constants ε and μ are related to the vacuum constants ε0 and μ0 as
follows:
ε ¼ ε0 εr , μ ¼ μ0 μm , ð2:18Þ
1=2
c εμ ε0 εr μ0 μm 1=2
n¼ ¼ ¼ ¼ ðεr μm Þ1=2 : ð2:19Þ
v ε0 μ 0 ε0 μ 0
Transparent optical media are typically nonmagnetic (μm ¼ 1) so that the index of
refraction is related to the dielectric constant by n ¼ (εr)1/2. As an illustration, the
indices of refraction of the yellow light in the air [at 101.325 kPa (1 atm)] and water
are 1.0002926 and 1.33, respectively. The index of refraction in the glass ranges
from 1.5 to 1.7, depending on the type of glass.
∂r ∂r ∂r
dr ¼ du þ dv þ dw ¼ hu duu^ þ hv dv^ ^
v þ hw dww, ð2:20Þ
∂u ∂v ∂w
where Lamé coefficients hu, hv, and hw are defined, respectively, as:
rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ffi rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
∂r ∂x
2 ∂y2 ∂z
2 ∂r ∂x
2 ∂y2 ∂z
2
hu ¼ ¼ þ þ , h ¼ ¼ þ ∂v þ ∂v ,
∂u ∂u ∂u ∂u v ∂v ∂v
rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
∂r ∂x
2 ∂y 2 ∂z
2
hw ¼ ¼ ∂w
þ ∂w þ ∂w ,
∂w
ð2:21Þ
and u;^ v^; w^ are unit length vectors along coordinate axes in curvilinear coordinate
system. The line element can now be defined as:
pffiffiffiffiffiffiffiffiffiffiffiffiffi qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
dl ¼ dr dr ¼ ðhu duÞ2 þ ðhv dvÞ2 þ ðhw dwÞ2 : ð2:22Þ
2.1 Electromagnetic Field and Wave Equations 35
dSu ¼ ðhv dvÞðhw dwÞ ¼ hv hw dvdw, dSv ¼ ðhu duÞðhw dwÞ ¼ hu hw dudw,
ð2:24Þ
dSw ¼ ðhu duÞðhv dvÞ ¼ hu hv dudv:
1 ∂ 1 ∂ 1 ∂
∇¼ u^ þ v^ þ ^
w: ð2:25Þ
hu ∂u hv ∂v hu ∂w
1 ∂φ 1 ∂φ 1 ∂φ
grad φ ¼ ∇φ ¼ u^ þ v^ þ ^
w: ð2:26Þ
hu ∂u hv ∂v hw ∂w
div grad φ ¼ ∇2 φ
1 ∂ hv hw ∂φ ∂ hu hw ∂φ ∂ hu hv ∂φ ð2:29Þ
¼ þ þ :
hu hv hw ∂u hu ∂u ∂v hv ∂v ∂w hw ∂w
Now by using the div and curl Eqs. (2.27, 2.28), we are in position to solve
Maxwell’s eqs. (2.8, 2.9, 2.10 and 2.11), subject to the appropriate boundary
conditions. On the other hand, by using the Laplacian Eq. (2.29), we can solve
the wave Eq. (2.15).
In Cartesian
coordinate system,
the generalized coordinates are u ¼ x, v ¼ y and
^ v^ ¼ y;
w ¼ z u^ ¼ x; ^ w^ ¼ z^ so that Lamé coefficients hu, hv, and hw are all equal
to 1. The corresponding vector derivatives are:
36 2 Propagation Effects in Optical and Wireless Communications. . .
∂φ ∂φ ∂φ
grad φ ¼ ∇φ ¼ x^ þ y^ þ z^, ð2:30Þ
∂x ∂y ∂z
∂Ax ∂Ay ∂Az
div A ¼ ∇A ¼ þ þ , ð2:31Þ
∂x ∂y ∂z
x^ y^ z^
∂ ∂ ∂
curl A ¼ ∇ A ¼
∂x ∂y ∂z
A A A
x y z
∂Az ∂Ay ∂Ax ∂Az ∂Ay ∂Ax
¼ x^ þ y^ þ z^,
∂y ∂z ∂z ∂x ∂x ∂y
ð2:32Þ
2 2 2
∂ φ ∂ φ ∂ φ
div grad φ ¼ ∇2 φ ¼ þ þ : ð2:33Þ
∂u2 ∂v2 ∂w2
The vector derivatives (grad, div, curl, and Laplacian) in cylindrical polar and
spherical coordinate systems are described in incoming section.
The cylindrical polar coordinates correspond to the polar (ρ,ϕ) coordinates with an
additional z-coordinate directed out of the xy-plane. The cylindrical polar coordi-
nates (ρ,ϕ,z) are related to Cartesian coordinates (x,y,z) as follows:
The unit vectors in cylindrical polar coordinate system are related to the unit vectors
in Cartesian coordinate system by:
2.1 Electromagnetic Field and Wave Equations 37
b ^
ρ ¼ cos ϕx^ þ sin ϕy, b ¼ sin ϕx^ þ cos φy,
ϕ ^ z^ ¼ z^ ð2:36Þ
By replacing Lamé coefficients from Eq. (2.35) into Eqs. (2.26), (2.27), (2.28), and
(2.29), the operators of space differentiation become:
∂φ 1 ∂φ b ∂φ
grad φ ¼ ∇φ ¼ b
ρþ ϕþ z^, ð2:37Þ
∂ρ ρ ∂ϕ ∂z
1 ∂ Aρ ρ ∂Aϕ ∂Az
div A ¼ ∇A ¼ þ þ , ð2:38Þ
ρ ∂ρ ∂ϕ ∂z
b b z^
ρ ρϕ
1 ∂ ∂ ∂
curl A ¼ ∇ A ¼ , ð2:39Þ
ρ ∂ρ ∂ϕ ∂z
A ρA Az
ρ ϕ
1 ∂ ∂φ ∂ 1 ∂φ ∂ ∂φ
div grad φ ¼ ∇ φ ¼
2
ρ þ þ ρ
ρ ∂ρ ∂ρ ∂ϕ ρ ∂ϕ ∂z ∂z
2 2 ð2:40Þ
1∂ ∂φ 1∂ φ ∂ φ
¼ ρ þ 2 2þ 2:
ρ∂ρ ∂ρ ρ ∂ϕ ∂z
The spherical coordinates (ρ,θ,ϕ) are related to the Cartesian coordinates (x,y,z)
through the following relations:
By replacing Lamé coefficients from Eq. (2.42) into Eqs. (2.26), (2.27), (2.28), and
(2.29), the operators of space differentiation become:
∂φ 1 ∂φ b 1 ∂φ b
grad φ ¼ ∇φ ¼ b
ρþ θþ ϕ, ð2:43Þ
∂ρ ρ ∂θ ρ sin θ ∂ϕ
1 ∂ A ρ ρ2 ∂ð sin θAθ Þ ∂Aϕ
div A ¼ ∇A ¼ 2 sin θ þρ þρ , ð2:44Þ
ρ sin θ ∂ρ ∂θ ∂ϕ
38 2 Propagation Effects in Optical and Wireless Communications. . .
b ρb b
ρ θ ρ sin θϕ
1 ∂ ∂ ∂
curl A ¼ ∇ A ¼ 2 , ð2:45Þ
ρ sin θ ∂ρ ∂θ ∂ϕ
Aρ ρAθ ρ sin θAϕ
" #
2
1 ∂ ∂φ ∂ ∂φ 1 ∂ φ
div gradφ ¼ ∇2 φ ¼ 2 sin θ ρ2 þ sin θ þ
ρ sin θ ∂ρ ∂ρ ∂θ ∂θ sin θ ∂ϕ2
2
1 ∂ 2 ∂φ 1 ∂ ∂φ 1 ∂ φ
¼ 2 ρ þ 2 sin θ þ 2 2 :
ρ ∂ρ ∂ρ ρ sin θ ∂θ ∂θ ρ sin θ ∂ϕ2
ð2:46Þ
If we resolve the vector wave equations for electric and magnetic fields, Eq. (2.15),
into Cartesian coordinates, we will notice that each component will satisfy the
following scalar equation:
2 2
∂ U ∂ U ∂ U
2
1 ∂ U
2
∇2 U ¼ þ 2 þ 2 ¼ 2 , U 2 Ex ; Ey ; Ez ; H x ; H y ; H z ð2:47Þ
∂x2 ∂y ∂z v ∂t2
where r is the position vector given by r ¼ xx^ þ yy^ þ z^ z , ω is the carrier angular
frequency, and k is the propagation (wave) vector represented in Cartesian coordi-
nates as k ¼ kx x^ þ ky y^ þ kz z^ ( j is the imaginary unit). The magnitude of propaga-
tion vector is the (angular) wave number k ¼ jkj ¼ ω/v ¼ 2π/λ, where λ is the
wavelength (the propagation distance over which the wave function goes through
one cycle). The surfaces of constant phase, also known as wave fronts, are deter-
mined by:
ωt k r ¼ ωt kx x ky y kz z ¼ const, ð2:49Þ
ω ω
v¼ ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi : ð2:50Þ
k k2 þ k2 þ k2
x y z
Clearly, the equiphase surfaces of plane wave travel at phase velocity speed in
direction of propagation vector k, which is normal to the plane wave surfaces.
Let us now observe two harmonic wave traveling slightly different angular
frequencies denoted, respectively, as ω Δω and ω + Δω. The propagation
constants can be slightly different as well: k Δk and k + Δk. By assuming that
these two waves propagate along z-axis, by employing the superposition principle,
we can write:
U ¼ U 0 ej½ðωΔωÞtðkΔkÞz þ U 0 ej½ðωþΔωÞtðkþΔkÞz
¼ 2 cos ðΔωt ΔkzÞU 0 ejðωtþkzÞ : ð2:51Þ
Therefore, in this case, the phase travels at phase velocity, while the envelope
travels at the group velocity vg, defined as:
dω dv k dn
vg ¼ ¼vλ ¼v 1 : ð2:52Þ
dk dλ n dk
k E ¼ ωμH: ð2:53Þ
k H ¼ ωεE: ð2:54Þ
k E ¼ 0: ð2:55Þ
k H ¼ 0: ð2:56Þ
From harmonic wave Maxwell’s equations, we conclude that electric and magnetic
fields are perpendicular to one another, and they are simultaneously perpendicular
to the direction of propagation. The magnitude of electric and magnetic fields are
related as:
rffiffiffiffiffi
ω E μ0
H¼ε E ¼ εvE ¼ n , Z0 ¼ ¼ 120π ffi 377 Ω ð2:57Þ
k
|{z} Z0 ε0
v
40 2 Propagation Effects in Optical and Wireless Communications. . .
where Z0 is commonly referred to as the impedance of the free space. The imped-
ance of the medium, characterized
pffiffiffiffiffiffiffiffi by dielectric constant ε and magnetic permittiv-
ity μ, will be then Z ¼ μ=ε.
The flow of electromagnetic energy per unit area is given by the Poynting vector,
defined as the cross product of the electric and magnetic field vectors:
S ¼ E H∗ : ð2:58Þ
For plane harmonic waves, the electric and magnetic field components have the
form given by Eq. (2.48) so that the Poynting vector becomes:
k
S ¼ E H∗ ¼ E0 ejðωtkrÞ H∗
0e
jðωtkrÞ
¼ E0 H∗
0 ¼ |ffl{zffl}
E0 H 0 ^ ð2:59Þ
¼ I n,
k
|{z}
I ^n
where
where E (H) denotes electric (magnetic) field, p denotes the polarization orienta-
tion, r is the position vector, and k denotes the wave vector. For the x-polarization
waves (p ¼ x, ^ k^ ¼ k^
z ), Eq. (2.60) becomes:
^ k^ ¼ k^
while for y-polarization (p ¼ y, z ), it becomes:
where δ is the relative phase difference between the two orthogonal waves.
The resultant wave can be obtained by combining Eqs. (2.61) and (2.62) as follows:
The linearly polarized wave is obtained by setting the phase difference to an integer
multiple of 2π, namely, δ ¼ m 2π:
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi E0y
Eðz; tÞ ¼ xE ^ sin θ cos ðωt kzÞ;
^ cos θ þ yE E¼ E20x þ E20y , θ ¼ tan 1 :
E0x
ð2:64Þ
E0y
Ey Ey
E E
E
φ
θ E0x Ex Ex
Ex
Fig. 2.1 Polarization forms: (a) linear, (b) elliptic, and (c) circular polarizations
42 2 Propagation Effects in Optical and Wireless Communications. . .
with complex phasor term being typically omitted in practice. If we normalize the
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
Jones vector by dividing by E20x þ E20y , we can represent x-polarization state,
denoted as |x〉, and y-polarization state, denoted as jy〉, respectively, by:
1 0
jxi ¼ , jyi ¼ : ð2:70Þ
0 1
On the other hand, right- and left-circular polarization states, denoted, respectively,
as jR〉 and jL〉, can be written as:
1 1 1 1
jRi ¼ pffiffiffi , jLi ¼ pffiffiffi : ð2:71Þ
2 j 2 j
In Eqs. (2.70) and (2.71), we used Dirac notation to denote the column vectors
[7]. In Dirac notation, with each column vector (“ket”) jψ〉, defined as
ψx
jψ i ¼ , ð2:72Þ
ψy
The scalar (dot) product of ket |ϕ〉 bra 〈ψ| is defined by “bracket” as follows:
∗
hϕjψ i ¼ ϕ∗ ∗
x ψ x þ ϕy ψ y ¼ hψjϕi : ð2:74Þ
hψjψ i ¼ 1: ð2:75Þ
Because the vectors jx〉 and jy〉 are orthogonal, their dot product is zero:
hxjyi ¼ 0, ð2:76Þ
and they form the basis. Any polarization state vector jψ〉 can be written as a linear
superposition of basis kets as follows:
ψx
jψ i ¼ ¼ ψ x jxi þ ψ y jyi: ð2:77Þ
ψy
The parameter S1 > 0 is related to the preference for horizontal polarization and it is
defined by:
2
S1 ðtÞ ¼ jEx ðtÞj2 Ey ðtÞ : ð2:80Þ
S2 ðtÞ ¼ Ex ðtÞE∗ ∗
y ðtÞ þ Ex ðtÞEy ðtÞ: ð2:81Þ
Finally, the parameter S3 > 0 is related to the preference for right-circular polar-
ization and it is defined by:
h i
S3 ðtÞ ¼ j Ex ðtÞE∗
y ð t Þ E ∗
x ð tÞE y ð t Þ : ð2:82Þ
The Stokes vector for the elliptically polarized light, given by Eq. (2.69), can be
expressed as follows:
44 2 Propagation Effects in Optical and Wireless Communications. . .
2 3 2 3
S0 E20x þ E20y
6 7 6 2 7
6 S1 7 6 6 E0x E0y 7
2 7
6
S¼6 7 ¼ 6 7: ð2:83Þ
7
4 S2 5 6 7
4 2E0x E0y cos δ 5
S3 2E0x E0y sin δ
For DOP ¼ 1, the light is completely polarized. The natural light is unpolarized as
it represents incoherent superposition of 50% of light polarized along x-axis and
50% of light polarized along y-axis. The Stokes vector for unpolarized light is given
by:
2 3
2 3
S0 1
6 7 6 7
607 607
Sunpolarized ¼6 7 6 7
6 0 7 ¼ S0 6 0 7: ð2:86Þ
4 5 4 5
0 0
The partially polarized light represents the mixture of the polarized light and
unpolarized light so that the corresponding Stokes vector is given by:
2 3 2 3
S0 S0
6 7 6 7
607 6S 7
S ¼ ð1 DOPÞ6 7 þ DOP6 1 7:
607 6S 7 ð2:87Þ
4 5 4 25
0 S3
The right-circular polarization is defined by E0y ¼ E0x ¼ E0 and δ ¼ π/2, while left-
circular polarization is defined by E0y ¼ E0x ¼ E0 and δ ¼ π/2 so that the
corresponding Stokes representations are given, based on Eq. (2.83), by:
2 3 2 3
1 1
6 7 6 7
607 6 0 7
SR ¼ S 0 6 7
6 0 7,
6
SL ¼ S0 6 7:
7 ð2:89Þ
4 5 4 0 5
1 1
After the normalization of Stokes coordinates Si with respect to S0, the normal-
ized Stokes parameters are given by:
Si
si ¼ ; i ¼ 0, 1, 2, 3: ð2:90Þ
S0
If the normalized Stokes parameters are used, the polarization state can be
represented as a point on a Poincaré sphere, as shown in Fig. 2.2. The points
located at the opposite sides of the line crossing the center represent the orthogonal
polarizations. The normalized Stokes (Cartesian) coordinates are related to the
sphere coordinates, as defined in Fig. 2.2 by:
s1 ¼ cos ð2εÞ cos ð2ηÞ, s2 ¼ cos ð2εÞ sin ð2ηÞ, s3 ¼ sin ð2εÞ: ð2:91Þ
The polarization ellipse is very often represented in terms of the ellipticity and
the azimuth, which are illustrated in Fig. 2.3. The ellipticity tanε is defined by the
ratio of half-axis lengths. The corresponding angle is called ellipticity angle and
denoted by ε. The small ellipticity means that polarization ellipse is highly elon-
gated, while for zero ellipticity, the polarization is linear. For ε ¼ π/4, the
polarization is circular. For ε > 0 the polarization is right-elliptical. On the other
s3
The right-elliptical polarization points
are located in northern hemisphere
2e s2
The poles represent right-
and left-circular polarizations
2h
The equator represents
various forms of linear polarization
s1
Analyzer
Polarizer
Fig. 2.4 The polarizer-analyzer ensemble for study of the photon polarization
hand, the azimuth angle η defines the orientation of the main axis of ellipse with
respect to Ex (x-axis). The Stokes parameters are related to the azimuth (orientation)
angle η and ellipticity angle ε as follows:
S1 ¼ S0 cos ð2εÞ cos ð2ηÞ, S2 ¼ S0 cos ð2εÞ sin ð2ηÞ, S3 ¼ S0 sin ð2εÞ: ð2:92Þ
The azimuth angle η and ellipticity angle ε are related to the parameters of the
polarization ellipse, given by Eq. (2.65), by
Let us now observe the polarizer-analyzer ensemble, shown in Fig. 2.4. When an
electromagnetic wave passes through the polarizer, it can be represented as a vector
in the xOy plane transversal to the propagation direction, as given by Eq. (2.63),
where the angle θ depends on the filter orientation. By introducing the unit vector
p^ ¼ ð cos θ; sin θÞ, Eq. (2.63) can be rewritten as:
2.2 Propagation of Electromagnetic Waves 47
If θ ¼ 0 rad, the light is polarized along x-axis, while for θ ¼ π/2 rad, it is polarized
along y-axis. After the analyzer, whose axis makes an angle ϕ with respect to x-axis,
which can be represented by unit vector n^ ¼ ð cos ϕ; sin ϕÞ, the output electric field
is given by:
y
Incidence
plane
Incident wave Reflected wave
k
kr
q qr
n1 Boundary x
n2>n1
f
kt
Normal
line
Fig. 2.5 Space dependence of incident, reflected, and transmitted waves at a plane boundary
48 2 Propagation Effects in Optical and Wireless Communications. . .
At the boundary, since the time terms are already equal, the space terms must be
equal as well:
k r ¼ kr r ¼ kt r, ð2:98Þ
indicating that the propagation vectors are coplanar, laying in the same plane
commonly referred to as the incident plane, and that their projections on the
boundary (xz) plane are equal:
given that the incident and reflected wave propagate in the same medium
corresponding wave numbers are equal k ¼ kr so that Eq. (2.99) reduces to:
θ ¼ θr , ð2:100Þ
y
TE polarization:
All E-vectors are parallel
to boundary plane
E kr
k Er
n1 H q q
Hr Boundary x
n2>n1 z
f
Et
Ht
kt
Normal
line
(a)
y
TM polarization:
All H-vectors are parallel
to boundary plane
E
kr
k Hr
H
q q
n1 Er Boundary x
n2>n1 z
f
Et
Ht
kt
Normal
line
(b)
Fig. 2.6 Spatial dependence of wave vectors for: (a) TE polarization and (b) TM polarization
50 2 Propagation Effects in Optical and Wireless Communications. . .
Fig. 2.6a, we conclude that for TE polarization E + Er ¼ Et. On the other hand, from
Fig. 2.6b, we conclude that for TM polarization HHr ¼ Ht, which is equivalent to
kEkEr ¼ ktEt, since H is proportional to kE. The magnetic field tangential
components must satisfy boundary condition for TE polarization, which leads to:
Based on the boundary conditions’ equations provided above, we can determine the
coefficients of reflections for TE and TM polarizations as follows:
Er cos θ n cos ϕ Er cos ϕ n cos θ n2
rs ¼ ¼ , rp ¼ ¼ , n¼ :
E TE cos θ þ n cos ϕ E TM cos ϕ þ n cos θ n1
ð2:105Þ
sin ðθ ϕÞ tan ðθ ϕÞ
rs ¼ , rp ¼ ð2:107Þ
sin ðθ þ ϕÞ tan ðθ þ ϕÞ
2 cos θ sin ϕ 2 cos θ sin ϕ
ts ¼ , tp ¼ ð2:108Þ
cos ðθ þ ϕÞ sin ðθ þ ϕÞ cos ðθ ϕÞ
As an illustration for normal incidence, when θ ¼ 0, from Eq. (2.98), we find that:
2.2 Propagation of Electromagnetic Waves 51
n1 2
R s ¼ Rp ¼ : ð2:110Þ
nþ1
So far we considered the case for which n2 > n1 (or n > 1), and this case is
known as external reflection. In external reflection, the incident wave is
approaching the boundary (interface) from the medium with smaller refraction
index. If we eliminate the refractive angle ϕ from Eq. (2.105), with the help of
Snell’s law, n ¼ sinθ/sinϕ, the reflection coefficients can be rewritten as:
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
cos θ
n2 sin 2 θ n2 sin 2 θ n2 cos θ
rs ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi , r p ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi : ð2:111Þ
cos θ þ n2 sin 2 θ n2 sin 2 θ þ n2 cos θ
From Eq. (2.111), it is evident that in external reflection case, the reflection
coefficients are always real. However, when the incident wave is approaching the
interface from medium with larger index of refraction, n < 1, for incident angles
θ > sin1n, the reflection coefficients become complex and can be represented as:
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
cos θ j sin 2 θ n2 n2 cos θ þ j sin 2 θ n2
rs ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi , rp ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi , θ > tan 1 n:
cos θ þ j sin 2 θ n2 n2 cos θ þ j sin 2 θ n2
ð2:112Þ
This case is commonly referred to as internal reflection. The angle tan1n is known
as the critical angle. The reflectance when the incident angle is larger than or equal
to critical angle is equal to R ¼ 1, indicating that total reflection occurs.
One of the important applications of total internal reflection is the propagation of
light in optical fibers. The optical fiber, shown in Fig. 2.7, consists of two wave-
guide layers, the core (of refractive index n1) and the cladding (of refractive index
n2), protected by the jacket (the buffer coating). The majority of the power is
n
n(ρ)
n1
a
n2
b
φ Guided ray
ρ
θi n1>n2 Core
a- the core radius
b- the cladding radius
ρ- the radial distance n0=1 n2 Cladding
(a) (b)
Fig. 2.7 Optical fibers: (a) refractive index profile for step-index fiber and (b) the light confine-
ment in step-index fibers through the total internal reflection
52 2 Propagation Effects in Optical and Wireless Communications. . .
concentrated in the core, although some portion can spread to the cladding. There is
a difference in refractive indices between the core and cladding (n1 > n2), which is
achieved by mix of dopants commonly added to the fiber core. The refractive index
profile for step-index fiber is shown in Fig. 2.7a, while the illustration of light
confinement by the total internal reflection is shown in Fig. 2.7b. The ray will be
totally reflected from the core-cladding interface
qffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ffi (a guided ray) if the following
condition is satisfied: n0 sin θi < n21 n22 , where θi is the angle of incidence. The
maximum semi-angle of the vertex of a cone of rays q entering
ffiffiffiffiffiffiffiffiffiffiffiffiffiffithe
ffi fiber, known as the
acceptance angle, can be determined by α ¼ sin 1 n21 n22 . The parameter max
(n0sinθi), therefore, defines the light-gathering capacity of an optical fiber, and it is
called the numerical aperture (NA):
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffi
NA ¼ n21 n22 n1 2Δ, Δ
1 ð2:113Þ
where jψ in〉 is the input polarization state. Linear polarizer changes the amplitude
of polarization vector, and it is characterized by absorption coefficients along x- and
y-axes, denoted as px and py, respectively. The action of linear polarizer can be
described by the following Jones matrix:
p 0
J polarizer ¼ x ; 0 pi 1, i 2 fx; yg: ð2:115Þ
0 py
ejϕ=2 0 1 0
J wave ¼ , J wave ¼ : ð2:116Þ
plate
0 ejϕ=2
plate
0 ejϕ
Two popular wave plats are quarter-wave plate (QWP), for which ϕ ¼ π/2, and
half-wave plate (HWP), for which ϕ ¼ π. Their Jones matrix representations are as
follows:
1 0 1 0
J QWP ¼ , J HWP ¼ : ð2:117Þ
0 j 0 1
For instance, if the input state is linear 45o state, denoted as |45o〉¼[1 1]T/√2,
after passing through QWP, it gets converted to:
1 1 0 1 1 1
J QWP 45 ¼ pffiffiffi ¼ pffiffiffi , ð2:118Þ
2 0 j 1 2 j
hx0 jψ i ¼ hx0 jxihxjψ i þ hx0 jyihyjψ i, hy0 jψ i ¼ hy0 jxihxjψ i þ hy0 jyihyjψ i, ð2:120Þ
0 hx0 jψ i hx0 jxi hx0 jyi hxjψ i
jψ i ¼ ¼ : ð2:121Þ
hy0 jψ i hy0 jxi hy0 jyi hyjψ i
|fflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflffl}
J ðθ Þ
From Fig. 2.8b, it is clear that old basis {jx〉,jy〉} is related to the new basis
{jx’〉,jy’〉} by:
jxi ¼ cos θjx0 i sin θjy0 i, jyi ¼ sin θjx0 i þ cos θjy0 i: ð2:122Þ
hx0 jxi ¼ cos θ, hx0 jyi ¼ sin θ, hy0 jxi ¼ sin θ, hy0 jyi ¼ cos θ, ð2:123Þ
where Jrotation(θ) is the rotation operator, which can be represented in matrix form,
based on Eq. (2.121) and (2.123), as follows:
cos θ sin θ
J rotation ðθÞ ¼ : ð2:125Þ
sin θ cos θ
For the normal incidence case (θ ¼ ϕ ¼ 0), from Eq. (2.105), we conclude that
rs ¼ rp ¼ (1n)/(1+n), so that the reflection matrix is given by:
2.2 Propagation of Electromagnetic Waves 55
1 n 1 0 n1 1 0
R¼ ¼ , n > 1: ð2:129Þ
1þn 0 1 n þ 1 0 1
So if the incident polarization state is jL〉, the reflected polarization state is:
n1 1 0 1 1 n1 1 1 n1
jψ i ¼ RjLi ¼ pffiffiffi ¼ pffiffiffi ¼ jRi: ð2:130Þ
nþ1 0 1 2 j n þ 1 2 j nþ1
|ffl{zffl}
jRi
The Mueller operator (matrix) representation for the linear polarizer is given by:
2 3
p2x þ p2y p2x p2y 0 0
6 7
16
6 px py
2 2
p2x þ p2y 0 0 7
7
Mpolarizer ¼ 6 7, ð2:132Þ
26 0 0 2px py 0 7
4 5
0 0 0 2px py
where px and py are the absorption coefficients along x- and y-axes, respectively.
The Mueller operator (matrix) representation for the wave plates is given by:
2 3
1 0 0 0
6 7
60 1 0 0 7
Mwave plates ¼6
60 0
7, ð2:133Þ
4 cos ϕ sin ϕ 7
5
0 0 sin ϕ cos ϕ
where ϕ is the phase shift between x- and y-polarization states. The Mueller matrix
representation of a rotator is given by:
2 3
1 0 0 0
6 7
60 cos ð2θÞ sin ð2θÞ 07
Mrotator ¼ 6
60
7, ð2:134Þ
4 sin ð2θÞ cos ð2θÞ 0 7
5
0 0 0 1
56 2 Propagation Effects in Optical and Wireless Communications. . .
∂A
E ¼ gradφ and B ¼ curl A: ð2:136Þ
∂t
Given that curl grad φ ¼ 0 and div curl A ¼ 0, while spatial and time differentiation
operators commute, Maxwell’s equations get satisfied. In isotopic media the con-
stitutive relations are given by D ¼ εH and B ¼ μH so that from Maxwell’s
Eq. (2.2), we obtain:
∂E
curl B ¼ μJ þ εμ : ð2:137Þ
∂t
where ~
ΔA denotes the Laplacian vector operator, defined as:
~
ΔA ¼ grad div A curl curl A, ð2:139Þ
~
ΔA ¼ ΔAx x^ þ ΔAy y^ þ ΔAz z^:
∂φ
div A ¼ εμ , ð2:140Þ
∂t
2.2 Propagation of Electromagnetic Waves 57
R=r-r’ P
dV '
V
r
r'
so that the gradient terms in Eq. (2.138) disappear, which now becomes the vector
wave equation:
2
~ ∂ A
ΔA εμ 2 ¼ μJ: ð2:141Þ
∂t
Equation (2.140) is often called the Lorentz gauge. By substituting the electric field
from Eq. (2.136) into Maxwell’s Eq. (2.3), with the help of Eq. (2.140), we obtain
the scalar wave equation:
2
∂ φ ρ
Δφ εμ ¼ : ð2:142Þ
∂t2 ε
The wave equations for the monochromatic state, when ∂/∂t get replaced by jω,
are known as Helmholtz equations.
We now study the propagation of electromagnetic waves from the source or
transmit antenna, as illustrated in Fig. 2.9. The volume V is composed of homoge-
neous material of dielectric constant ε and magnetic permittivity μ. The volume
density of charges within this volume V is denoted by ρ ¼ ρ(r0 , t), while the density
of conduction currents is denoted by J ¼ J(r0 , t), where r0 denotes position vector of
a source volume element dV0 . We are interested in determining the electric in
magnetic fields at point P, outside of source, and the position vector of this point
is denoted by r. In order to do so, we apply the superposition principle [5, 8], which
claims that the electromagnetic field of a complicated system can be determined as
a summation of electromagnetic fields originating from individual parts. By assum-
ing that the distance from point P to the source element dV0 is much larger than the
dimension of the source, the source element dV0 can be interpreted as the point
source. The charge of the source element is then given by dq ¼ ρdV0 , and the
corresponding electric scalar potential at point P is given by:
ρðr0 ; t R=vÞ 0
dφP ¼ dV , R ¼ jr r0 j, ð2:143Þ
4πεR
ð
1 ρðr0 ; t R=vÞ 0
φP ðr; tÞ ¼ dV : ð2:144Þ
4πε V R
It is straightforward to show that the electric scalar potential satisfies the scalar
wave (Eq. (2.142)). By close inspection of the scalar wave and vector wave
equations, we conclude that the i-th component, i 2 {x,y,z}, of the magnetic vector
potential can be obtained from the scalar wave equation by replacing ε with 1/μ and
ρ with Ji. Therefore, the i-th component of the magnetic vector potential can be
obtained as follows:
ð
μ J i ðr0 ; t R=vÞ 0
Ai, P ðr; tÞ ¼ dV , i 2 fx; y; zg: ð2:145Þ
4π V R
The corresponding vector representation of the magnetic vector potential is given by:
ð
μ Jðr0 ; t R=vÞ 0
AP ðr; tÞ ¼ dV : ð2:146Þ
4π V R
Equations (2.144) and (2.146), when the time dependence is omitted, are known as
the Helmholtz integrals. The potentials given by Eqs. (2.144) and (2.146) in
electrodynamics are known as retarded potentials.
Clearly, the retarded potentials for electromagnetic field are generated by time-
varying charge density or electric current. As the electromagnetic field propagates
at finite speed, the speed of light in a given medium, denoted as v, the retarded time
at a given point in space r, is given by tr ¼ t jr r0 j/v ¼ t R/v.
By substituting Eqs. (2.144) and (2.146) into Eq. (2.134), with the help of
constitutive relationship H ¼ B/μ, we obtain the following expressions for electric
and magnetic field vectors:
ð ð
1 ∂ρðr0 ; t R=vÞ R^ 0 1 R^
EP ðr; tÞ ¼ dV þ ρðr0 ; t R=vÞ 2 dV 0
4πεv V ∂t R 4πε V R
ð ð2:147Þ
μ ∂Jðr0 ; t R=vÞ 1 0
dV ,
4π V ∂t R
and
ð ð
1 ∂Jðr0 ; t R=vÞ R^ 0 1 R^
HP ðr; tÞ ¼ dV þ Jðr0 ; t R=vÞ 2 dV 0 ,
4πv V ∂t R 4π V R
ð2:148Þ
^ ¼ R=R.
where R
2.2 Propagation of Electromagnetic Waves 59
In points located far away from the source, r
r0 , in the calculation of the
electric scalar and magnetic vector potentials, the following two approximations
can be made:
1. The coarse approximation in amplitude:
1
R1 ¼ jr r0 j ’ r 1 : ð2:153Þ
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffir
r0 pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
kR ¼ kjrr r0 j ¼ k r 2 2rr0 þ r 02 ffi k r 2 2rr0
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
2rr
0
ð2:154Þ
¼ kr 1 2 ; kr k^ r r0 , r^ ¼ r=r:
r
where the vector N in Eq. (2.155) is known as the radiation vector. The radial
dependence of the magnetic vector potential is of the form:
ejkr
Φ¼ : ð2:156Þ
r
Such electromagnetic waves, whose amplitude changes with distance as 1/r, while
the phase is a linear function of distance, are commonly referred to as the spherical
electromagnetic waves. At distances sufficiently far away for the source
(or transmit antenna), regardless of the shape or size, the electromagnetic waves
are spherical. This space region is called the far-field region or Fraunhofer region.
The propagation function of spherical waves satisfies the following radiation
condition:
∂Φ 1 þ jkr
¼ Φ: ð2:157Þ
∂r r
ejkr b ejkr b
Aθ ¼ A θ, Aθ ¼ A ϕ: ð2:158Þ
r r
By using the approximations (Eqs. (2.153) and (2.154)), the electric scalar
potential (Eq. (2.150)) becomes:
ð ρðr0 ÞejkR
1 0
φ ðrÞ ¼ dV : ð2:159Þ
P 4πε V R
Given that the action of the time derivative on the harmonic wave is multipli-
cation by jω, from Eq. (2.140), we obtain:
j
φ ¼ div A, ð2:160Þ
P ωεμ
and by substituting Eq. (2.155) into Eq. (2.160), the scalar potential becomes:
ð
1 μ 1 þ jkr ejkr jk^r r0 0
φ ¼ j Jðr0 Þ^
r e dV
P ωεμ 4π r r
|fflfflffl{zfflfflffl} V
Z=4πk
ð rffiffiffi
Z 1 þ jkr ejkr jk^r r0 0 μ
¼ j Jðr0 Þ^
r e dV , Z¼ : ð2:161Þ
4πk V r r ε
2.2 Propagation of Electromagnetic Waves 61
In far-field, the components in Eq. (2.162) and (2.163), whose amplitudes decay
as 1/r dominate, of the electric and magnetic field vectors can be written as:
ð
Zk ejkr
0 0
E¼j r r^ Jðr0 Þ ejk^r r dV 0
Jðr Þ^ ð2:164Þ
4π r V
Eθ
Eθ ¼ jωAθ , Hθ ¼ ,
Z ð2:166Þ
Eϕ
Eϕ ¼ jωAϕ , Hϕ ¼ :
Z
It can be straightforwardly shown that the electric and magnetic field vectors
are mutually perpendicular and simultaneously perpendicular to the radial
direction:
E H ¼ 0, E r^ ¼ 0, H r^ ¼ 0: ð2:167Þ
The Poynting vector has only the radial component, in the far-field, as shown
below:
62 2 Propagation Effects in Optical and Wireless Communications. . .
Eθ E∗ ω2
∗
θ þ Eϕ Eϕ
S ¼ E H∗ ¼ S^
r, S ¼ Eθ H ∗ ∗
ϕ þ Eϕ H θ ¼ ¼ A A ∗
þ A A ∗
Z Zr 2 θ θ ϕ ϕ
ð2:168Þ
The flux of the Poynting vector over a sphere of radius r, containing the transmit
antenna/source, represents the radiated power:
ðπ 2ðπ
ω2
P¼ Aθ A ∗
θ þ A A ∗
ϕ ϕ dθdϕ: ð2:169Þ
Z
θ¼0 ϕ¼0
When the spherical waves are observed within the small region of dimensions
much smaller than the distance from the transmit antenna/source, the variations in
amplitude can be neglected. Such electromagnetic waves, whose amplitudes do not
change, while the phases are linear function of distance, are commonly referred to
as the plane waves. The propagation function of the plane waves is given by:
Φ ¼ ejkr , ð2:170Þ
∂Φ
¼ jkΦ: ð2:171Þ
∂r
Strictly speaking, the plane waves do not exist in nature, as the antenna to emit them
cannot be manufactured. Namely, such antenna would be composed of infinitely
large plane with the surface current density Js and emission frequency ω. By
expressing the current density of such “antenna” as
Jb ¼ J S δðxÞx,
^ ð2:172Þ
the magnetic vector potential will have only x-component, only z-dependent, so that
the wave equation is given by:
d2 A
þ k2 A ¼ μJ S , ð2:173Þ
dz2
jμJ S jkjzj
A¼ e : ð2:174Þ
2k
The electric scalar potential is, based on Eq. (2.160), φ ¼ 0. The components of
electric field are then obtained as follows:
2.2 Propagation of Electromagnetic Waves 63
P
r
q
δl ẑ
I
O
ωμJ S jkjzj
Ex ¼ jωA ¼ e , Ey ¼ Ez ¼ 0: ð2:175Þ
2k
On the other hand, the components of magnetic field are obtained as:
8
>
>
J jkz
< Se , z > 0
2
Hz ¼ , H x ¼ H y ¼ 0: ð2:176Þ
>
> J
: S ejkz , z < 0
2
Cleary, the nonzero electric and magnetic field components (Eqs. (2.175) and
(2.176)) have constant complex amplitudes, while the phases are a linear function
of the distance z, indicating that they describe the plane wave. Even though that
plane waves strictly speaking do not exist, they represent a nice approximation in
the far-field, when the observation volume is small compared to the distance, and as
such they have been widely used.
Let us observe the current element of momentum Iδl z^, representing the straight-
wire antenna with δl ! 0, located in the origin (of the coordinate system) as
illustrated in Fig. 2.10, which is also known as the Hertzian dipole. The magnetic
vector potential has only z-component:
μ ejkr
A ¼ A^
z, A¼ Iδl , ð2:177Þ
4π r
z r^¼A cos θ,
Ar ¼ A^ zb
Aθ ¼ A^θ¼ A sin θ, Aϕ ¼ 0: ð2:178Þ
The components of electric and magnetic fields in the far-field can now be deter-
mined as:
64 2 Propagation Effects in Optical and Wireless Communications. . .
Z ejkr
Eθ ¼ jωAθ ¼j Ikδl sin θ ¼ ZH ϕ ,
4π r ð2:179Þ
Er ¼ 0, Eϕ ¼ ZH θ ¼ 0, H r ¼ 0:
The electric field is angle θ dependent and exhibits emission directivity properties.
The minimum radiation is for θ ¼ 0, π, while the maximum emission is achieved for
θ ¼ π/2. The following function
kδl
Fð θ Þ ¼ sin θ ð2:180Þ
2
can be used to describe the directivity properties of this transmit antenna, and it is
commonly referred to as the radiation pattern. Since the radiation pattern is
independent of ϕ, we say that this antenna is omnidirectional. The θ-component
of electric field can now be expressed in terms of radiation function as follows:
ZI ejkr
Eθ ¼ j FðθÞ: ð2:181Þ
2π r
Fð θ Þ FðθÞ
f ðθÞ ¼ ¼ : ð2:182Þ
maxFðθÞ Fðθ ¼ π=2Þ
The beamwidth of the transmit antenna is defined as the width of the main lobe (the
lobe containing maximum power direction), usually specified by the half-power
beamwidth. In other words, the angle encompassed between the points on the side
of the main lobe where the power has fallen to half (3 dB) of its maximum value:
1
pffiffiffi f ðθÞ 1: ð2:183Þ
2
J ¼ δðxÞδðyÞf ðzÞ^
z, ð2:184Þ
while the corresponding current is integral over cross section of this wire:
ð
IðzÞ¼ Jdxdy ¼ f ðzÞ^ z: ð2:185Þ
Since the antenna is center driven, the unknown function f(z) must satisfy the
following conditions:
2.2 Propagation of Electromagnetic Waves 65
P
q
+l r
I2
ẑ
y
O
f
P’
I1
-l
x
d 2 f ðzÞ
þ k2 f ðzÞ ¼ 0: ð2:187Þ
dz2
There exist two solutions for this differential equation, ejkz and ejkz. The
corresponding current of upper and lower segments can be written as:
By using the continuity condition I1(0) ¼ I2(0) and Eq. (2.186), it can be shown that
the overall solution is the standing wave:
The nonzero components of electric and magnetic field in the far-field are given by:
66 2 Propagation Effects in Optical and Wireless Communications. . .
0.6
0.4
0.4
0.0
0.0
-0.2
-0.2
-0.4
-0.6 -0.4
(a) (b)
Fig. 2.12 Radiation patterns for center-driven straight-wire antenna: (a) kl ¼ π and (b) kl ¼ 7π/6
1 Z I2
Sr ¼ Eθ H ∗ ∗
ϕ þ Eϕ H θ ¼ 2 02 F2 ðθÞ: ð2:193Þ
2 8π r
An important parameter of the antenna is the so-called directivity gain, denoted
by gd, defined as follows [8]:
4π 2 Sr , max
gd ¼ Ð 4π , ð2:194Þ
0 Sr ðr; θ; ϕÞr 2 sin θdθdφ
where Sr, max is the major lobe maximum of the Poynting vector in the far-field and
r is the far-field sphere radius. Clearly, the directivity gain of an isotropic antenna is
gd ¼ 1, while the of directive antennas is larger than 1. The denominator in
Eq. (2.194) represents the time-average power radiated by the antenna:
2.2 Propagation of Electromagnetic Waves 67
ð 4π
P¼ Sr ðr; θ; ϕÞr 2 sin θdθdφ: ð2:195Þ
0
The directivity gain for the center-driven straight-wire antenna from Fig. 2.11
can be calculated by:
h i2
4π 2 max cos ðkl cos sin
θÞ cos kl
θ
θ
gd ¼ Ð π ½ cos ðkl cos θÞ cos kl2 : ð2:196Þ
2π 0 sin θ dθ
For the half-wave dipole (kl ¼ π/2), it is straightforward to show that directivity
gain is gd ¼ 1.64.
Let us now consider the current element whose current density is given as:
I
J¼ δðr Þz, ð2:197Þ
2rπ
and the magnetic vector potential will only have the axial component, namely,
A ¼ A^z :. The corresponding wave equation is given by:
∂ ∂A μI
r þ k2 rA ¼ δðr Þ: ð2:198Þ
∂r ∂r 2π
The solutions of this wave equation are Bessel functions of the first and second
kind, J0(kr) and Y0(kr). In the absence of any obstacle, only the incident wave will
propagate; therefore, the Hankel functions of the second kind will be used as a
solution of the wave equation [5]:
ð2Þ
H 0 ðkr Þ ¼ J 0 ðkr Þ jY 0 ðkr Þ: ð2:199Þ
μI ð2Þ μI ð2Þ
A¼ ðjπ ÞH 0 ðkr Þ ¼ j H 0 ðkr Þ: ð2:200Þ
4π 4
where C is the contour defining the cross section of the conducting cylinder. In the
far-field, r
r0 , so that the following approximation of the Hankel function can be
used:
rffiffiffiffiffiffiffi
ð2Þ kr!1 2 jðkrπ=4Þ
H 0 ðkr Þ ! e : ð2:202Þ
πkr
After substituting Eq. (2.202) into Eq. (2.201), we obtain the following expression
for the magnetic vector potential in the far-field:
rffiffiffiffiffi þ
μ 2 ejkr 0 0 0
A ¼ j ejπ=4 pffiffi JS r ejk^r r dl : ð2:203Þ
4 πk r
|ffl{zffl} C
Φ
ejkr
Φ ¼ pffiffi ð2:204Þ
r
The electric field will only have axial component Ez and magnetic field only angle
Hθ component, given, respectively, as:
The electromagnetic waves, whose propagation function has the form given by
Eq. (2.204), are commonly referred to as the cylindrical waves.
Before concluding this section, we briefly return back to the spherical wave,
whose propagation function is given by Eq. (2.156). Based on Fig. 2.9, we conclude
that the position vector magnitude of observed point P(x,y,z) with respect to the
origin O(x0,y0,z0) can be written as:
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
r¼ ðx x0 Þ2 þ ðy y0 Þ2 þ ðz z0 Þ2
rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
x x 2 y y 2ffi
0
¼ Δz 1 þ þ 0
, Δz ¼ z z0 : ð2:207Þ
Δz Δz
In paraxial approximation, when the region of interest is the space close to the
optical axis, assuming that the propagation direction is aligned with the positive
2.2 Propagation of Electromagnetic Waves 69
z-direction,
p ffiffiffiffiffiffiffiffiffiffiffi the following approximation for square root can be used
1 þ u ’ 1 þ u=2, and from previous equation, we obtain:
1x x0 2 1y y0 2
r ’ Δz 1 þ þ : ð2:208Þ
2 Δz 2 Δz
1 jkx2q2 þyðzÞ2
ΦG ¼ e , ð2:210Þ
qð z Þ
πw20
qðzÞ ¼ z jzR , zR ¼ ð2:211Þ
λ
and zR is the so-called Rayleigh distance (range), the distance at which the waist
w is √2 time larger than that at the beam waist w0 (at z ¼ 0). Another popular
representation for q(z) is given in terms of reciprocal of q(z) as follows:
1 1 z zR 1 1
¼ ¼ þj 2 ¼ z 2 þ j " 2 #
qðzÞ z jzR z2 þ z2R z þ z2R R z
z 1þ zR 1 þ
z z
|fflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl} R
RðzÞ
|fflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl}
w2 ðzÞ=w20
1 1 1
¼ þj
RðzÞ zR w2 ðzÞ=w20 "
z 2 2 #
R z
RðzÞ ¼ z 1 þ , w ðzÞ ¼ w0 1 þ
2 2
z zR
ð2:212Þ
where R(z) denotes the radius of the curvature of the beam’s wavefronts at distance
z and w(z) denotes the radius at which the field amplitude falls to 1/e of their axial
value, at the plane z along the beam.
70 2 Propagation Effects in Optical and Wireless Communications. . .
According to the superposition principle, the electric field vector E at the observed
point of space r can be obtained as the vector sum of individual field vectors Ei
originating from different sources:
X
N
E¼ EðiÞ : ð2:213Þ
i¼1
If the density of conduction currents J(r0 ,t) from Fig. 2.9 can be represented as
the sum of component conduction currents:
0 X N 0
J r ;t ¼ JðiÞ r ; t , ð2:214Þ
i¼1
then the overall magnetic vector potential can be represented, based on Eq. (2.146),
as follows:
ð PN 0
and clearly satisfies the overall vector wave equation (Eq. (2.141)). Let the charge
density of the volume Vi in which the i-th conduction current is located be denoted
as ρi. Based on Eq. (2.144), the overall scalar potential can be represented as:
ð PN 0
ð 0
1 ρðiÞ r ; t R=v XN
1 ρðiÞ r ; t R=v
0
dV 0
i¼1
φðr; tÞ ¼ dV ¼
4πε R 4πε V
i¼1 |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl
R
V
ffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
φðiÞ ðr;tÞ
PN
¼ i¼1 φðiÞ ðr; tÞ:
ð2:217Þ
By substituting Eqs. (2.216) and (2.217) into Eq. (2.136), we prove the superposi-
tion principle given by Eq. (2.213).
2.2 Propagation of Electromagnetic Waves 71
When the phase difference ϕ1 ϕ2 is constant, we say that two sources are
mutually coherent. As we have seen in Sec. 2.2.1, the irradiance function at the
given point r is proportional to the magnitude square of the electric field, so that
after applying the superposition principle given by Eq. (2.213) for N ¼ 2, the
irradiance function, after ignoring the constant term, is obtained as follows:
I ¼ jEj2 ¼ E E∗ ¼ Eð1Þ þ Eð2Þ E∗ ∗
ð1Þ þ Eð2Þ
2 2
¼ Eð1Þ þ Eð2Þ þ Eð1Þ E∗ ∗
ð2Þ þ Eð1Þ Eð2Þ ð2:219Þ
|fflfflffl{zfflfflffl} |fflfflffl{zfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflfflfflffl
ffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
I1 I2 2E1 E2 cos ðk2 rk1 rþϕ1 ϕ2 Þ
The last term in the bottom line of Eq. (2.219) is commonly referred to as the
interference term. Since the angle k2 r k1 r + ϕ1 ϕ2 is the position vector r
dependent, the periodic spatial variations in the intensity occur, and these variations
are responsible for the interference fringes when two mutually coherent light beams
are combined. On the other hand, when two mutually incoherent light beams are
combined, the interference term is averaged out, and the interference effect does not
occur.
Even when two mutually coherent beams are monochromatic and with constant
amplitudes, if they propagate different paths before the interference occurs, the
instantaneous light flux at a given point r in space fluctuates, and we need to define
the irradiance by using the time-average operation:
D E D
E
I ¼ jEj2 ¼ hE E∗ i ¼ Eð1Þ þ Eð2Þ E∗ ð1Þ þ Eð2Þ
∗
D 2 E D 2 E D E
¼ Eð1Þ þ Eð2Þ þ Eð1Þ E∗ ð2Þ þ E ∗
E
ð1Þ ð2Þ
|fflfflfflfflffl{zfflfflfflfflffl} |fflfflfflfflffl{zfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
I2
I1
2Re Eð1Þ E∗
ð 2Þ
¼ I 1 þ I 2 þ 2Re E1 ðtÞE∗ 2 ðt þ τÞ ¼ I 1 þ I 2 þ 2ReΓ 12 ðτÞ, ð2:220Þ
|fflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflffl}
Γ 12 ðτÞ
in optics is also known as the mutual coherence function (MCF). On the other hand,
the following autocorrelation function
72 2 Propagation Effects in Optical and Wireless Communications. . .
C11 ðτÞ ¼ Γ 11 ðτÞ ¼ E1 ðtÞE∗
1 ðt þ τ Þ ð2:222Þ
Γ 12 ðτÞ Γ 12 ðτÞ
γ 12 ðτÞ ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ¼ pffiffiffiffiffiffiffiffi : ð2:224Þ
Γ 11 ð0ÞΓ 22 ð0Þ I1 I2
The magnitude of the degree of partial coherence can be used to clarify different
types of coherence into three types: (1) complete coherence when |γ 12| ¼ 1, (2) com-
plete incoherence when |γ 12| ¼ 0, and (3) partial coherence, otherwise. Another
relevant parameter in optics is the fringe visibility, defined as:
I max I min
V ¼ : ð2:226Þ
I max þ I min
and based on irradiance Eq. (2.225), the fringe visibility can be expressed as:
pffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffi
pffiffiffiffiffiffiffiffi
I 1 þ I 2 þ 2 I 1 I 2 jγ 12 j I 1 þ I 2 2 I 1 I 2 jγ 12 j 2 I 1 I 2 jγ 12 j
V ¼ pffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffi ¼ : ð2:227Þ
I 1 þ I 2 þ 2 I 1 I 2 jγ 12 j þ I 1 þ I 2 2 I 1 I 2 jγ 12 j I1 þ I2
In particular, when I1 ¼ I2 ¼ I:
pffiffiffiffi
2 I 2 jγ 12 j
V ¼ ¼ jγ 12 j, ð2:228Þ
2I
the fringe visibility is equal to the magnitude of the degree of partial coherence. For
the complete coherence ( |γ 12| ¼ 1), the fringe visibility will have the maximum
2.2 Propagation of Electromagnetic Waves 73
contrast of unity. On the other hand, for the compete incoherence ( |γ 12| ¼ 0), there
are no interference fringes at all as the contrast is zero.
Let us now observe the quasimonochromatic field:
where the phase is constant for the duration of time interval τc and changes rapidly
for τ > τc. For simplicity, let us assume that the phase changes uniformly every τc
seconds. The degree of partial coherence in this case is just the correlation
coefficient:
ðT
hEðtÞE∗ ðtÞi D jωτ j½ϕðtÞϕðtþτÞ E 1
γ ðτÞ ¼ D E ¼ e e ¼ ejωτ lim ej½ϕðtÞϕðtþτÞ dt:
2 T!1 T
j Ej 0
ð2:230aÞ
For each time interval of duration τc, the phase difference ϕ(t) ϕ(t + τ) is nonzero
for t between τc τ and τc so that:
ð τc τ ð τc τ
1 jωτ 1 τ
γ ðτ Þ ¼ e ej0 dt þ ejωτ E ejΔϕ dt ¼ ejωτ 1 , τ < τc
τc τc 0 τc
0
|fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflffl}
¼0
ð2:230bÞ
where we used the statistical average operator E{} to perform the statistical
averaging with respect to the random phase Δϕ. Clearly, we assumed that the
process is ergodic so that the statistical and time-averaging operators can be
interchangeably used. Therefore, the fringe visibility is known:
8
< 1 τ , τ < τc
V ¼ jγ 12 j ¼ τc ð2:231Þ
:
0, τ τc
Evidently, the fringe visibility drops to zero when the time difference between two
observations τ is larger than the characteristic time interval τc, which is commonly
referred to as the coherence time. Equivalently, for the nonzero fringe visibility, the
path difference between two beams must be small than:
lc ¼ cτc , ð2:232Þ
direction from the source, the corresponding spatial coherence is known as the
longitudinal spatial coherence of the field. As long as the distance between these
two points is smaller than lc, the coherence between the fields is high. On the other
hand, if the two observation points P1 and P2 are located at the same distance from
the source S, but in different directions, then the normalized MCF will measure the
so-called transverse spatial coherence of the field. The partial coherence between
the observation points P1 and P2 occurs when the source S is an extended source. If
the extended source is composed of two mutually incoherent point sources S1 and
S2, as illustrated in Fig. 2.13, the corresponding electric fields in observation points
P1 and P2 are given as:
r P2 S1 r P1 S1 r P2 S2 r P1 S2
τS1 ¼ τ þ , τ S2 ¼ τ þ
c c
where we used the fact that point sources are mutually incoherent, while γ(τ) is
given by Eq. (2.230). The fringe visibility between the observation points is related
to [10]:
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1 þ cos ½ωðτS2 τS1 Þ τS τS
jγ 12 ðτÞj 1 1 1 2 ð2:235Þ
2 τc τc
and it has the periodic spatial dependence. The mutual coherence drops to zero, at
either side of the central line, when:
c hr P2 S2 r P1 S2 r P2 S1 r P1 S1 i
ωðτS2 τS1 Þ ¼ 2π ¼ π: ð2:236Þ
λ c c
Let s denote the distance between point sources, l denote the distance between
observation points, and r denote the mean distance between the sources and
observation points.
From Fig. 2.13, we see that r P1 S2 r P1 S1 , so that [10]:
2.2 Propagation of Electromagnetic Waves 75
s P1
S2 r
r
lt ffi λ: ð2:237Þ
s
The angle separation of the point sources as seen from the observation point P1 is
given by tan θs ’ θs ’ s/r so that we can write:
lt ffi λ=θs : ð2:238Þ
Since lt represents the separation of receiving points for which mutual coherence is
relevant, it can be called the transverse coherence width. When the source is
extended circular, we have to modify the previous equation as follows [10]:
lt ffi 1:22λ=θs : ð2:239Þ
þ ð
where we used gradn^ Uto denote the normal component of the gradient at the surface
S. When both U and V are the wave functions, they both satisfy the corresponding
wave equations:
2 2
1 ∂ U 1 ∂ V
∇2 U ¼ , ∇2 V ¼ : ð2:243Þ
v2 ∂t2 v2 ∂t2
By substituting the left sides of the wave equations into Eq. (2.242) and assuming
that the wave functions contain harmonic time dependence of the form exp(jωt),
we conclude that the right side of Eq. (2.242) becomes zero so that Eq. (2.242)
reduces to:
þ
Let us now suppose that wave function V is spherical and contains the harmonic
time dependence as follows:
ejðωtþkrÞ
V ¼ V0 : ð2:245Þ
r
ð2:246Þ
þ
1 ejkr ejkr
UP ¼ U gradn^ gradn^ U dS, ð2:247Þ
4π r r
S
where the integration is performed over the surface of aperture opening. Given that
gradn^ denotes the normal component of the gradient at the aperture opening, the
corresponding gradients are evaluated as:
0 0
!
ejkr 0
∂ ejkr0 0
jkejkr ejkr0
gradn^ 0 ¼ cos R n; ^r ^r
¼ cos R n; 02 ,
r ∂r 0 r 0 r0 r
jkr ð2:250Þ
e jkr
∂e jkr
jke e jkr
gradn^ ^r
¼ cos R n; ^r
¼ cos R n; 2 ,
r ∂r r r r
where the terms decaying as 1/r2 can be neglected when r and r0 are much larger
than the wavelength of the source.
After substitution of Eq. (2.250), the Kirchhoff integral (Eq. (2.249)) becomes:
þ jkðrþr0 Þ h
jk e
0
i
UP ¼ U 0 ejωt 0
^ r cos R n;
cos R n; ^ r dS, ð2:251Þ
4π rr
S
0
ejkr
US ¼ U0 , ð2:252Þ
r0
ejðkrωtÞ
US dS, ð2:254Þ
r
and the total optical disturbance at point P can be obtained by summing up the
secondary spherical waves form each aperture surface element according to
Eq. (2.253). This summation needs to take into account the inclination (obliquity)
factor:
0
I F ðr, r0 Þ ¼ cos R n;
^ r cos R n;
^r : ð2:255Þ
When the aperture is circular, the surface of integration is the spherical cap bounded
0
0
is aligned with the positon vector r , but in
by the aperture, and the normal vector
opposite direction
so
that cos R n; ^ r ¼ cos π ¼ 1, and the
inclination factor
becomes cos R n; ^ r þ 1: In the forward direction, cos R n; ^ r ¼ cos 0 ¼ 1 so that
the inclination factor is equal to the maximum value of 2. On the other hand, in the
S
P
r' r
n̂
Aperture
2.2 Propagation of Electromagnetic Waves 79
indicating that the diffracted waves are effectively plane waves. Such a diffraction
is commonly referred to as the Fraunhofer diffraction. On the other hand, when
either the receiving point or source point is close to the aperture so that the
curvature of the wavefront is relevant, such diffraction is known as the Fresnel
diffraction. There is no strict distinction between two cases; however, the following
criteria can be used. Let the size of the aperture opening (diameter) be denoted by
D, while the distances of the receiving point P and the source point S are located at
distances d and d’ from the diffracting aperture plane, respectively, as illustrated in
Fig. 2.15. The wave is if effectively plane over the aperture when the curvature
measure defined below is much smaller than the operating wavelength:
1 1 1
þ D2
λ: ð2:257Þ
2 d d0
Clearly, the second term in Taylor expansion represents the curvature that was used
in Eq. (2.257).
The inclination factor can also be expressed as follows:
80 2 Propagation Effects in Optical and Wireless Communications. . .
Screen
between Fraunhofer and
Fresnel diffractions
Aperture
a
a' d
P
d'
S
0
0
n^ r n^ r
I F ¼ cos R n; ^ r cos R n; ^r ¼ 0
jn^j jrj jn^jjr j
|{z} ð2:259Þ
0 0
¼1
¼ n^ r^ n^ r^ ; r^ ¼ r=jrj, r^ ¼ r =r
0 0
which is valid when both receiving point P and source point S are a few wave-
lengths away from the aperture, in so-called wave zone (kr
1).
Assuming that the inclination factor is nearly constant over the aperture, and
0
replacing U0 ejωt ejkr =r 0 with Uinc (r0 ), Eq. (2.261) can be rewritten as:
þ
jk ejkr
UP ¼ I F U inc ðr0 Þ dS, ð2:261Þ
4π r
S
þ 0 0 ejkr
jk
U P ¼ I F U inc r τ r dS, ð2:262Þ
4π r
S
For a biconvex lens, with corresponding curvatures being R1 and –R2, the transmis-
sion function will be:
ρ2
jknðt1 þt2 Þ jkðn1Þ 2 R1 R2 1 1 1
1 1 ρ2
τ ð ρÞ ¼ e e ¼ ejknðt1 þt2 Þ ejk 2f , ¼ ð n 1Þ ,
f R1 R 2
ð2:265Þ
where f, known as the focal length, is related to the net curvature of the wavefront.
We now discuss the Fresnel and Fraunhofer approximations with more details.
For this purpose, in Fig. 2.17, we provide the coordinate systems for source, screen,
and observed planes. The point source in source plane is denoted with S, one
particular point in aperture is denoted by Q, and the receiving point is denoted by
P. Since we have changed the direction of some position vectors to facilitate
explanations, Eq. (2.262) is rewritten below to match the notations in Fig. 2.16:
þ jkr
jk e ejks
UP ¼ U0 IF U0 τðr0 Þ dS: ð2:266Þ
4π r s
S
The position vector of the aperture point Q with respect to the source point S is
denoted by r, while r0 denotes the origin in screen plane with respect to the source
point P. The position of the aperture point Q in screen plane is denoted by ρ. These
three vectors are related as:
82 2 Propagation Effects in Optical and Wireless Communications. . .
r ¼ r0 þ ρ, ð2:267Þ
r 0 ρ ρ 2 ð r 0 ρÞ 2 0 ρ 2 ð r 0 ρÞ 2
r ’ r0 þ þ ¼ r 0
þ ^
r ρ þ : ð2:269Þ
r0 2r 0 2r 0 3 2r 0 2r 0 3
which is the same expression as given by Eq. (2.268). By applying the Fresnel
approximations:
1. The coarse approximation in amplitude: 1/r 1/r0
2. The fine approximation in phase:
0
2
0 0ρ2 r^ ρ
kr ffi kr þ k^
r ρþk , ð2:271Þ
2r 0
where exp( jkr0 )/r0 term represents the spherical wave at the aperture origin, exp
0
0
rn ρh
jk^ corresponds i too the plane wave in direction of r^ , and
2
exp jk ρ2 r^0 ρ =ð2r 0 Þ represents the lowest order phase approximation of
the spherical wavefront. By applying this phase approximation of the spherical
wave exp( jks)/s, we obtain:
2 ðrP 2 ρÞðrP 2 ρÞ 3
zfflfflfflfflffl}|fflfflfflfflffl{ 0 2 7
6
0
ejks ejks jk^s 0 ðrP 2 ρÞ 6jk jrP 2 ρj2 r^ ðrP 2 ρÞ 7
ffi 0 e 6
exp6 7: ð2:273Þ
s s 2s0 7
4 5
By substituting Eqs. (2.272) and (2.273) into Eq. (2.266), we obtain the following
diffraction integral of a point source in Fresnel approximation:
Fig. 2.17 Coordinate systems and geometry for Fresnel and Fraunhofer approximations
84 2 Propagation Effects in Optical and Wireless Communications. . .
0
2
0 0 þ ρ2 r^ ρ
þ
ðrP 2 ρÞ2 ½r^0 ðrP 2 ρÞ2
jk ejkðr þs Þ 0
jk 2r 0 2s0
U P ðr; sÞ ¼ I F U 0 0 0 ejk^s rP τðrÞejqρ e dS,
4π rs
S
ð2:274Þ
r 0 k^
q ¼ k^ s0: ð2:275Þ
0
In Eq. (2.274), the term(ejk^s rP represents the plane wave incident at receiving point
0
2 0 2 )
ρ r^ ρ
2
ðrP 2 ρÞ r^ ðrP 2 ρÞ
2
P, while the term exp jk þ represents
2r 0 2s0
the wavefront curvature correction factor.
When the wavefront curvature factor can be ignored, in the far-field, the Fraun-
hofer diffraction integral is obtained:
þ
U P ðr; sÞ ¼ ðconstantÞ τðrÞejqρ dS, ð2:276Þ
S
which also represents the two-dimensional (2-D) Fourier transform of the aperture
transmission function τ(r). Fresnel and Fraunhofer diffraction integrals can also be
used to study the propagation of the light beam in the free-space.
Fraunhofer diffraction integral for a rectangular aperture of dimensions 2a
(in ξ-coordinate) 2b (in η-coordinate) yields to:
0 0 ða ðb
jk ejkðr þs Þ
U P ðr; sÞ ¼ I F U0 0 0 ejk^s 0 rP ejðqx ξþqy ηÞ dξdη
4π rs
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} ð2:277Þ
a b
ðconstantÞ
¼ ðconstantÞ2sincðqx aÞsinc qy b ,
0 0
2ðπ ð
a
jk ejkðr þs Þ 0
UP ðr; sÞ ¼ I F U 0 0 0 ejk^s rP ejqρ cos ϕ ρdρdϕ
4π rs
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} 0 0 ð2:279Þ
ðconstantÞ
2J 1 ðqaÞ
¼ ðconstantÞπa2 ,
qa
2.2 Propagation of Electromagnetic Waves 85
where J1(x) is the Bessel function of the first kind and the first order [14]. The
corresponding intensity, given by:
2J 1 ðqaÞ
2
I ð qÞ ¼ I ð 0Þ , I 0 ¼ jðconstantÞj2 πa2 , ð2:280Þ
qa
is commonly referred to as the Airy pattern. For a small diffraction angle θ, the
following is valid q ’ kθ. The first zero of J1(x) is 1.22π, so that qa ’
(2π/λ)θ0a ¼ 1.22π, and we can write:
λ λ
θ0 ’ 1:22 ¼ 1:22 , d ¼ 2a, ð2:281Þ
2a
|{z} d
d
In this section we are concerned with the laser beam propagation over the random
inhomogeneous medium, namely, the atmospheric turbulence channels. Let us
introduce the slow-varying envelope of the electric field vector E(r,t) as follows:
where e is the polarization vector. After substitution of Eq. (2.282) into the wave
equation and upon canceling the common e exp(jωt) term, we obtain:
∇2 EðrÞejkz þ k2 n2 ðrÞEðrÞejkz ¼ 0, ð2:283Þ
where the refractive index now is a function of the position vector r. By applying
the definition of Laplacian and canceling the common exp(jkz) term, we obtain:
!
∂
2
∂
2
∂ ∂
2
þ E ð rÞ 2jk E ð r Þ þ EðrÞ þ k2 n2 ðrÞ 1 EðrÞ ¼ 0, ð2:284Þ
∂x2 ∂y2 ∂z ∂z2
|fflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl}
∇2⊥
2 2
where we use ∇2⊥ ¼ ∂ =∂x2 þ ∂ =∂y2 to denote the
transverse part of the
Laplacian. In the paraxial approximation, when R k; z^
1, the derivative of E
is the slow-varying function of z so that the following is valid:
86 2 Propagation Effects in Optical and Wireless Communications. . .
∂2 ∂
,
2 E ð r Þ
2k E ð r Þ ð2:285Þ
∂z ∂z
and the third term in Eq. (2.284) can be neglected, and the wave equation
reduces to:
∂
∇2⊥ EðrÞ 2jk EðrÞ þ k2 n2 ðrÞ 1 EðrÞ ¼ 0, ð2:286aÞ
∂z
∂
2jk EðrÞ ¼ ∇2⊥ þ 2k2 δnðrÞ EðrÞ, ð2:286bÞ
∂z
providing that δn
1. To solve the paraxial wave equation, the finite-difference
method can be used [15]; however, the complexity of such approach is high. The
most common method to study the propagation over the atmospheric turbulence
channels is the Fourier split-step beam propagation method [16–24]. The key idea
behind this algorithm is to split the atmospheric turbulence link into sections of
length Δz each and perform integration of the paraxial wave (Eq. (2.286)) on each
section. The parabolic Eq. (2.286) on section of length Δz can be solved by
separation of variables:
∂EðrÞ 1 2
¼ ∇⊥ þ 2k2 δnðrÞ ∂z: ð2:287Þ
EðrÞ 2jk
By performing the integration over the i-th section, from zi to zi+1, we obtain:
zð
iþ1 zð
iþ1
dEðrÞ j 2
dz ¼ ∇⊥ þ 2k2 δnðrÞ dz : ð2:288Þ
Eð r Þ 2k
zi zi
|fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
h Ð ziþ1 i
ln ½EðrÞj iþ1
z
z j
i ∇2 Δzþ2k 2 δnðrÞdz
2k ⊥ zi
This notation is consistent with that used in fiber-optics communications [2, 4]. The
Taylor expansion can be used to represent the operators in exponential form:
X
1
exp½DðΔzÞ þ ℛðzi ; ziþ1 Þ ¼ ½DðΔzÞ þ ℛðzi ; ziþ1 Þn =n! ð2:292Þ
n¼0
Instead of Taylor expansion, the following two methods known as symmetric split-
step method (SSSM) and asymmetric split-step method (ASSM) are commonly
used in practice:
eDðΔz=2Þ eℛðzi ;ziþ1 Þ eDðΔz=2Þ Eðx; y; zi Þ, for SSSM
Eðx; y; ziþ1 Þ ¼ ð2:293Þ
eDðΔzÞ eℛðzi ;ziþ1 Þ Eðx; y; zi Þ, for ASSM
eA eB ¼ eAþBþ2½A;Bþ12½A;½A;B12½B;½A;B,
1 1 1
ð2:294Þ
eDðΔz=2Þ eℛðzi ;ziþ1 Þ eDðΔz=2Þ ’ eDðΔzÞþℛðzi ;ziþ1 Þþ 6½ℛðzi ; ziþ1 Þ þ DðΔz=2Þ½ℛðzi ; ziþ1 Þ; DðΔz=2Þ þ
1
ð2:295Þ
For sufficiently small step Δz, both diffraction and refraction operators are propor-
tional to Δz indicating that the accuracy of ASSM is in the order of (Δz)2, while the
accuracy of SSSM is in the order of (Δz)3. Therefore, the accuracy of SSSM is
better. The SSSM can be illustrated as shown in Fig. 2.18. The algorithm proceeds
by first applying the diffraction operator D for one half-step length (Δz/2). Then the
refraction operator ℛ is applied for one step length Δz. The linear operator is again
applied for the full step-size Δz. Therefore, the diffraction operator is applied at
every half-step (Δz/2), while the refraction operator at every full step (Δz).
88 2 Propagation Effects in Optical and Wireless Communications. . .
D Δz
The diffraction and refraction operators can also be defined in exponential form
[20, 21]. If the refraction operator R and the diffraction operator D in exponential
form are defined as follows:
ð ziþ1
j
R ðzi ; ziþ1 Þ ¼ exp jk δnðrÞdz , DðΔzÞ ¼ exp Δz∇⊥ ,
2
ð2:296Þ
zi 2k
Let us now return to Fig. 2.17 and observe the normal incidence case for which
the inclination factor is IF ¼ 2. If the aperture is so large that can be considered as a
plane so that τ(r0 ) ¼ 1. For this case, Eq. (2.266) becomes:
þ jkðrþsÞ þ jkðrþsÞ
2π=λ e j e
UP ¼ j 2U 0 dS ¼ U 0 dS: ð2:298Þ
4π rs λ rs
S S
And this equation describes the free-space propagation from a point source to the
screen plane and from the screen plane to the receiving point P. By denoting the
terms incident to the screen plane as Uinc, the Fresnel diffraction integral describing
the propagation from the screen plane to the observation plane can be written as:
2.2 Propagation of Electromagnetic Waves 89
yi+1
0 þ
j ejks ðrP ρÞ2
UP ¼ U inc ðρÞejk 2s0 dS: ð2:301Þ
λ s0
S
For paraxial approximation, as shown in Fig. 2.19, we can see that Eq. (2.301) can
be represented in the following form:
þ ðρiþ1 ρi Þ2
j ejkðziþ1 zi Þ jk
U ρiþ1 ¼ Uðρi Þe 2ðziþ1 zi Þ
dS i, ð2:302Þ
λ ziþ1 zi
Si
where zi + 1 zi is the spacing between the observation planes i and i+1 and while
ρ ¼ x^x þ y^y is the transversal radius vector. This equation is widely used in the
existing literature [21, 26]. The Fresnel diffraction integral for paraxial approxi-
mation in Cartesian coordinates can be straightforwardly obtained from
Eq. (2.302):
ð
1 ð
1
j ejkΔz ðxiþ1 xi Þ2 þðyiþ1 yi Þ2
U xiþ1 ; yiþ1 ¼ U ðxi ; yi Þejk 2Δz dxi dyi : ð2:303Þ
λ Δz
1 1
90 2 Propagation Effects in Optical and Wireless Communications. . .
ð 1
1 ð
j ejkΔz jk xiþ1 þyiþ1
2 2
x2i þy2i 2π xi xiþ1 þyi yiþ1
U xiþ1 ; yiþ1 ¼ e 2Δz Uðxi ; yi Þejk 2Δz ej λ Δz dxi dy
λ Δz i
1 1 2 0 13
ð 1
1 ð 6 Bx
j ejkΔz jk xiþ1 þyiþ1 x2 þy2 yiþ1 C 7
2 2
jk i2Δz i 6 B iþ1 C7
¼ e 2Δz U ðx i ; y i Þe exp6j2π B xi þ yi C7dxi dyi
λ Δz 4 @|{z}
λΔz λΔz A5
|{z}
1 1
fx fy
iþ1 iþ1
je
¼ ejk 2Δz U ðx i ; yi Þejk 2Δz ej2π f xiþ1 xi þf yiþ1 yi dxi dy
λ Δz i
1 1
ð2:304Þ
where f xiþ1 ¼ xiþ1 =ðλΔzÞ and f yiþ1 ¼ yiþ1 =ðλΔzÞ are spatial frequencies along x- and
y-axes, respectively. Equation (2.304) can be interpreted
as the two-dimensional
(2-D) Fourier transform (FT) of U ðxi ; yi Þexp jk x2i þ y2i =ð2ΔzÞ . The 2-D FT
employing 1-D fast Fourier transform (FFT) algorithms can be used for this purpose
as explained in [27]. Alternatively, efficient multidimensional FFT algorithms can
be used [28]. We can also interpret Eq. (2.305) as the convolution operation:
ejkΔz jkx2i þy2i
U xiþ1 ; yiþ1 ¼ U ðxi ; yi Þ e 2Δz , ð2:305Þ
Δz
Given that FT of the second term in Eq. (2.305) can be determined in closed
form by:
h iT
ejkΔz jkx2i þy2i jπλΔzðf 2x þf 2y Þ
H ðfÞ ¼ FT e 2Δz ¼ ejkze f ¼ f xi f yi , ð2:307Þ
i i
,
Δz
Eq. (2.306) can be written in the form more suitable for numerical computation:
jπλΔzðf 2
xi þf yi Þ
2
X
N=2 X
N=2
Emn ðzÞej½ L ðmxþnyÞ ,
2π
Eðx; y; zÞ ¼ ð2:309Þ
m¼N=2þ1 n¼N=2
ðL ðL
1
Eðx; y; zÞej½ L ðmxþnyÞ ,
2π
Emn ðzÞ ¼ 2 2 ð2:310Þ
4π L
0 0
wherein L is the size of the expansion domain and N is the number of terms in each
dimension. By substituting the Fourier series expansion (Eq. (2.309)) into the
paraxial wave (Eq. (2.286)) (by ignoring the refraction term) and after cancelation
of common terms, we obtain:
∂ 4π 2 2
This approach appears to be conceptually simpler and requires the Fourier expan-
sion coefficients to be calculated only once, before transmission takes place at
z ¼ 0. On the other hand, we need to compute N2 expansion coefficients.
To solve for the refraction problem in the i-th layer of SSSM, we need to
determine the variation of the refractive index δn(r), and the refraction effect can
be described by passing the beam through the phase screen as follows:
92 2 Propagation Effects in Optical and Wireless Communications. . .
zð
iþ1
and the refraction operator can be determined based on Eq. (2.296) as:
ð ziþ1
Rðzi ; ziþ1 Þ ¼ exp jk δnðrÞdz ¼ exp½jφi ðρÞ: ð2:314Þ
zi
This approach can be used to study the thermal blooming of the high-power laser
beams as described in [20]. Here we are concerned with a fundamental problem that
occurs during free-space propagation of the laser beam, even under clear weather
conditions, namely, so-called atmospheric turbulence [4, 20, 21, 30–40]. A com-
monly used turbulence model assumes that the variations of the medium can be
understood as individual cells of air or eddies of different diameters and refractive
indices. In the context of geometrical optics, these eddies may be observed as lenses
that randomly refract the optical wavefront, generating a distorted intensity profile
at the receiver of a communication system. The intensity fluctuation is known as
scintillation and represents one of the most important factors that limits the perfor-
mance of an atmospheric FSO communication link. The most widely accepted
theory of turbulence is due to Kolmogorov [41–43]. This theory assumes that
kinetic energy from large turbulent eddies (pockets of air, vortices), characterized
by the parameter known as the outer scale L0, is transferred without loss to the
eddies of decreasing size down to sizes of a few millimeters characterized by the
inner scale parameter l0. The inner scale represents the cell size at which energy is
dissipated by viscosity. The refractive index varies randomly across the different
turbulent eddies and causes phase and amplitude variations to the wavefront.
Turbulence can also cause the random drifts of optical beams – a phenomenon
usually referred to as wandering – and can induce the beam defocusing. Clearly, the
longitudinal variation in the refractive index is in the scale of l0, which is typically
much smaller than the longitudinal discretization step Δz, indicating that
Eq. (2.313) cannot be determined in the closed form. Instead, the statistical methods
must be used to properly describe the turbulent fluctuations of the refractive index.
The correlation function of the random phase fluctuation appears to be a good
starting point [20]:
Based on Eq. (2.315), the spectral density of random process φ, denoted as Φφ,
given as the FT of the correlation function Rφ, can be related to the 3-D spectral
density of refractive index, denoted as Φn. For von Karman spectrum of atmo-
spheric turbulence, to be described below, it has the following form [20]:
2.2 Propagation of Electromagnetic Waves 93
Φφ ðκÞ ¼ FT Rφ ðρÞ ¼ 2πk2 ΔzΦn ðκ⊥ ; κz ¼ 0; L0 ÞK ðκ; L0 =ΔzÞ, ð2:316Þ
∂u ∇p
þ ðu∇Þu ¼ þ ν∇2 u, ð2:317Þ
∂t ρ
where u is the velocity vector of the fluid pocket, p is the pressure, and ν is the
kinematic viscosity equal to 1.51105 m2/s for the air (and 1.01106 m2/s for
water). To solve the Navier-Stokes equations in turbulence regime on eddies level,
it would be quite challenging. Instead the ensemble average properties should be
studied as suggested by Kolmogorov in 1941 [41]. The turbulence can be consid-
ered as the collection of eddies of different sizes embedded in each other, changing
in a random fashion. Even under laboratory conditions, it would be quite challeng-
ing to reproduce the detailed velocity’s distribution. The turbulent motions span a
wide range of eddies sizes r, ranging from macroscale at which the energy is
supplied, all way down to the microscale at which the energy is dissipated by
viscosity. The average size of the largest eddies, denoted as L0, is called the outer
scale. On the hand, the average size of smallest eddies, denoted as l0, is called the
inner scale. The range for which l0
r
L0 is known as the inertial range.
Finally, the range for which r < l0 is known as the viscous dissipation range. A
parameter that can be used as a control parameter of the flow is known as Reynolds
number, denoted as Re, and defined as [41]:
LU
Re ¼ , ð2:318Þ
ν
where L is the characteristic geometric size (length) of the system and U is the
characteristic velocity. The Reynolds number, for a turbulent flow to occur, must be
very large so that the kinetic energy of the source, such as wind, is sufficiently high
to generate the so-called energy cascade. According to this model, the kinetic
energy of the external source excites the largest possible eddies L0; the energy
from these eddies is gradually passed to smaller eddies, all the way down to the
94 2 Propagation Effects in Optical and Wireless Communications. . .
inner scale l0 when the energy is dissipated by the viscosity. As an illustration, for
height of 1 km above the ground and a typical wind speed of 10 m/s, the Reynolds
number is huge Re ¼ 6.6108, so that the conditions for turbulence to occur are not
that difficult to satisfy. If the state of turbulence is statistically steady, then the rate
of energy transfer, denoted as є, from one sale of eddies to the next must be the
same for all scales so that eddies within the same scale see the same total energy. In
this scenario, the energy rate transferred from the source to the largest eddies (L0) is
the same as the energy dissipated at the shortest scale (l0). The unit of the energy
supplied to fluid per unit mass and time is єu ¼ kg m2 s2/(kg s) ¼ m2 s3. The
characteristics of eddies of scale r depend on angular speed u and energy cascade
rate E. Since the unit of speed is uu ¼ m/s, while unit of scale is ru ¼ m, the only
dimensionally acceptable relationship among u, r, and E is:
So the larger the energy transfer rate, the larger the speed of eddies is. The
implication of this is that the largest eddies (with scale L0) contain the bulk of
kinetic energy, while the smallest eddies (with scale l0) have the lowest speeds.
Additionally, greater energy transfer will generate stronger eddies. Clearly, the
largest eddies cannot be larger than the geometrical dimension of the system, so
L0 L. So the outer scale can be estimated as the cubic root of the volume of the
system. On the other hand, the inner scale is set up by viscosity, because the smaller
the eddy size, the stronger velocity shear and more important the viscosity is. The
unit of kinetic viscosity is νu ¼ m2/s, as already indicated above. Therefore, the
inner scale l0 must be dependent on kinetic viscosity and the energy transfer rate, so
that the only dimensionally acceptable relationship is as follows:
and often we refer to the inner scale as the Kolmogorov’s length. Given the energy
cascade discussion, the span of eddies’ sizes is related to the Reynolds number.
Based on Eq. (2.319) U ¼ u(L0) ~ E1/3L1/3, and from the definition of Reynolds
number, we conclude that the energy supply/dissipation rate can be estimated as:
U3
E ð2:321Þ
L
Now based on Eqs. (2.320) and (2.321) as well as the definition of Reynolds
number, we conclude that:
L
l0 : ð2:322Þ
Re3=4
For the example above, we calculate that inner scale is ~0.24 mm and energy
dissipation rate is ~1 m2/s3.
2.2 Propagation of Electromagnetic Waves 95
dE ¼ EðkÞdk: ð2:323Þ
Since the unit of E(k) is m3/s2, we conclude that only dimensionally correct
relationship between E(k), E, and k is:
ð
1
U2
EðkÞdk ¼ : ð2:325Þ
2
kmin
Du ðr Þ ¼ C2u r 2=3 , l0
r
L0 , ð2:328Þ
96 2 Propagation Effects in Optical and Wireless Communications. . .
and the constant C2u ¼ C2 ε2=3 is known as the velocity structure parameter. For
laminar flow, when r
l0, the dependence in scale r is quadratic:
4=3 2
Du ðr Þ ¼ C2u l0 r , 0 r
l0 : ð2:329Þ
Obukhov has shown in [45] that the potential temperature, defined as θ ¼ T + ahh
(h is the height and ah is the adiabatic rate of temperature decrease with height),
structure parameter is similar to that of the velocity. The adiabatic rate is negligible
for small heights, close to the ground. The refractive index in point r in the
atmosphere can be represented as:
b pð r Þ
nðrÞ ¼ hnðrÞi þδnðrÞ ¼ 1 þ a 1 þ 2 ð2:330Þ
|fflffl{zfflffl} λ T ðrÞ
ffi1 |fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflffl}
δnðrÞ
where p denotes the pressure and T denotes the absolute temperature (in K ). The
constants a and b at optical frequencies are found to be [21, 30]: a ¼ 77.6106 and
b ¼ 7.52103. The total differential of the refractive index is given by:
b dP dT
dn ¼ a 1 þ 2 2 , ð2:331Þ
λ T T
and since it is directly proportional to dT, we expect the same behavior for the
refractive index structure parameter:
8
< C2n r 2=3 , l0
r
L0
Dn ðr Þ ¼ ð2:332Þ
: 2 4=3 2
Cn l0 r , 0 r
l0
where the refractive index structure parameter C2n [m2/3] is given by:
b p 2
C2n ¼ C2T a 1þ 2 : ð2:333Þ
λ T
The typical values for the refractive index structure parameter C2n are in the range
[1017, 1013] m2/3.
Based on Eq. (2.330), we conclude that the refractive index can be represented as
the sum of mean value and fluctuating part, so that the corresponding covariance
function points r0 and r0 + r are given by:
r between two points, the covariance function is only dependent on r, and by taking
Eq. (2.330) into account, we can rewrite previous equation as:
The correlation function and the spectral density represent the Fourier transform
pair, according to the Wiener-Khintchine theorem [48, 49]. Notice that in optics and
physics, the definitions of Fourier transform (FT) and inversed Fourier transform
(IFT) [2, 30, 33, 47] are reversed compared with corresponding definitions in
electrical and computer engineering [48–50]. To be consistent with reached liter-
ature on atmospheric turbulence effects [2, 12, 26, 30, 32–34, 47, 51], in this
section, we adopt corresponding definitions used in optics. The spectral density
Φn(κ) is related to the covariance function Cn(r) as follows:
ð ð
1 jκr 3 1
Φ n ð κÞ ¼ Cn ð r Þe d r ¼ Cn ðrÞ cos ðκ rÞd 3 r ð2:336aÞ
ð2π Þ3 ð2π Þ3
On the other hand, the autocorrelation function is related to the spectral density by:
ð ð
Cn ðrÞ ¼ Φn ðκÞejκr d3 κ ¼ Φn ðκÞ cos ðκ rÞd 3 κ ð2:337aÞ
and
ð
4π
Cn ðrÞ ¼ Φn ðκÞ sin ðκr Þκdκ: ð2:337bÞ
r
By using Eq. (2.337), we can relate the refractive index structure function to the
spectral density as follows:
2 3
6 7
6 7
6 1 7
6 ð sin ðκr Þ
ð
1
7
6 4π 7
Dn ðr Þ ¼ 264π Φn ðκ Þ lim κ dκ
2
Φn ðκ Þ sin ðκr Þκdκ 7
6 r!0 κr r 7
6 0 |fflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl} 7
6
0 7 ð2:339Þ
4 κ cos ðκr Þ 5
lim ¼1
r!0 κ
ð
1
sin ðκr Þ 2
¼ 8π Φn ðκÞ 1 κ dκ :
κr
0
The term [1sin(κr)/(κr)] has a filtering properties and severely attenuation spatial
frequencies for which κ < r1; in other words, the spatial frequencies with periods
being larger than the spacing between observation points. To avoid for this prob-
lem, we can employ the Tatarskii’s approach [51]. By taking the Laplacian of
Eq. (2.338), we obtain:
ð
ΔDn ðrÞ ¼ ∇ð∇Dn ðrÞÞ ¼ ∇ 2 Φn ðκÞ sin ðκ rÞκd κ
3
ð
¼ 2 Φn ðκÞ cos ðκ rÞ |{z}
κκ d3 κ ð2:340Þ
κ2
ð2:341Þ
ð
1
1 sin ðκr Þ d 2 d
Φn ðκ Þ ¼ 2 2 r Dn ðr Þ dr, ð2:343Þ
4π κ κr dr dr
0
By using the following approximation for the modified Bessel function Kυ(u) {π/
[2 sin(υπ)]}{[1/Γ(1 υ)](z/2)υ [1/Γ(1 + υ)](z/2)υ}which is valid for r
r0, we
obtain the following approximation for the structure function:
Γ ð1 υÞ r 2υ
Dðr Þ ’ 2a2 , r
r0 : ð2:346Þ
Γ ð1 þ υÞ 2r 0
Γ ð1υÞ
By introducing the substitutions C2 ¼ 2a2 Γð1þυ Þð2r Þ2υ
, μ ¼ 2υ, we can rewrite
0
Dðr Þ ’ C2 r μ , ð2:347Þ
which is consistent with the refractive index structure function (Eq. (2.332)), by
setting μ to either 2/3 or 2. Since the approximation (Eq. (2.346)) is valid for r
r0,
or equivalently κ
1/r0, the corresponding approximation for spectral density,
based on Eq. (2.344), becomes:
100 2 Propagation Effects in Optical and Wireless Communications. . .
The refractive index spectral density based on Eqs. (2.344) and (2.348) can be
written as:7
8
> _
>
>
0:033005391
zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{
>
>
>
< Γ ð2=3 þ 2Þ sin ðπ=3Þ 2 11=3
Φðκ Þ ¼ Cn κ , 2π=L0
κ
2π=l0
> 4π 2
>
>
>
> Γ ð4Þ 2 4=3 5
>
: ð2:349Þ
C l κ , κ
2π=l0
4π 2 n 0
(
0:033005391C2n κ11=3 , 2π=L0
κ
2π=l0
¼ ;
4=3 5
0:151981775C2n l0 κ , κ
2π=l0
The spectrum given by Eq. (2.350), for which κ0 ¼ 0, is known as the Tatarskii
spectrum [62]. Clearly, by setting l0 ¼ 0, and L0 ! 1, the Kolmogorov spectral
density is obtained. Another relevant spectral density is Andrews spectral density,
representing the generalization of the modified von Kármán spectral density [52]
and providing nice agreement with experimentally verified Hills spectrum:
h i
11=6 κ2 =κ2
Φðκ Þ ¼ 0:033C2n 1 þ 1:802ðκ=κ l Þ 0:254ðκ=κ l Þ7=6 κ2 þ κ 20 e l , κ l ¼ 3:3=l0 :
ð2:351Þ
10
5 l0 = 5 mm
L0 =10 m
0
10
2
Fn / 0.033 Cn
-5
10
-10
10
Kolmogorov spectrum
-15
10 modified von Karman spectrum
Andrews spectrum
Tatarskii spectrum
-20
10
-2 -1 0 1 2 3 4
10 10 10 10 10 10 10
Spatial frequency, k [rad/m]
refractive index, which is locally a correct relationship. Since the refractive index
structure parameter is propagation distance dependent, we have to perform the
integration over z so that the following relationship is obtained for Kolmogorov
spectral density:
ðz
Δ
11=3
Φφ ðκÞ ¼ 2πk 0:033005391κ
2
C2n ðzÞdz: ð2:352Þ
0
By taking the zenith-angle ζ into account, Eq. (2.352) can also be written in more
common form as follows:
8 95=3
>
> >
>
> 2 33=5 > >
>
>
< ðz
Δ >
=
2π 0:033005391 11=3 4 5
Φφ ðκÞ ¼ κ 0:423k sec ðζ Þ Cn ðzÞdz
2 2
0:423
|fflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflffl} >
> >
>
>
> >
>
0:490258 :|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} >
> 0
;
r0
2 33=5
ð
Δz
By following the similar derivation, as for Kolmogorov spectral density, the phase
spectral density for the modified von Kármán refractive index is given by:
ð
1 ð
1
φðx; yÞ ¼ e f x ; f y ej2πðf x xþf y yÞ df x df y :
φ ð2:356Þ
1 1
The total power in the phase screen can be determined by employing the Parseval’s
theorem by:
ð
1 ð
1 ð
1 ð
1
2
Ptotal ¼ jφðx; yÞj dxdy ¼ Φφ f x ; f y df x df y : ð2:357Þ
1 1 1 1
ð
1 ð
1
X X
Ptotal ¼ Φφ f x ; f y df x df y ; m n
Φ φ mΔf x ; nΔf y Δf x Δf y , ð2:358Þ
1 1
where Δfx and Δfy are frequency spacings along fx- and fy-axes. On the other hand,
by applying the trapezoidal rule on Eq. (2.356), we obtain:
X X
φðx; yÞ ’ m n
e
φ mΔf x ; nΔf y ej2π ðf x xþf y yÞ Δf x Δf y : ð2:359Þ
2.2 Propagation of Electromagnetic Waves 103
To generate the random phase screen, we can use the Gaussian random generator
with zero mean and unit variance and multiply the samples with the square root of
variance given by Eq. (2.360). On such a way, we can generate the samples for 2-D
random phase screen. Now we have everything needed to implement the symmetric
split-step method. The main drawback of this method random phase screen gener-
ator is the low accuracy of the trapezoidal rule. To improve the accuracy, the
Zernike polynomial-based approach can be used [20, 54]. Alternatively, the
nonuniform sampling can be employed and sample low spatial frequencies more
precisely [55, 56]. Finally, the subharmonic method can be used [57] (see also [21]).
In subharmonics’ method, the low-spatial-frequency phase screen is a sum of Np
phase screens with different accuracy levels [21, 57]:
Np X
X 1 X
1
φLSF ðx; yÞ ¼ e mΔf xp ; nΔf yp ej2π ðf x xþf y yÞ Δf xp Δf yp ,
φ ð2:361Þ
p¼1 m¼1 n¼1
where the frequency spacing for the p-th frequency grid is set to Δf xp ¼ Δf yp ¼ Δf
=bp , with Δf being the frequency spacing used for medium and high spatial
frequency ranges, and b b denotes the size of grid in the p-th frequency grid.
As it has been shown in [21, 57], the subharmonics’ method can significantly
improve the accuracy of random phase screen generation.
We turn our attention now back to the correlation function of the random phase
correlation, given by Eq. (2.315):
ð ð
R φ ð ρÞ ¼ k 2 hnðρ0 ; zi þ z0 Þnðρ0 þ ρ; zi þ z00 Þidz0 dz00
Δz Δz
ð ð
¼ k2 Rn ðρ; z00 z0 Þdz0 dz00 : ð2:362Þ
Δz Δz
When Δz is much larger than the correlation length of the refractive index, the
00
autocorrelation function of the refractive index can be written as Rn(ρ, z z0 ) ¼
00 00
Rn(ρ, z )Δzδ(z z0 ), and after extending the limits of integration and applying the
sifting property we obtain:
ð
1
Rφ ðρÞ ¼ k Δz
2
Rn ðρ; zÞdz: ð2:363Þ
1
Given that the 〈δn〉 ¼ 0, we conclude that Cn(ρ, z) ¼ Rn(ρ, z) and consequently
Cφ(ρ) ¼ Rφ(ρ). The structure function of the random phase can now be written as:
104 2 Propagation Effects in Optical and Wireless Communications. . .
ð
1
Dφ ðρÞ ¼ 2 Cφ ð0Þ Cφ ðρÞ ¼ k Δz 2
2½Cn ð0; zÞ Cn ðρ; zÞdz
8 1 9
ð
1 > > ð2:364Þ
< =
¼ k2 Δz 2 ½Cn ð0; 0Þ Cn ðρ; zÞ 2 ½Cn ð0; 0Þ Cn ð0; zÞ dz
>
: |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} >
;
1 Dn ðρ;zÞ Dn ð0;zÞ
ð
1
n o
1=3
D φ ð ρÞ ¼ k 2
ΔzC2n ρ2 þ z 2 z2=3 dz ¼ 2:914k2 ΔzC2n ρ5=3 : ð2:365Þ
1
ð
1 5=3
ρ
Dφ ðρÞ ¼ 2:914k sec ðζ Þρ 2 5=3
C2n ðzÞdz ¼ 6:889 : ð2:366Þ
r0
0
A stellar separation of θ rad corresponds to the optical path from the stars to the
telescopes through the single layer of atmospheric turbulence at the height Δh
above the telescope, and we can write ρ ¼ θ Δh secζ. By substituting this value of ρ
into Eq. (2.362), we obtain:
Ð1 5=3
Dφ ðρÞ ¼ 2:914k2 sec 8=3 ðζ Þθ5=3 0 C2n ðzÞz5=3 dz ¼ θθ0 ,
Ð ð2:369Þ
1 3=5
θ0 ¼ 2:914k2 sec 8=3 ðζ Þ 0 C2n ðzÞz5=3 dz ,
2.2 Propagation of Electromagnetic Waves 105
where θ0 represents the isoplanatic angle. Clearly, the isoplanatic angle is the angle
for which Dφ(ρ) ¼ 1 rad2.
One important method to study the laser beam propagation over atmospheric
turbulence channels is the Rytov method of small perturbations [58–62] (see also
[30, 47, 51]), in which the optical field in cylindrical coordinates r ¼ (ρ,L) (L-the
transmission distance) is represented as:
where U0(r) is the vacuum solution, while ψ(r) is used to denote the complex phase
perturbation. In Eq. (2.365), we use ψ i(r) to denote the i-th order perturbation.
These successive perturbations are used to determine the statistical moments of
ψ(r). The mean value of the optical field is given by 〈U(ρ, L )〉 ¼ U0(ρ, L)〈exp
[ψ(ρ, L )]〉. The mutual coherence function (MCF) is essentially the second moment
of the optical field:
The normalized magnitude of the MCF is often called the modulus of the complex
coherence factor (or just the coherence factor):
jΓ ðρ1 ; ρ2 ; LÞj
γ ðρ1 ; ρ2 ; LÞ ¼ : ð2:372Þ
½Γ ðρ1 ; ρ1 ; LÞΓ ðρ2 ; ρ2 ; LÞ1=2
The coherence factor over homogeneous and isotropic turbulence is only a function
of a displacement, ρ ¼ |ρ| ¼ |ρ2 ρ1|, and for plane wave, we obtain:
8 9
< ðL 1
ð =
γ ðρ; LÞ ¼ exp 4π 2 k2 Φn ðκ; zÞ½1 J 0 ðκρÞdzdκ : ð2:373Þ
: ;
0 0
When Kolmogorov spectral density is used, the coherence factor simplifies to:
8 9
< ðL =
γ ðKolmogorovÞ ðρ; LÞ ¼ exp 1:457k2 ρ5=3 C2n ðzÞdz : ð2:374Þ
: ;
0
The spatial coherence radius of an optical wave can be defined as the e1 of the
coherence factor:
2 33=5
ðL
ρ0 ¼ 41:457k2 C2n ðzÞdz5 : ð2:375Þ
0
106 2 Propagation Effects in Optical and Wireless Communications. . .
where we use Dχ and DS to denote the log-amplitude and phase structure param-
eters, respectively. The phase spectral density is now related to the phase structure
function, based on Eq. (2.343), as follows:
2.2 Propagation of Electromagnetic Waves 107
ð
1
1 sin ðκr Þ d 2 d
ΦS ðκ Þ ¼ 2 2 r DS ðr Þ dr: ð2:381Þ
4π κ κr dr dr
0
Form this equation, the second moment of irradiance 〈I2(ρ1, L )〉, obtained from
Eq. (2.379) by setting ρ4 ¼ ρ3 ¼ ρ2 ¼ ρ1, is used to define so-called scintillation
index by:
2 2
I hI i2 I
σ 2I ¼ ¼ 1: ð2:383Þ
hI i2 hI i2
We are now concerned with the extended Rytov approximation to strong turbu-
lence. By close inspection on the modified von Kármán spectral density given by
Eq. (2.350), we notice that Tatarskii’s term exp(κ/κ m) corresponds to the large-
scale filter function spatial frequency cutoff κ m. On the other hand, the term
2
11=6
κ þ κ 20 corresponds to the small-scale filter function with spatial-frequency
cutoff κ0. By denoting the large-scale and small-scale cutoff spatial frequency by κx
and κy, respectively, we can generalize the Kolmogorov spectrum as follows:
108 2 Propagation Effects in Optical and Wireless Communications. . .
11=6
Φn ðκ Þ ¼ 0:033005391C2n κ11=3 eκ =κx þ 0:033005391C2n κ 2 þ κ2y
2 2
:
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
Φn, X ðκÞ
Φn, Y ðκÞ
ð2:386Þ
The small-scale effects are contributed by eddies of size smaller than small-scale
size lss defined by Eq. (2.387). On the other hand, the large-scale effects are
contributed by eddies of size larger than Lls, defined as:
pffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffi
lss ¼ min ρ0 ; L=k , Lls ¼ max L=k; L=ðkρ0 Þ : ð2:387Þ
Eq.ffi (2.387), ρ0 denotes the spatial coherence radius as defined by Eq. (2.375),
In ffiffiffiffiffiffiffi
p
L=k is related to the first Fresnel zone radius, and L/(kρ0) is related to the
scattering disk size. The addition operation in spectral density of random phase
indicates the product of random variables X and Y in irradiance I, namely, I ¼ XY. If
we assume that large-scale fluctuations, describing the refraction properties,
described by random variable X, and the small fluctuations, describing the diffrac-
tion properties, described by random variable Y, are mutually independent, in
statistical sense, the scintillation index can be written as follows:
σ 2I ðρ; LÞ ¼ X2 Y 2 1 ¼ 1 þ σ 2X 1 þ σ 2Y 1 ¼ σ 2X þ σ 2Y þ σ X σ Y : ð2:388Þ
αðαxÞα1 αx
f X ðxÞ ¼ e ; α > 0, X > 0
Γ ðαÞ
ð2:390Þ
βðβyÞβ1 βy
f Y ðyÞ ¼ e ; β > 0, Y > 0,
Γ ðβ Þ
βðβI=xÞβ1 βI=x
f IjX ðI Þ ¼ e : ð2:391Þ
Γ ðβ Þ
By averaging out over random variable X in conditional PDF (2.391), we obtain the
following PDF of irradiance I:
2.2 Propagation of Electromagnetic Waves 109
ð
1 ð
1
βðβI=xÞβ1 βI=x αðαxÞα1 αx
f ðI Þ ¼ f IjX ðI Þf X ðxÞdx ¼ e e dx
Γ ðβÞ Γ ðαÞ
0 0 ð2:392Þ
2ðαβÞ 2 αþβ1
αþβ
pffiffiffiffiffiffiffi
¼ I 2 K αβ 2 αβI ,
Γ ðαÞΓ ðβÞ
1 1 1
σ 2I ¼ þ þ : ð2:394Þ
α β αβ
By close inspection of Eqs. (2.389) and (2.393), we conclude that 1 þ 1=α ¼ exp
σ 2logX and 1 þ 1=β ¼ exp σ 2logY , and after rearranging we obtain:
h i1 h i1
α ¼ exp σ 2logX 1 ¼ σ 2
X , β ¼ exp σ 2logY 1 ¼ σ 2
Y : ð2:395Þ
∇2 U þ k2 n2 ðrÞU ¼ 0, ð2:396Þ
U ¼ U 0 þ U 1 þ U 2 þ ; jU mþ1 j
jU m j, m ¼ 0, 1, 2, . . . ð2:397Þ
Let us observe the first two terms initially U ffi U0 + U1, and after the substitution of
Eq. (2.396), we obtain the following two equations:
where we obtained these equations by setting to zero all terms of the order δn in the
approximation of the square refractive index (Eq. (2.330)):
Now by observing only Um and Um+1 terms, we can establish the identical
relationship:
ð
ejkjrr j 2 0 0 3 0
0
1
U mþ1 ðrÞ ¼ 0 2k δn r Um r d r ; m ¼ 0, 1, 2, . . . ð2:401Þ
4π V jr r j
In cylindrical coordinates, we can write r ¼ (ρ,z). Let us now apply the coarse
approximation in amplitude |rr0 | zz0 and fine approximation in phase as
follows:
" 0
2 0
4
#
0 ρρ ρρ
0
k r r ¼ k ðz z Þ 1 þ þ þ : ð2:402Þ
2ðz z0 Þ2 8ðz z0 Þ4
By normalizing the perturbations with U0(r), we can rewrite Eq. (2.402) as follows:
0 2
ðρρ Þ
U mþ1 ðrÞ k2
ð exp jk
2ðzz0 Þ
2 0 U r0
0
jkðzz0 Þ m
ffi e δn r d3 r ; m ¼ 0, 1, 2, . . .
U 0 ðrÞ 2π V z z0 U 0 ðrÞ
ð2:404Þ
2.2 Propagation of Electromagnetic Waves 111
For unbounded plane wave U0 ¼ exp(jkz0 ) and m ¼ 1, Eq. (2.404) simplifies to:
0 2
ðρρ Þ
ðplane waveÞ ð exp jk 0 0
ðrÞ k2 2ðzz0 Þ 2
U1
¼ δn r d 3 r : ð2:405Þ
U 0 ðzÞ 2π V z z0
By taking only the first two terms in expansion (2.397), the log-amplitude expres-
sion can be written as:
U0 þ U1
ψ ¼ χ þ jS ¼ log
U0
U1 jU 1 j
jU 0 j jU 1 j U1
¼ log 1 þ ’ þ jarg : ð2:406Þ
U 0 logðxÞxx =2 jU 0 j
2 U0
Under assumption that refractive index variation is only in the plane perpendicular
to the propagation direction, we can represent the refractive index variation as a 2-D
Fourier-Stieltjes transform [51] (see also [47]):
ð
δnðrÞ ¼ ejκρ dvðκ; zÞ, ð2:408Þ
where the random amplitude of the refractive index fluctuations has the following
correlation function:
0
∗ 0
0
0
dv κ; z dv ðκ; z00 Þ ¼ δ κ κ Fn κ ; z0 z00 d 2 κd2 κ ,
1ð 0
0
ð2:409Þ
Fn κ ; z0 z00 ¼ Φn κ ; κ z cos ½κ z ðz0 z00 Þdκz :
1
By substituting Eq. (2.408) into Eq. (2.407), and after performing the integration
with respect to ρ, we obtain the following solutions [51] (see also [47]):
112 2 Propagation Effects in Optical and Wireless Communications. . .
ð ðz
κ 2 ðz z0 Þ 0
χ¼ e jκρ
k sin dz dvðκ; z0 Þ,
2k
0
ð2:410Þ
ð ðz 2
κ ðz z0 Þ 0
S ¼ ejκρ k cos dz dvðκ; z0 Þ:
2k
0
ðz ðz 02
ÐÐ 0 κ 2 ðz z0 Þ κ ðz z00 Þ
Cχ ðρ; zÞ ¼ k2 ejκðρ1 þρÞjκ ρ sin sin
2k 2k
" 2 #
00
ðz ðz 00
0
Ð κ2 ðz z0 Þ κ zz
dz0 dz00 dvðκ;z0 Þdv∗ κ ;z00 ¼ ejκρ sin sin
2k 2k
00
Fn ðκ;z0 z00 Þdz0 dz00 d 2 κ
ð2:412Þ
00 00
For isotropic assumption, we have that Fn(κ, z0 z ) ¼ Fn(κ, z0 z ), and after
00 00
introducing the following substitutions z0 z ¼ ξ , z0 + z ¼ 2η (whose Jacobian is
1), we can write the amplitude spectrum as follows [47]:
ðL ð
Lξ=2 2
κ2 ξ κ ðL η Þ
Fχ ðκ; 0Þ ¼ k 2
cos cos Fn ðκ; ξÞdξdη ð2:413Þ
2k 2k
0 ξ=2
Under assumptions
ð ξ ¼ L , κ 2ξ/(2k) ¼ L, for sufficiently long propagation distance L,
1
we have that Fn ðκ; ξÞdξ ¼ πΦn ð0; κÞ ¼ πΦn ðκÞ so that Eq. (2.413) simplifies to:
0
Fχ ðκ; 0Þ ¼ πkL2 1 sin κ2 L=k = κ2 L=k Φn ðκÞ: ð2:414Þ
ð
1 2ðπ ð
1
1
Cχ ðρÞ ¼ 2π ejκρ cos ϕ dϕ Fχ ðκ; 0Þdκ ¼ 2π J 0 ðkρÞFχ ðκ; 0Þdκ, ð2:415Þ
2π
0 0 0
|fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflffl}
J 0 ðkρÞ
where J0() is the zero-order Bessel function of the first kind. By substituting
Eq. (2.414) into Eq. (2.415), we obtain the following expression for covariance
function of χ:
ð
1
sin ðκ 2 L=kÞ
Cχ ðρÞ ¼ 2π k L 2 2
1 J 0 ðκρÞΦn ðκÞκdκ, ð2:416Þ
κ 2 L=k
0
ð
1
sin ðκ2 L=kÞ
σ 2χ ¼ Cχ ð0Þ ¼ 2π k L 2 2
1 Φn ðκÞκdκ: ð2:417Þ
κ2 L=k
0
6π 2 3 2 7=3
σ 2χ ¼ 0:033 L Cn κm ¼ 0:214745L3 C2n κ7=3
m : ð2:419Þ
91
In this derivation, the following series expansions have been used: sin(x) x x3/6
and exp(x) 1 x. In weak turbulence regime, the cutoff spatial
pffiffiffiffiffiffiffi
ffi frequency κ m is
related to the first Fresnel zone radius by κ m ¼ 1:166336 k=L, and after substitu-
tion in Eq. (2.419), we obtain:
Based on Eq. (2.385), we obtain the following expression for scintillation index:
2
σ 2I ¼ e4σχ 1 ¼ exp 1:23C2n k7=6 L11=6 1: ð2:420aÞ
In weak turbulence regime, the following series expansion can be used exp
(x) 1 + x, so that Eq. (2.420a) simplifies to:
114 2 Propagation Effects in Optical and Wireless Communications. . .
ð
1
sin ðκ 2 L=kÞ
σ 2χ ¼ 2π k L
2 2
1 ½Φn, X ðκ Þ þ Φn, Y ðκ Þκdκ
κ 2 L=k
8
0
<1ð
sin ðκ2 L=kÞ
0:033C2n κ11=3 eκ =κx κdκ
2 2
¼ 2π 2 k2 L 1 ð2:421Þ
: κ2 L=k
0 9
ð
1 11=6 =
sin ðκ 2 L=kÞ
þ 1 0:033005391C 2
κ 2
þ κ 2
κdκ :
κ 2 L=k n y
;
0
After solving the integrals in Eq. (2.417) (for details an interested reader is referred
to [30]), we obtain the following solution for scintillation index, assuming the zero-
inner scale case [30]:
σ 2I ¼ exp 4σ 2χ 1 ¼ exp σ 2logX þ σ 2logY 1
2 3
6 7
6 7
6 7 ð2:422Þ
6 0:49σ R 2
0:51σ R 2 7
’ exp6
6 7=6 þ 5=6 7 7 1:
6 1 þ 1:11σ 12=5 þ
12=5 7
6 R 1 0:69σ R 7
4|fflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} 5
σ2 σ 2logY
logX
Based on Eqs. (2.395) and (2.422), we derive the following expressions for param-
eters in gamma-gamma distribution in terms of Rytov variance, for zero-inner
scale:
8 2 91 3 8 2 3 91
>
< >
= >
< >
=
6 0:49σ 2R
7 6
2
0:51σ R 7
α ¼ exp4 7=6 5 1 , β ¼ exp4 5=6 5 1 :
>
: 12=5 >
; >
: 12=5 >
;
1 þ 1:11σ R 1 þ 0:69σ R
ð2:423Þ
2.0
σR=0.2
Probability density function, f(I)
1.6
σR=10
σR=0.4
1.2 σR=3
σR=1
0.8
0.4
0.0
0.0 0.5 1.0 1.5 2.0 2.5 3.0
Irradiance, I
Fig. 2.21 Gamma-gamma probability density function for different turbulence strengths
where sI(t) and sQ(t) represent in-phase and quadrature signals, while fc is the carrier
frequency. The corresponding complex envelope (low-pass) representation is
given by:
PRx l=vt
PRx/PTx
Multipath
v fading
PTx Shadowing
Path
loss
l=vt
(a) (b)
Fig. 2.22 Time-varying nature of the wireless channel: (a) one particular instance and (b)
illustration of path loss, shadowing, and multipath fading effects against the distance traveled l
2.3 Propagation Effects in Wireless Communication Channels 117
8 9
>
> >
>
< =
sðtÞ ¼ Re sðtÞ ej2πf c t ¼ sI ðtÞ cos ð2πf c tÞ sQ ðtÞ sin ð2πf c tÞ, ð2:426Þ
>
> |{z} >
>
:s ðtÞþjs ðtÞ ;
I Q
The received signal, when the transmitter and receiver are in close proximity of
each other, can be written as:
r ðtÞ ¼ Re sðtÞ∗hðtÞej2πf c t þ nðtÞ, ð2:427Þ
where n(t) is the additive white Gaussian noise (AWGN) and h(t) is the channel
impulse response.
Path-loss definitions in both linear and dB-scales are given as:
PTx PTx
PL ¼ , PL ½dB ¼ 10log10 : ð2:428Þ
PRx PRx
where PTx is the transmit power and PRx is the received power averaged out for
variations due to shadowing effect. The path gain is related to the path loss by:
PTx
PG ¼ PL ¼ 10log10 : ð2:429Þ
PRx
When transmitter or receiver is moving, the received signal will have a Doppler
shift associated with it, as illustrated in Fig. 2.23. The Doppler shift is caused by the
fact that transmitter/receiver movement introduces a distance difference dl that
transmitted signal travels between two observations, which can be evaluated by
dl ¼ vdt cos ϕ, where ϕ is the angle of arrival of the transmitted signal relative to the
direction of motion. The corresponding phase shift is given by
dφ ¼ |{z}k dl ¼ ð2π=λÞvdt cos ϕ: The Doppler shift frequency can be determined
2π=λ
dl
v f
118 2 Propagation Effects in Optical and Wireless Communications. . .
1 dφ v
νD ¼ ¼ cos ϕ: ð2:430Þ
2π dt λ
r ðtÞ ¼ Re GL sðtÞej2πf c t
, ð2:431Þ
4π L
pffiffiffiffiffiffi
where GL is the product of transmit antenna (Tx) and receive (Rx) antenna
radiation patterns in the line-of-sight (LOS) direction, as illustrated in Fig. 2.24.
Receive-to-transmit power ratio is given by:
pffiffiffiffiffiffi 2
PRx GL
¼ λ : ð2:432Þ
PTx 4πL
PTx GL λ2
PL ½dB ¼ 10log10 ¼ 10log10 : ð2:434Þ
PRx ð4πLÞ2
Reflection
Diffraction effects
Scattering
D
GTx,L
GRx,L L
hTx – hRx
GTx,l hTx
hRx l’ l
GRx,l’
θ θ
hTx + hRx
l
Fig. 2.26 Illustration of the two-ray channel model. hTx, transmit antenna height; hRx, receive
antenna height
The received signal for the two-ray model (by ignoring surface wave attenuation
effect) can be written as:
( " 0 # )
1 pffiffiffiffiffiffiejkL pffiffiffiffiffiffiffiffiffiejkðlþl Þ 2π
r ðtÞ ¼ Re GL sðtÞ þ r refl Grefl sðt τÞ e jωc t
, k¼
2k L l þ l0 λ
ð2:435Þ
where the first term corresponds to the LOS ray and the second term to the reflected
ray. The delay spread, representing the difference in arrival times for the LOS and
reflected rays, based on Fig. 2.26, is determined by τ ¼ (l + l0 L)/c (c is the speed
of the light in the air). The corresponding phase shift is given by Δϕ ¼ (2π/λ)(l
+ l0 L ). In Eq. (2.435), we use rrefl to denote the ground reflection coefficient,
which is based on Eq. (2.121) and can be written in the following form:
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
cos θ Z εr sin ffi2 θ, TE
r refl ¼ , Z¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ð2:436Þ
cos θ þ Z εr sin 2 θ=εr , TM
where εr is the dielectric constant of the round, related to the refractive index by
εr ¼ n2. The sign + corresponds to TE (vertical) polarization, while the sign –
corresponds to the TM (horizontal) polarization state. The gain of LOS ray is
determined by GL ¼ GTx,LGRx,L, while the gain of reflected ray is given by
Grefl ¼ GTx,lGRx,l’.
For narrowband transmitted signals, the delay spread is much smaller than the
reciprocal of the signal bandwidth (τ
1/Bs), and we can write s(t) s(t τ).
Under this assumption, the received power is related to the transmit power by:
2 pffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffi
λ GL r refl Grefl ejΔϕ 2
PRx ¼ PTx , 0
4π L þ lþl
0 Δϕ ¼ k l þ l L : ð2:437Þ
By using the Pythagorean theorem twice (see Fig. 2.26), we determine the LOS and
reflected ray path difference by:
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
0
l þ l L ¼ ðhTx þ hRx Þ2 þ D2 ðhTx hRx Þ2 þ D2 , ð2:438Þ
where D is the horizontal separation of antennas. When D > > hTx + hRx, we can use
the following approximation (1 + x)1/2 1 + x/2 in Eq. (2.442) to obtain:
2hTx hRx
Δϕ k : ð2:439Þ
D
When Δϕ ¼ π, the LOS and reflected ray are out of phase, and the distance for
which this happens is known as the critical distance:
2.3 Propagation Effects in Wireless Communication Channels 121
DW
… WG LOS Tx
…
Rx SW TW
4hTx hRx
lc ¼ : ð2:440Þ
λ
For asymptotically large distance between Ts and Rx antennas for LOS ray L, the
following approximations are valid, l + l’ L D, θ π/2, GL Grefl, and r 1
(TE), so that the received power in linear and dB-scales can be written as:
pffiffiffiffiffi2
pffiffiffiffiffi 2
PRx PTx λ4πD
GL 4πhTx hRx 2
λD ¼ GL hTx hRx
D 2 PTx ,
PRx ½dBm ¼ PTx ½dBm þ 10log10 ðGL Þ þ 20log10 ðhTx hRx Þ 40log10 ðDÞ:
ð2:441Þ
Reflection
Tx Diffraction
Rx Scattering
LOS
(a)
DRx DTx
hm Tx
Rx
dRx dTx
2π
Δφ = [ DTx + DRx − (dTx + dRx )]
λ
(b)
Fig. 2.28 (a) The methods of geometric optics are used in GRT model. (b) The knife-edge
diffraction model
2 pffiffiffiffiffiffi X pffiffiffiffiffiffi 2
1 GL 9
r refl, i Gli ejΔϕi
PRx ¼ PTx þ , Δϕi ¼ kðli LÞ ð2:443Þ
2k L i¼1
li
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
Δl ¼ DTx þ DRx ðd Tx þ d Rx Þ ¼ d2Tx þ h2m þ d2Rx þ h2m d Tx d Rx
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
h2m h2
¼ dTx 1 þ 2 þ dRx 1 þ 2m dTx d Rx
dTx dRx
2 ð2:444Þ
1=2
ð1þxÞ 1þx=2 1h 1 h2
’ d Tx 1 þ 2m þ d Rx 1 þ 2m dTx d Rx
2 dTx 2d Rx
2
h 1 1
¼ m þ :
2 d Tx d Rx
where t(x,y) is the aperture transmission function (it can also be called the electric
field transfer function), which is 1 above the knife-edge. The wave function in our
case is:
yð2 ð2
w
2
y jπu2
ψP e jk2R
dy e 2 du: ð2:447Þ
y1 w1
ðw
jπu2
Fð w Þ ¼ e 2 du ¼ CðwÞ þ jSðwÞ, ð2:448Þ
0
ð2
w
jπu2
ψP e 2 du ¼ Cðw2 Þ Cðw1 Þ þ jfSðw2 Þ Sðw1 Þg: ð2:449Þ
w1
Therefore, the electric field in the shadow behind the half-plan can be written as:
124 2 Propagation Effects in Optical and Wireless Communications. . .
m̂ ( r' )
dV' n̂ ( r' )
r' Rx
r
Tx R
O
V
ε = ε ( r' ,t )
Scattering object
E0
Ediff ¼ ð1 þ jÞFðvÞ, ð2:450Þ
2
where v is already defined above and E0 is the free-space electric field strength.
Alternatively, an approximate method can be used to describe the received signal
diffracted ray as follows:
1 pffiffiffiffiffiffi ejkðDTx þDRx Þ jωc t 2π
r ðtÞ ¼ Re α ðv Þ G d sðt τ Þ e , k¼ ð2:451Þ
2k DTx þ DRx λ
where α(v) is the knife-edge diffraction path loss relative to the LOS path loss,
which can be estimated as [72]:
8
>
> 20log10 ð 0:5 0:62v
Þ, 0:8 v < 0
>
>
< 20log10 0:5e0:95v , 0 v < 1
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
αðvÞ ½dB ¼
>
> 20log 0:4 0:1184 ð0:38 0:1vÞ2 , 1 v 2:4
>
>
10
:
20log10 ð0:225=vÞ, v > 2:4
ð2:452Þ
The scattering of electromagnetic waves [51, 73, 74] occurs due to the interac-
tion of the incident wave with the obstacle matter, which results in the remission of
the energy of the incident wave into other directions different from the incident
wave direction. The energy of incident wave is not absorbed but rather redistributed
to different directions of propagation. The scattering effects are contributed to the
inhomogeneities in a dielectric constant of the obstacle. A simple model to study
the scattering effects is shown in Fig. 2.29. The origin is located inside of the
scattering object of volume V. The scattering object is inhomogeneous in dielectric
constant ε ¼ ε(r0 ,t). The position vectors of the transmitter Tx and receiver Rx are
denoted by R and r, respectively. The position of an arbitrary point inside the
scattered object is denoted by r0 . The unit vector in direction of the incident electric
2.3 Propagation Effects in Wireless Communication Channels 125
0
^ r , while the unit vector pointing toward the receiver
field vector is denoted by m
0
is denoted by n^ r .
Let E and H be slow-varying complex electric and magnetic field amplitudes.
The corresponding curl and divergence Maxwell’s equation can be written as:
1 ∂H 1 ∂εE
∇ E ¼ jkH , ∇ H ¼ jkεE þ , ∇ðεEÞ ¼ 0: ð2:453aÞ
c ∂t c ∂t
Assuming that dielectric constant in the scattering object changes slowly, we can
write:
where δε is slowly varying perturbation around mean value 〈ε〉. For the propaga-
tion through atmosphere, we can set the mean value to be 1, and since |δε| ¼ 〈ε〉,
we can use the following approximation log(1 + δε) ε, so that Eq. (2.454)
becomes:
2
k ∂εE 1 ∂ εE
ΔE þ k2 ð1 þ δεÞE¼ ∇ðE∇δεÞ 2j þ 2 : ð2:456Þ
c ∂t c ∂t2
Given that ε is the function of the location in the scattering object, the last two terms
in Eq. (2.456) can be neglected so that this equation simplifies to:
Let the wave Ei(r) be incident on the scattering object volume element as
illustrated in Fig. 2.29, and this electric field clearly satisfies the divergence
equation div Ei ¼ 0. Since the dielectric constant is lowly varying function of
position, we can use the method of small perturbation, described in Sect. 2.2.5, and
represent the electric field vector as:
126 2 Propagation Effects in Optical and Wireless Communications. . .
E ¼ Ei þ Es , ð2:458Þ
By interpreting the term k2δεEi + ∇(Ei∇δε) as the perturbation, the solution of the
scattered field component can be found as the convolution of the perturbation and
the Green function G(r, r’) ¼ (1/4π) exp( jk|r r’|)/( jk|r r’|):
ð 0
1 exp jkr r 2 0 0 3 0
E s ðrÞ ¼ 0 k δε r Ei r d r
4π jr r j " #
0
V
ð 0
1 0 exp jkr r 0
Ei r ∇δε r gradr0 d3 r ð2:461Þ
4π V jr r0 j
ð 0
0 0
1 exp jkr r
þ Ei r ∇δε r d 3 S,
4π S jr r0 j
where S is the surface enclosing the volume V and dS is the vector of magnitude dS
directed along the outer normal line to the surface. The grad term in equation above
can be determined as:
" 0
# 0
0 0
gradr0 0 ¼
jr r j jr r0 j
2 j r r0 j
|fflfflffl{zfflfflffl}
n^ðr;r Þ
0
0
0 0
In the far-field, k|r r0 |
1 so that the last term in Eq. (2.462) can be neglected as it
decays as |r r0 |3. The surface term in Eq. (2.461) is negligible compared to
2.3 Propagation Effects in Wireless Communication Channels 127
volume terms for sufficiently large scattering object so that after substitution of
Eq. (2.462) into Eq. (2.461), we obtain:
ð 0
1 exp jkr r 2 0 0 3 0
Es ðrÞ ’ k δε r Ei r d r
4π j r r0 j
ð 0 exp jkr r0
ð2:463Þ
V
1 0 0
þ Ei r ∇δε r jk 0 d3 r :
4π V jr r j
However, we are still left with another grad term that can be transformed by using
Gauss’s theorem, and after applying div Ei ¼ 0 and neglecting the terms decaying
faster than |rr0 |3, we arrive at the following solution for the scattered electric
field:
ð 0
0 n 0 0 0 0 o 0
k2 exp jkr r
Es ðrÞ ’ 0 δε r Ei r n^ r; r n^ r; r Ei r d3 r :
4π V j r r j
ð2:464Þ
0 n 0 h 0 0 io 0
k2 exp jkr r
E s ðrÞ ’ 0 δε r n^ r; r Ei r n^ r; r d3 r :
4π V jr r j
ð2:465Þ
Clearly, the evaluation of scattered electric field requires the knowledge of the
spatial variation of dielectric constant, which is not easy to determine. As suggested
by Tatarskii [51], the covariance function of the dielectric constant can be used
instead, defined as:
2 32 3
* +
0 00
6 0
D E 76 0 0
D E 7
Cε r ; r ¼ 6 76 7 ¼ δε r0 δε r0 0
0 00
4δε r δε r 54δε r δε r 5
|fflfflfflfflfflffl{zfflfflfflfflfflffl} |fflfflfflfflfflffl{zfflfflfflfflfflffl}
0 ¼0 ¼0
00
¼ Cε r r ¼ Cε ðρÞ,
ð2:466Þ
ððð
Cε ðρÞ ¼ Φε ðκÞejκρ d 3 ρ: ð2:467Þ
0
The element of scattered energy in direction of n^ in a solid angle dΩ can be
determined as:
0 0
dW ¼ Si r σ i r dV 0 dΩ, ð2:468Þ
where Si is the incident wave Poynting vector magnitude and σ i(r) is the effective
^
scattering cross-section from a unit volume into a unit solid angle in the direction m
(see Fig. 2.29), determined as [62]:
π
σ i ðrÞ ¼ k4 Φε ðkm^ ðrÞ kn^ðrÞÞ sin γ ðrÞ, ð2:469Þ
2
where γ (r) is the angle between Ei(r) and n^ðrÞ. The energy flux density of energy
dW scattered in solid angle dΩ is given by [62]:
0
0
0
0
dW Si r σ i r dV 0 dΩ Si r σ i r dV 0
¼ ¼ , ð2:470Þ
jr r 0 j2 dΩ jr r 0 j2 dΩ jr r 0 j2
where |r r0 |2dΩ is the area of scattered energy distribution. The average Poynting
vector at receiver Rx side can be determined as follows:
ð 0 S r0
σ r0
d3 r0 :
i i
hSðrÞi ¼ n^ r 0 2
ð2:471Þ
V jr r j
The total received scattered power can be estimated as PRx |〈S(r)〉|2. The
scattering theory discussed above is applicable to both wireless communications
and free-space optical communications.
Clearly, the calculation of electric field strength and power of scattered wave on
Rx side is not a trivial task. To simplify this study, we can proceed as follows. Let
the incident wave be a spherical wave Ei(r) ¼ Ei exp( jk|R r|)/|R r|, and after
substitution into Eq. (2.464), we obtain:
8 0 19
>
> >
>
2 ð jkjrr j jkjRr j > < B C >
=
0 0
k e e 0 0 B 0 C 3 0
Es ðrÞ; δε r Ei ^
n r; r B ^
n r; r E iC d r ,
0
4π V jr r j jR r j 0
>
> @|fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl}A>>
>
: >
;
Ei sin γ ðr0 Þ
ð
k2 ejkjrr j ejkjRr j 0 n 0 0 o 0
0 0
¼ 0 0 δε r Ei n^ r; r Ei sin γ r d 3 r :
4π V jr r j jR r j
ð2:472Þ
2.3 Propagation Effects in Wireless Communication Channels 129
R kr R
0
^ so that the previous equation simplifies to:
ð 0
n 0 0 o
k2 ejkðrþRÞ 0
r r^þr R^
Es ðrÞ ’ ejk δεðr0 Þ Ei n^ r; r Ei sin γ r d3 r 0 : ð2:473Þ
4π rR V
By taking the power gain antenna definitions GTx and GRx as well as the effective
(“radar”) cross-sectional area of the scattering σ object into account, the received
signal can be written into an approximate form as follows:
8 9
>
< 1 1 ejkðrþRÞ sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi >
= 2π
r Rx ðtÞ ’ Re pffiffiffiffiffi sðt τÞ GTx GRx σ e jωc t
, k¼ ð2:474Þ
>
:2k 4π rR |fflfflffl
ffl {zfflfflfflffl } >
; λ
Gs
where s(t) is the transmitted signal and τ is a delay associated with scattered ray,
relative to the LOS ray, given by τ ¼ (R + r L)/c. This simplified scattering model
is illustrated in Fig. 2.30. This equation is consistent with the radar technique [74]
(see also [64]). It was found in [75] that typical values for effective cross-sectional
area in large German cities range from 4.5 to 55.7 dBm2.
The total received signal in GRT model, obtained as a superposition of a LOS
ray, Nrefl reflected rays, Ndiff diffracted rays, and Nscatt diffusely scattered rays, can
be written as:
" X
1 pffiffiffiffiffiffi ejkL N refl pffiffiffiffiffiffi ejkli
r ðtÞ ¼ Re GL sðtÞ þ r refl, i Glk sðt τ i Þ
2k L i¼1
li
3 9
X
N diff pffiffiffiffiffiffiffiffi
ejkðDTx, m þDRx, m Þ >
>
þ αm ðvÞ Gdm s t τj 7 >
>
D þ D 7 >
=
m¼1 Tx , m Rx , m
7 jωc t 2π
p ffiffiffiffiffiffiffiffiffiffiffi 7e ,k ¼
X 7 >
> λ
N scatt
Gsn σ n ejkðRn þrn Þ 5 >
>
þ 1=2
s ð t τ n Þ >
;
n¼1 ð4π Þ
Rn r n
ð2:475Þ
σ
The delay associated with
R r the scattered ray:
Rx L Tx τ = ( R + r − L ) /c
The simplified path loss model, which can be used for general trade-off analysis
of various system designs, is suitable for use when the path loss is dominated by
reflections. The received power in this model is given by:
s
lref
PRx ¼ PTx C , l > lref ð2:476Þ
l
where s 2 [2,8] is the path loss exponent (“the slope”), whose exact value needs to
be determined empirically. The referent distance for antenna far-field lref is typi-
cally 1–10 m for indoor applications and 10–100 m for outdoor applications [64],
with exact value to be determined empirically. The corresponding dB-scale form is
given by:
l
PRx ½dBm ¼ PRx ½dBm þ C½dB 10slog10 , ð2:477Þ
lref
where C[dB] is the free-space path gain given by C[dB] ¼ 20log10[1/(2klref)]. The
two-ray model discussed earlier belongs to this category.
A better empirical model is a multislope (piecewise linear) model, which is for
four slopes illustrated in Fig. 2.31. A multislope model has multiple segments with
the slope of the i-th segment being si (i ¼ 1,2,. . .). For multislope model with
N segments, the N1 breaking points l1,. . .,lN1 must be specified. The simplest
model form of this category is the dual-slope model, for which the received power
in dB-scale is given by:
PTx ðlÞ ½dBm þ C 10s1 log10 ðl=lref Þ, lref l l1
PRx ðlÞ ½dBm ¼
PTx ðlÞ ½dBm þ C 10s1 log10 ðl1 =lref Þ 10s2 log10 ðl=lref Þ, l > l1
ð2:478Þ
PRx[dBm]
Slope
s1 s2
Slope
s3
s4
Two-ray model is in fact a dual-slope model with break point being the critical
distance l1 ¼ lc and attenuation slopes being s1 ¼ 20 dB/decade and s2 ¼ 40
dB/decade. A useful approximation for the dual-slope model, in linear scale, is
given by [76] (see also [64]):
where hTx (hRx) is the height of transmit (receive) antenna as before, fc [MHz] is the
carrier frequency, l [km] is the link length, and a(hRx) is the receive antenna, carrier
frequency, and environment-specific attenuation function:
8
< ð1:1log10 ðf c Þ 0:7ÞhRx ð1:56log10 ðf c Þ 0:8Þ dB,
aðhRx Þ ¼ small to medium-size cities
:
3:2ðlog10 ð11:75hRx ÞÞ2 4:97 dB, large cities ðf c > 300 MHzÞ
ð2:481Þ
The function b( fc, environment) represents the correction factor to be applied for
suburban and rural areas [77, 81]:
132 2 Propagation Effects in Optical and Wireless Communications. . .
(
2½log10 ðf c =28Þ2 þ 5:4, suburban areas
bðf c ; environmentÞ ¼ 2
4:78½log10 ðf c Þ 18:33log10 ðf c Þ þ C, rural areas
ð2:482Þ
where C ranges from 35.94 in countryside to 40.95 for desert areas [64]. The ITU-R
extended the Hata model for distances ranging from 20 km to 100 km as
follows [81]:
0:8
> 1 þ 0:14 þ 0:000187f c þ 0:00107
: 6 2
log10 20l , l 20 km
1 þ 7 10 hTx
ð2:484Þ
The Hata model was extended by the European Cooperation in the Field of
Scientific and Technical Research (EURO-COST) to 2 GHz [79] by adding the
correction factor of +3 dB in Eq. (2.484) for metropolitan centers and restricting the
validity of model to 1.5 GHz < fc < 2GHz , 1 km l 10 km,30
m hTx 200 m , 1 m hRx 10 m.
The Telecommunications Industry Association (TIA) recommended the modi-
fication of the Hata model, now known as Hata-Davidson model, as follows [81]:
PL, Hata-Davidson ðlÞ ½dB ¼ PL, Hata ðlÞ ½dB AðhTx ; lÞ S1 ðlÞ S2 ðhTx ; lÞ
S3 ðf c Þ S4 ðf c ; lÞ, ð2:485Þ
where
8
< 0,l < 20 km
AðhTx ; lÞ ¼ ð Þ þ
hTx
20 km l < 300 km
: 0:62137 l 20 0:5 0:15log10 ,
121:92
0, l < 64:38 km
S1 ðlÞ ¼
0:174ðl 64:38Þ, 64:38 km l < 300 km
ð2:486Þ
and
2.3 Propagation Effects in Wireless Communication Channels 133
Rx Tx
where αi is the attenuation coefficient of the i-th building and li is the corresponding
total wall depth. The corresponding attenuation in Np-scale is given by:
X
logaðlt Þ ¼ αi li ¼ αt lt ½Np: ð2:489Þ
i
Since different buildings have different dielectric constant and wall depth would be
different as well, according to the central limit theorem, the overall distribution of
attenuation in dB-scale is Gaussian:
2 2 3
ψ dB μψ dB
1 6 7
pðψ dB Þ ¼ pffiffiffiffiffi exp4 5, ψ dB > 0: ð2:490Þ
2π σ ψ dB 2σ 2ψ dB
PRx/PTx [dB]
10log10C
Slow variation
PRx/PTx [dB]
(the shadowing)
C [dB]
Slope:-10s
σψ2
Slope:
-10s
log10 l/lref
Very slow variation
(the path-loss) log10(l/lref)
(a) (b)
Fig. 2.33 (a) Illustration of the combined path loss and shadowing effect vs. normalized distance.
(b) Determination of parameters from the empirical measurements
2 2 3
10log10 ψ μψ dB
10=log10 6 7
pðψ Þ ¼ pffiffiffiffiffi exp4 5, ψ > 0 ð2:491Þ
2π σ ψ dB ψ 2σ 2ψ dB
we can determine the decorrelation distance Lc, which for outdoor systems ranges
from 50 to 100 m [64, 84].
The path loss and shadowing effects can be combined as illustrated in Fig. 2.33a.
The very slow variation is associated with the path loss, while slow fluctuations are
associated with the shadowing effect.
The receive-to-transmit power ratio in dB-scale can be determined as:
PRx lref
ðdBÞ ¼ 10log10 C 10slog10 þ ψ dB , ð2:493Þ
PTx l
where the path loss decreases linearly with the log10(l ), s corresponds to the path-
loss exponent, and ψ dB is a zero-mean random variable with variance σ 2ψ dB : The
corresponding linear-scale model is described as:
s
PRx lref
¼C ψ, ð2:494Þ
PTx l
measurements as illustrated in Fig. 2.33b. “Best fit” straight line through measured
attenuation data gives the slope 10s, from which we determine the path-loss
exponent. The intersection of the line with y-axis gives us the parameter C [dB].
From the fluctuation of the measurement points to the straight line, we determine
the variance σ 2ψ dB of the shadow model.
An important characteristic of the combined path loss and shadowing effects is
the so-called outage probability. The outage probability, denoted as Poutage(Pmin,l ),
under the combined path loss and shadowing, is defined as the probability that the
received power at an observed distance l, PRx(l ), falls below the minimum tolerable
received power Pmin:
ð
1
1
ð
1
1 u 2
Another relevant characteristic of the combined path loss and shadowing effect
model is the so-called cell coverage area, illustrated in Fig. 2.34. In the figure, the
contours of constant received power corresponding to both combined path loss and
average shadowing and combined path loss and random shadowing are shown.
Clearly, the contour of constant received power for combined path loss and average
Path loss dS
and random
shadowing
136 2 Propagation Effects in Optical and Wireless Communications. . .
shadowing is the circle of radius R, while the corresponding contour for combined
path loss and random shadowing is an amoeba-like, which changes its shape over
the time. The cell coverage area in a cellular system is defined as the expected
percentage of locations within a cell, in which the received power is above the
minimum tolerable received power Pmin. Let P dS denote the probability received
power is larger than minimum power in a surface element dS, that is, P dS ¼ Pr
(PRx(r) > Pmin in dS) ¼ Pr(PRx(r)Pmin > 0 in dS). By introducing the indicator
function as follows I(x) ¼ 1, for x > 0, we can write this probability in terms of the
indicator function as:
ðR
2 r0
Cca ¼ 2 Q c1 þ c2 log r 0 dr 0 : ð2:501Þ
R R
0
The term fading is used to describe the fluctuations of received power in time. It is
caused by the combined defects of multipath propagation effect (see Fig. 2.35) and
relative motion between transmitter and receiver, which introduces time-varying
variation in received power. Because of multipath propagation effect, when a single
pulse is transmitted over the multipath channel, the received signal will appear as a
pulse train rather than a single pulse. In this particular example, the receiver moves
at speed v, and at different time instances, the position of neighboring buildings
changes, so that the receiver will experience variations in received power. This
time-varying nature of the multipath channel is illustrated in Fig. 2.36. Therefore,
the number of multipath components is random, while the i-th multipath component
can be characterized by random amplitude ai(t), random delay τi(t), random Dopp-
ler frequency νDi [Hz], and random phase shift ϕi(t) ¼ 2πfcτi(t) 2πνDit ϕ0.
X
N ðtÞ
hðτ; tÞ ¼ ai ðtÞejϕi ðtÞ δðt τi ðtÞÞ, ð2:503Þ
i¼0
and we say that channel is time selective and frequency selective. The time
selectivity indicates that impulse response changes in time. Given that the output
signal can be written in terms of convolution of the input signal and time-varying
impulse response, as given by Eq. (2.502), different frequency (multipath) compo-
nents will experience different fading, and we say that such channel is frequency-
selective channel. Based on Eq. (2.502), we derive the multipath channel model,
shown in Fig. 2.37.
When fcτi(t)
1, which is typical in both indoor and outdoor wireless commu-
nication systems, a small change in the path delay τi(t) will lead to a significant
2.3 Propagation Effects in Wireless Communication Channels 139
s(t)
LOS path
a0(t)exp[-jf0(t)] aN(t)exp[-jfN(t)(t)]
a1(t)exp[-jf1(t)]
x(t)
phase change 2πfcτi(t) ϕDi ϕ0. Since the phase changes rapidly, a uniform
phase distribution is commonly used as random phase model. These rapid phase
changes in different multipath components are responsible for either constructive or
destructive interference on receiver side; in other words, this effect introduces the
received power fluctuations, that is, the fading effect. The impact of multipath
fading on the received signal is strongly dependent on the relationship of the spread
of time delays associated with the LOS and different multipath components with the
inverse of the signal bandwidth 1/Bs. To explain this better, we provide in Fig. 2.38
an equivalent multipath channel model, where the delay spread of the i-th multipath
component is defined with respect to the (i 1)-th one by Δτi(t) ¼ τi(t) τi1(t).
The minimum time separation between the two pulses, such that they can be
resolved at the filter output, of bandwidth B, is Δτ > 1/B. When the channel
delay spread is small relative to the inverse of signal bandwidth, then the multipath
components are nonresolvable, and we say that the corresponding channel model is
the narrowband channel model. One illustrative example of nonresolvable path is
shown in Fig. 2.39. Cleary, the nonresolvable multipath component is composed of
reflected components from the cluster of objects in close proximity of each other.
Namely, the maximum delay spread among the reflected components in the cluster
is smaller than the inverse of the signal bandwidth so that we can write maxm,
n|τ n(t) τ m(t)|
1/Bs.
To account for the nonresolvable cluster component, we need to modify the
channel model as shown in Fig. 2.40. In this modified multipath channel model, the
i-th component represents a combined effect from multiple nonresolvable paths,
and the corresponding channel coefficient is given by ai ðtÞejϕi ðtÞ , where the
140 2 Propagation Effects in Optical and Wireless Communications. . .
s(t)
LOS path
t0(t) Dt1(t) DtN(t)(t)
…
a0(t)exp[-jf0(t)] a1(t)exp[-jf1(t)] aN(t)exp[-jfN(t)(t)]
Δti(t)=ti(t)-ti-1(t) x(t)
magnate and the phase are averaged out among different nonresolvable cluster
components.
On the other hand, when the maximum delay spread among the reflected
components in the cluster is larger than the inverse of the channel bandwidth, that
is, maxm,n|tn(t)tm(t)| > 1/B, we say that the channel is wideband channel.
In narrowband channel model, the maximum delay spread between any two
components is smaller than the inverse of signal bandwidth, and we can use the
following approximation s(t) s(t τi(t)), for all i. The received signal is now
given by:
( " NðtÞ # )
X
r ðtÞ ¼ Re xðtÞejωc t ¼ Re sðtÞ ai ðtÞejϕi ðtÞ ejωc t , ð2:504Þ
i¼0
2.3 Propagation Effects in Wireless Communication Channels 141
st
t t Nt t
j N t t
a t e
j t
a t e
j t aN t t e
xt
Fig. 2.40 The modified multipath channel model accounting for nonresolvable cluster
components
st
t B B
j N t t
a t e
j t
a t e
j t aN t t e
xt
and the corresponding narrowband channel model is shown in Fig. 2.41. Since the
spreading in time is negligible in narrowband model, there is no channel distortion
by intersymbol interference as different pulses from multipath fading stay in the
same pulse duration. In the extreme narrowband case, we can even write that s
(t) ffi 1. The received signal in the extreme narrowband case can be written as:
142 2 Propagation Effects in Optical and Wireless Communications. . .
( " N ðt Þ # )
X
r ðtÞ ¼ Re xðtÞejωc t ¼ Re ai ðtÞejϕi ðtÞ ejωc t ¼ rI ðtÞ cos ðωc tÞ rQ ðtÞ sin ðωc tÞ,
i¼0
ð2:505Þ
N ðtÞ
X N ðt Þ
X
r I ðtÞ ¼ ai ðtÞ cos ϕi ðtÞ, r Q ðtÞ ¼ ai ðtÞ sin ϕi ðtÞ; ϕi ðtÞ ¼ ωc τi ðtÞ ϕDi ϕ0 :
i¼0 i¼0
ð2:506Þ
If the number of multipath components N(t) is large, and magnitude an(t) and
phase ϕn(t) are independent, then rI(t) and rQ(t) are jointly Gaussian random
processes according to the central limit theorem. The autocorrelation function of
in-phase component is given by:
* +
X
RrI ðt; t þ τÞ ¼ hr I ðtÞr I ðt þ τÞi ¼ a2i cos ϕi ðtÞ cos ϕi ð t þ τ Þ
i
|ffl{zffl} |fflfflfflfflffl{zfflfflfflfflffl}
2πf c τi 2πf D tϕ0 2πf c τi 2πf D ðtþτÞϕ0
2 i
3 i
X 61
1
7
¼ a2n 4 cos 2πf Di τ þ cos 4πf c τi 4πf Di t 2ϕ0 5
i
2 2 |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
¼0
1 X 2
1 X 2 v
¼ ai cos 2πf Di τ ¼ ai cos 2π τ cos θi :
2 i 2 i λ
ð2:507Þ
1 X 2 v
RrI , rQ ðt; t þ τÞ ¼ RrI , rQ ðτÞ ¼ r I ðtÞr Q ðt þ τÞ ¼ ai sin 2π τ cos θn
2 i λ
¼ r Q ðtÞr I ðt þ τÞ ¼ RrQ , rI ðτÞ:
ð2:508Þ
2.3 Propagation Effects in Wireless Communication Channels 143
Δq 3
Δq =2π/N
To simplify the WSS model further, Clark [85] proposed the so-called uniform
scattering (US) model, shown in Fig. 2.42, which was further developed by Jakes
[82]. In this model, which we will refer to as Clark-Jakes model, the channel
consists of many densely packed scattering objects, with the angle of arrival of
the i-th multipath component being θi ¼ iΔθ, where Δθ ¼ 2π/N and the
corresponding average power per scattering object being a2i ¼ 2PRx =N, where
PRx is the total received power. After substituting the expression for the average
power per scattering object into Eq. (2.507), we obtain the following expression for
the autocorrelation function of the in-phase signal:
PRx X v N¼2π=Δθ P X N v
Rx
RrI ðτÞ ¼ cos 2π τ cos ðiΔθÞ ¼ cos 2π τ cos ðiΔθÞ Δθ:
N i λ 2π i¼1 λ
ð2:510Þ
2ðπ
PRx v
Rr I ð τ Þ ¼ cos 2π τ cos θ dθ ¼ PRx J 0 ð2πνD τÞ, ð2:511Þ
2π λ
0
144 2 Propagation Effects in Optical and Wireless Communications. . .
ðπ
where J 0 ðxÞ ¼ ð1=π Þ ejx cos θ dθ is the Bessel function of the first kind and zero
0
order, as introduced earlier in this chapter. The crosscorrelation function of the
Clark-Jakes US model is clearly zero, that is:
ð v
PRx
RrI , rQ ðτÞ ¼ sin 2π τ cos θ dθ ¼ 0: ð2:512Þ
2π λ
Since the first zero of J0(x) is 2.4048, we conclude that the in-phase component
decorrelates after νDτ ¼ 2.4048/2π ffi 0.382. In other words, if we separate two
receive antennas by approximately 0.4λ, they can be considered as independent of
each other.
The power spectral densities (PSDs) are obtained by calculating the Fourier
transforms of corresponding autocorrelation functions. The PSD of in-phase and
quadrature components is given by:
8
>
< 2PRx qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1
, jf j f D
PSDrI ðf Þ ¼ PSDrQ ðf Þ ¼ FTfRrI ðτÞg ¼ πf D 2 ð2:513Þ
> 1 ð f =f Þ
: D
0, otherwise
Clearly, as f tends to fD, the PSD tends to infinity, but this never occurs in practice.
To solve for this problem, the PSD should be truncated for f/fD!1. The PSD of the
passband signal is related to the PSD of in-phase component as follows:
1
PSDr ðf Þ ¼ ½PSDrI ðf f c Þ þ PSDrI ðf þ f c Þ
28
>
< PRx qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1
ffi, jf f c j f D ð2:514Þ
¼ πf 2
>
D 1 ð jf f j=f Þ
: c D
0, otherwise
The PSDs are suitable to build a simulator based on Clark-Jakes US model, by using
zero-mean unit variance Gaussian random generator. By setting the double-sided
PSD of an additive white Gaussian noise (AWGN) by N0/2 ¼ 2PRx/(πfD), we need
to determine the filter of transfer function H( f ) such that the PSD of the filter output
is equal to (2.513), in other words:
2PRx 2PRx 1
j H ðf Þj 2 ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi : ð2:515Þ
πf D πf D
1 ðf =f D Þ2
Clearly, the magnitude of transfer function of such filter should be chosen as:
2.3 Propagation Effects in Wireless Communication Channels 145
h i1=4
jHðf Þj ¼ 1 ðf =f D Þ2 : ð2:516Þ
Fluctuations in the envelope of the received signal is the study of the fluctuations
of the power of the received signal, in other words the study of fading effects. The
received signal for narrowband channel model can be represented in either Carte-
sian or polar coordinates as follows:
r ðtÞ ¼ r I ðtÞ cos ðωc tÞ r Q ðtÞ sin ðωc tÞ ¼ ρðtÞ cos ½ωc t þ ψ ðtÞ, ð2:517Þ
where the envelope and phase in polar coordinates are related to the in-phase and
quadrature components by:
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
r Q ðtÞ
ρðtÞ ¼ jr ðtÞj ¼ r 2I ðtÞ þ r 2Q ðtÞ, ψ ðtÞ ¼ tan 1 : ð2:518Þ
r I ðt Þ
Since the samples in-phase and quadrature components are independent and Gauss-
ian distributed, the corresponding joint distribution will be:
" #
1 r 2I þ r 2Q
f RI , RQ r I ; r Q ¼ exp : ð2:519Þ
2πσ 2 2σ 2
ρ
ρ dψ
ψ ψ
rI rI
146 2 Propagation Effects in Optical and Wireless Communications. . .
∂r I ∂r I
∂ρ ∂ψ
jJ ðρ; ψ Þj ¼ ¼ρ
∂r Q ∂r Q
∂ρ ∂ψ
ð
1
1
f Ψ ðψ Þ ¼ f R, Ψ ðρ; ψ Þdρ ¼ , 0 ψ 2π, ð2:521Þ
2π
0
2ðπ
ρ ρ2
f R ð ρÞ ¼ pR, Ψ ðρ; ψ Þdψ ¼ 2 exp 2 : ð2:522Þ
σ 2σ
0
2 ð
2π
ρ ρ þ s2 ρs 1
f R ðρÞ ¼ 2 exp I0 2 , I 0 ðxÞ ¼ expðx cos ψ Þdψ, ð2:527Þ
σ 2σ 2 σ 2π
0
where I0(x) is the modified Bessel function of the first kind and zero order. As an
illustration, in Fig. 2.44, we show normalized Rician distribution for different
values of parameter a ¼ ρ/σ. Clearly, for a ¼ 0, Rician distribution reduces down
to Rayleigh. When parameter a is large, the distribution is similar to Gaussian.
TheX total power
2 in multipath component different from the LOS component is
2σ 2 ¼ a , while the total power is given by:
i, i6¼0 i
ð
1
v=ρ/σ
0.5 Rician distributions
a=1
0.4 a=3 a=5
0.3
0.2
0.1
0.0
0 2 4 6 8
v
Fig. 2.44 Normalized Rayleigh and Rician distributions
148 2 Propagation Effects in Optical and Wireless Communications. . .
The Rician parameter can be used as a measure of the fading severity: the small
K implies severe fading, a large K implies mild fading, and when K tends to infinity,
there is no fading at all.
More general fading distribution is the Nakagami distribution, given by:
2mm ρ2m1 mρ2
f R ð ρÞ ¼ m exp , m 0:5 ð2:530Þ
Γ ðmÞPRx PRx
Another relevant fading model is αμ generalized fading model, with the
following distribution [86–89]:
αμμ ραμ1 ρα
f R ð ρÞ ¼ exp μ , ð2:532Þ
b
ρ αμ Γ ðμÞ ρbα
where μ is the inverse of the normalized variance of ρα, that is, μ ¼ 1/Var(ρα)/〈ρα〉
2
ρ is the α-root mean value of ρα: b
, and b ρ ¼ hρα i1=α : Various fading models such as
Rayleigh, Nakagami-m, exponential, Weibull, and one-sided Gaussian distributions
are just spatial cases of this distribution. As an illustration, by setting α ¼ 2 and
μ ¼ 1, the Rayleigh distribution is obtained. On the other hand, by setting α ¼ 2 and
μ ¼ 2, the Nakagami-2 distribution is obtained.
2.3 Propagation Effects in Wireless Communication Channels 149
Based on statistical models above, we can predict the level of fading, but we
cannot predict the duration of the fade. This parameter is very important as it
describes how many symbols get affected by the deep fade effect, and we refer to
this parameter as the average fade duration (AFD). The AVD is defined as the
average time for which the signal is below a given target envelope level R. The
envelope level R is typically related to the minimum tolerable power Pmin,
discussed in previous section. Alternatively, it can be related to the minimum
tolerable signal-to-noise ratio. Let Tobs denote the observation time interval. The
time intervals for which the signal is below target envelop value R are denoted as ti
(i ¼ 1,2,...). The probability that the envelope is below target value R can be
determined as:
1 X
PrðρðtÞ < RÞ ¼ ti : ð2:533Þ
T obs i
In order to calculate the AFD, we need first to determine the level R crossing rate,
denoted as LR [number of crossings/s]. The level crossing rate is defined as the
expected rate at which the signal envelope crosses the envelope level R with
negative slope. The AFD can now be defined mathematically as:
LRP
T obs
1
ti
T obs
PrðρðtÞ < RÞ
tR ¼ i¼1
¼ : ð2:534Þ
LR LR
In order to determine the level crossing rate, the first step is to determine
the joint
distribution of envelope ρ and its derivative dρ/dt, denoted as f ρ; ρ_ , ρ_ ¼ dρ=dt:
For details of derivation of this joint distribution, an interested reader is referred to
[90–92]. The level crossing rate can now be determined as the expected value of the
envelope slope, where averaging is performed over negative slopes:
ð0
LR ¼ ρ_ f ρ; ρ_ dρ_ : ð2:535Þ
1
1 pffiffiffiffiffi 2σρ2_
2
ρ_
f ρ_ ¼ 2π e , ð2:536Þ
σ ρ_
where the variance of the slope is given by [91] σ ρ2_ ¼ ð2πνD Þ2 σ 2 =2: The level
crossing rate for Rician distribution would be then:
150 2 Propagation Effects in Optical and Wireless Communications. . .
ð0
LR ¼ ρ_ f ρ_ f ðρÞdρ_
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi!
1
2ρðK þ 1Þ K ðKþ1 Þρ 2
ð0 ρ_ 2
PRx I
K ð K þ 1Þ
2 e 0 2ρ
¼
1 1
pffiffiffiffiffi e 2σρ_ dρ_ 2 PRx PRx
2 σ ρ_ 2π
1
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
pffiffiffi
σ = 2π
ρ_
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi!
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ρ ðK þ 1Þρ2 K ð K þ 1Þ
¼ 2π ðK þ 1ÞνD pffiffiffiffiffiffiffiffiexp K I 0 2ρ ,
PRx P Rx PRx
ð2:537Þ
pffiffiffiffiffiffiffiffi
which after substitution ρn ¼ ρ= PRx can be rewritten in compact form as follows:
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
LR ¼ 2π ðK þ 1ÞνD ρn exp K ðK þ 1Þρ2n I 0 2ρn K ðK þ 1Þ : ð2:538Þ
The cumulative distribution function (CDF) for Rayleigh fading is given by:
CDFðρÞ ¼ Prðρ < RÞ ¼ 1 eρ =PRx ¼ 1 eρn ,
2 2
ð2:540Þ
On the other hand, the CDF for Rician fading is given by:
ðR
ðRicianÞ
CDFðρÞ ¼ Prðρ < RÞ ¼ fR ðρÞdρ
0
pffiffiffiffiffiffi qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
¼1Q 2K ; 2ðK þ 1Þρ2n , ð2:542Þ
After substitution of Eq. (2.542) into Eq. (2.534), we obtain the following expres-
sion for AFD of Rician fading:
PrðρðtÞ < RÞ
tðRRicianÞ ¼
LR
pffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1 Q 2K ; 2ðK þ 1Þρ2n
¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
: ð2:544Þ
2π ðK þ 1ÞνD ρn eKðKþ1Þρn I 0 2ρn K ðK þ 1Þ
2
When AFD is much longer than a bit duration, a long burst of errors will be
introduced, indicating that fading is slow. Therefore, AFD can be used to determine
the number of bits affected by a deep fade. Error correction codes developed for
AWGN channels will most probably fail as they need to deal with both random and
burst errors. To solve for this problem, interleaving is typically used so that the
burst errors get spread to multiple codewords. When AFD is roughly equal to a bit
duration, a single bit error get introduced by fading. In this case, a regular error
correction code, designed for random errors, is applicable. Finally, when AFD is
much shorter than a bit duration, the fading is averaged out, which indicates that in
this case fading is fast and the Doppler effect may be beneficial in this case.
When all multipath components are resolvable, the discrete-time (DT) model due
to Turin can be used [93]. The N multipath components are resolvable if for m 6¼ n,
the following is |τn(t)τm(t)|
1/B, where B is the transmission bandwidth. This
model is particularly suitable for spread-spectrum systems. The continuous-time
output of such a channel is given by:
X
N
xðtÞ ¼ αi ðtÞejϕi ðtÞ sðt τi Þ: ð2:545Þ
i¼0
X
N X
N
xðnT s Þ ¼ αi ðnT s Þ ejϕi ðnT s Þ s ðnT s iT s Þ ¼ αi ðnÞejϕi ðnÞ sðn iÞ:
i¼0
|fflfflffl{zfflfflffl} |fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl} i¼0
α i ð nÞ sðniÞ
ð2:546Þ
X
N
hð nÞ ¼ hði; nÞδðn iÞ, hði; nÞ ¼ αi ðnÞejϕi ðnÞ : ð2:547Þ
i¼0
s(m)
x(n)
Fig. 2.45 Illustration of the discrete-time model
indicator function is then used in each interval of duration T. Whenever the binary
indicator function output is 1, the random amplitude and phase for a given
multipath component are generated from an empirical distribution. This empirical
distribution may belong to the same family of fading distributions, but with
different parameters.
Another relevant channel model is the finite-state Markov channel (FSMC)
model due to Wang and Moayeri [94], in which the fading is approximated as a
discrete-time Markov process with a time being discretized by a symbol duration.
The FSMC model divides the range of all possible fading powers p into discrete
regions as follows RGi ¼ {p| Ai p< Ai+1} (i ¼ 1,2. . .), where Ai and Ai+1 are
boundaries of the i-th region. The stationary probabilities of the regions are
determined by:
Liþ1 T Li T
pi, iþ1 ¼ , pi, i1 ¼ , pi, i ¼ 1 pi, iþ1 pi, i1 , ð2:549Þ
πi πi
where Li is the level Ai crossing rate and T is the symbol duration. Clearly,
according to the FSMC model, from the Region RGi, we can stay in the same
region with probability pi,i, move to one region below with probability pi,i1, or
move one region above the observed region pi,i+1. Since we can move only to
neighboring regions, this model is accurate for sufficiently small normalized Dopp-
ler frequency νDT.
2.3 Propagation Effects in Wireless Communication Channels 153
where we use Ci to denote the i-th cluster (i ¼ 0,1,. . .,Nclusters), while hi(τi,t) is the
impulse response of the i-th cluster. The overall impulse response of the wideband
channel, based on previous equation, is given by:
XðtÞ
N clusters
hðτ; tÞ ¼ hðτi ; tÞδðτ τi Þ, ð2:551Þ
i¼0
s(t)
LOS path
t0(t) t1(t) tNclusters(t)
…
x(t)
Fig. 2.46 The wideband channel model in which the impulse response of the i-th cluster is
denoted as hi(τi,t)
When the WSS assumption is extended by uniform scattering (US), we obtain the
following simplified model for the autocorrelation function, introduced by
Bello [95]:
Δ
hh∗ ðτ1 ; tÞhðτ2 ; t þ ΔtÞi ¼ Rh ðτ1 ; ΔtÞδðτ1 τ2 Þ ¼ Rh ðτ; ΔtÞ, ð2:554Þ
which indicates that the channel responses associated with different multipath
components are mutually uncorrelated.
The WSS+US autocorrelation function of impulse response for which Δt ¼ 0 is
commonly referred to as the power delay profile (PDP), denoted as Rh(τ), gives the
information how the total received power is distributed among different multipath
components. The PDP can be used to determine the average delay spread:
Ð
1
τRh ðτÞdτ
0
μτMDS ¼ Ð
1 , ð2:555Þ
Rh ðτÞdτ
0
u τ μT m 2 Rh ðτÞdτ
u0
σ τMDS ðτÞ ¼ u
u Ð
1 : ð2:556Þ
t Rh ðτÞdτ
0
2.3 Propagation Effects in Wireless Communication Channels 155
The Fourier transform of h(τ,t) with respect to the delay spread τ, at particular
time instance t:
ð
1
is also time varying, so that it makes sense to define the autocorrelation function of
time-varying transfer function H( f,t) as follows:
ð
1
and becomes the function on frequency difference Δf. For the fixed observation
time (Δt ¼ 0), we conclude that the PDP and autocorrelation function of transfer
function represent a Fourier transform pairs:
ð
1
The range of frequencies for which RH(Δf ) is nonzero is known as the coherence
bandwidth Bc. The definition of coherence bandwidth and its relationship to the
PDP and rms delay spread is illustrated in Fig. 2.47. An example of the narrowband
RH(Δf)
Rh(τ)
FT
Narrowband signal
Wideband signal experiences
experiences flat-fading
frequency selective-
fading
στ τ Bc
MDS Δf
Fig. 2.47 The relationship between DPD and autocorrelation function of frequency response H( f,
t) (for Δt ¼ 0) and the definition of the coherence bandwidth Bc
156 2 Propagation Effects in Optical and Wireless Communications. . .
signal and an example of wideband signal are shown to illustrate how the fading
affects the signal. Clearly, for the narrowband signal, in this particular example,
different frequency components experience roughly the same fading amplitude.
On the other hand, for the wideband signal, different frequencies experience
different fading and refer to this type of fading as frequency-selective fading.
Therefore, the coherence bandwidth can be used to classify the fading into two
categories: flat fading and frequency-selective fading. When the bandwidth of the
signal is much smaller than coherence bandwidth, Bs
Bc, the fading is flat fading.
In other words, for the flat fading, the multipath delay spread is much smaller than
the symbol duration. On the other hand, in frequency-selective fading, as illustrated
in Fig. 2.48, the bandwidth of the signal is much larger than the coherence
bandwidth, Bs
Bc. In other words, in frequency-selective fading, the MDS is
much longer than the symbol duration.
The time variations of the channel arising from transmitter and/or receiver
motion introduce a Doppler shift in the received signal. This Doppler effect can
be characterized by taking the Fourier transform of RH(Δf;Δt) with respect to Δt:
ð
1
ð
1
The range of time intervals over which the RH(Δt) is approximately nonzero and is
commonly referred to as the coherence time Tc, which is illustrated in Fig. 2.49. The
time-varying channel decorrelates after Tc seconds. The coherence time can be used
to determine how many symbols get affected by the fading. The maximum ν value
for which the Doppler spectrum magnitude is larger than zero,|SH(ν)| > 0, is known
as the Doppler spread of the channel, denoted as BD. Based on coherence time, we
can classify fading channels as slow-fading and fast-fading channels. For slow-
fading channels, the symbol duration Ts is much shorter than the coherence time,
2.3 Propagation Effects in Wireless Communication Channels 157
|RH(Δt)|
SH(ν)
FT
2Tc Δt 2BD ν
Fig. 2.49 The illustration of definitions of coherence time Tc and Doppler spread BD
Tc Ts
Ts
Tc. In other words, in slow-fading channels, the signal bandwidth is much
larger than the Doppler spread, Bs
BD. On the other hand, in fast-fading channels,
the symbol duration Ts is much longer than the coherence time, Ts
Tc. In other
words, in slow-fading channels, the signal bandwidth is much smaller than the
Doppler spread, Bs
BD. The classification of wireless channels based on coher-
ence bandwidth and coherence time is summarized in Fig. 2.50.
When the symbol duration is much longer than coherence time, we also say that
the channel is ergodic, as all possible channel conditions (states) can take place. On
the other hand, when Ts
Tc, we say that the channel is non-ergodic.
Finally, the factor TcBc 1/τMDSBD is known as the spread factor [67]. When τ
MDSBD < 1 (equivalently BcTc > 1), we say that the channel is underspread, and
such channel can easily be estimated. On the other hand, when τMDSBD > 1
(equivalently BcTc < 1), we say that the channel is overspread.
The classification of wireless channels based on coherence bandwidth, coher-
ence time, and spread factor is summarized in Table 2.1.
Another relevant function in characterizing the wireless channels is the scatter-
ing function Sh(τ ; ν), which is related to the autocorrelation function Rh(τ;Δt) by the
Fourier transform:
158 2 Propagation Effects in Optical and Wireless Communications. . .
Table 2.1 Classification of wireless channels based on coherence bandwidth, coherence time, and
spread factor
Rh (τ , Δt )
Fig. 2.51 The Fourier
transform (FT) relationship
FTτ
among different correlation
and scattering functions
FTν−1
−1
FT Δf
FTΔt
RH ( Δf , Δt ) S h (τ ,ν )
−1
FTν FTτ
FTΔt FTΔ−f1
S H ( Δf ,ν )
ð
1
The scattering function describes how the average output power is distributed
among multipath delay τ and Doppler frequency ν. The scattering function Sh(τ ; ν)
and the autocorrelation function RH(Δf;Δt) are related by:
ð
1 ð
1
Fiber attenuation can be described by the general relation dP/dz ¼ αP, where α is
the power attenuation coefficient per unit length. If Pin is the power launched into
the fiber, the power remaining after propagating a length L within the fiber Pout is
Pout ¼ Pinexp(αL). The absorption coefficient varies with wavelength as many of
the absorption and scattering mechanisms vary with λ. For instance, Rayleigh
scattering in fiber is due to microscopic variations in the density of glass (density
fluctuation sites < λ) and varies as [1–4]:
C
αR ¼ , C ¼ 0:7 0:9 ðdB=kmÞ μm4 ð2:564Þ
λ4
Bfib
Bfib, L ¼ , μ ¼ 0:5 1: ð2:565Þ
Lμ
B1 ¼ 0:6961663 at λ 1 ¼ 0:0684043 μm
B2 ¼ 0:4079426 at λ 2 ¼ 0:1162414 μm
B3 ¼ 0:8974794 at λ 3 ¼ 9:896161 μm
The group index ng can be determined by using the Sellmeier equation and the
following definition expression:
ng ¼ n þ ωdn=dω ¼ n λdn=dλ:
Waveguide dispersion is related to the physical design of the optical fiber. Since
the value of Δ is typically small, the refractive indices of the core cladding are
nearly equal, and the light is not strictly confined in the fiber core, and the fiber
2.4 Signal Propagation in Optical Fibers and Corresponding Channel Impairments 161
n(ρ)
n(ρ)
n1
n2
ρ
(a) (b)
n(ρ) n(ρ)
ρ ρ
(c) (d)
Fig. 2.52 Refractive index profiles for different SMF types: (a) standard SMF, (b) NZDSF with
reduced dispersion slope, (c) NZDSF with large effective area, and (d) DCF
modes are said to be weakly guided. For a given mode, say fundamental mode, the
portion of light energy that propagates in the core depends on wavelength, giving
rise to the pulse-spreading phenomenon known as waveguide dispersion. By
changing the power distribution across the cross-sectional area, the overall picture
related to the chromatic dispersion can be changed. The distribution of the mode
power and the total value of waveguide dispersion can be manipulated by multiple
cladding layers. This is commonly done in optical fibers for special application
purposes, such as dispersion compensation. Different refractive index profiles of
single-mode fibers used today are shown in Fig. 2.52. The conventional SMF index
profile is shown in Fig. 2.52a. The nonzero-dispersion-shifted fiber (NZDSF), with
refractive index profile shown in Fig. 2.52b, is suitable for use in WDM systems.
Large effective area NZDSFs, with index profile shown in Fig. 2.52c, are suitable to
reduce the effect of fiber nonlinearities. Dispersion compensating fiber (DCF), with
index profile shown in Fig. 2.52d, is suitable to compensate for positive chromatic
dispersion accumulated along the transmission line.
Because the source is nonmonochromatic, different spectral components within
a pulse will travel at different velocities, inducing the pulse broadening. When the
neighboring pulses cross their allocated time slots, the ISI occurs, and the signal bit
rates that can be effectively transmitted can be severely limited. A specific spectral
component, characterized by the angular optical frequency ω, will arrive at the
output end of the fiber of length L after some delay τg, known as the group delay:
162 2 Propagation Effects in Optical and Wireless Communications. . .
L dβ L dβ λ2 dβ
τg ¼ ¼L ¼ ¼ L , ð2:567Þ
vg dω c dk 2πc dλ
dτg dτg
Δτg ¼ Δω ¼ Δλ, ð2:568Þ
dω dλ
where Δω represents the frequency bandwidth of the source and Δλ represents the
wavelength bandwidth of the source. By substituting Eq. (2.29) into Eq. (2.30), we
get:
dβ
dτg d Ldω d2 β d2 β 2πc
Δτg ¼ Δω ¼ Δω ¼ L 2 Δω ¼ L 2 2 Δλ
dω dω dω dω λ
¼ LDΔλ, ð2:569Þ
2πc d2 β 2πc d2 β
D¼ ¼ 2 β2 , β2 ¼ ð2:570Þ
λ2 dω2 λ dω2
where λZD ¼ 1.276 μm is the zero-dispersion wavelength. We can see that for
wavelengths larger than zero-dispersion wavelength, the material dispersion coef-
ficient is positive, while the GVD is negative, and this regime is known as the
anomalous dispersion region.
The waveguide dispersion occurs because the propagation constant is a function
of the fiber parameters (core radius and difference between refractive indices in
fiber core and cladding) and at the same time is a function of wavelength. There-
fore, the propagation paths for a mode due to different boundary-matching condi-
tions are slightly different at different wavelengths. Waveguide dispersion is related
to the physical design of the optical fiber. Since the value of Δ is typically small, the
refractive indices of the core cladding are nearly equal, and the light is not strictly
confined in the fiber core. For a given mode, say fundamental mode, the portion of
light energy that propagates in the core depends on wavelength: the longer the
wavelength, the more power in the cladding. The effect of waveguide dispersion on
pulse spreading can be approximated by assuming that refractive index of material
is independent of wavelength. To make the result independent of fiber configura-
tion, we should express the group delay in terms of the normalized propagation
constant b, defined as:
β n2 kðbΔ þ 1Þ, Δ
1 ð2:573Þ
The total dispersion can be written as the sum of two contributions, D ¼ DM + DW.
The waveguide dispersion (i.e., negative) shifts the zero-dispersion wavelength to
approximately 1.308 μm. D ~ 15–18 ps/(kmnm) near 1.55 μm. This is the low loss
region for fused silica optical fibers. This approach for mutual cancelation was used
to produce several types of single-mode optical fibers that are different in design
compared to standard SMF, standardized by ITU-T. In addition to standard SMF,
there are two major fiber types: (1) dispersion-shifted fibers (DSFs) (described in
ITU-T recommendation G.653) with dispersion minimum shifted from the 1310 nm
wavelength region to the 1550 nm region and (2) nonzero-dispersion-shifted fibers
(NZDSFs) (described in G.655 recommendation), with dispersion minimum shifted
from 1310 nm window to anywhere within C or L bands (commercial examples:
TrueWave fiber and LEAF).
Dispersion effects do not disappear completely at zero-dispersion wavelength.
Residual dispersion due to higher-order dispersive effects still exists. Higher-order
dispersive effects are governed by the dispersion slope parameter S ¼ dD/dλ.
Parameter S is also known as differential dispersion parameter or second-order
dispersion parameter, and it is related to the GVD parameter and second-order GVD
parameter β3 ¼ dβ2/dω by:
2
dD d 2πc 4πc 2πc
S¼ ¼ 2 β2 ¼ 3 β2 þ β3 : ð2:577Þ
dλ dλ λ λ λ2
The geometrical optics (or ray theory) approach, used earlier to describe the light
confinement in step-index fibers through the total internal reflection, as shown in
Fig. 2.7 and text related to it, is valid when the fiber has a core radius a much larger
than the operating wavelength λ. Once the core radius becomes comparable to the
operating wavelength, the propagation of light in step-index fiber is governed by
Maxwell’s equations describing the change of electric E and magnetic H fields in
space and time, as discussed at the beginning of the chapter. Since the silica is
nonmagnetic material M ¼ 0, the induced electric and magnetic densities, P and E,
are mutually connected by Eq. (2.7), which is clearly the convolution integral. By
applying the convolution theorem of the Fourier transform (FT), Eq. (2.7) becomes:
PðrÞ ¼ ε0 χ ðrÞEðrÞ,
ð2:578Þ
Pðr; ωÞ ¼ FT fPðr; tÞg, Eðr; ωÞ ¼ FT fEðr; tÞg, χ ðr; ωÞ ¼ FT ðχ ðr; tÞÞ:
Now after applying the FT on Eq. (2.581) and by substituting the constitutive
relation Eq. (2.579) into Eq. (2.581), we obtain:
εðr; ωÞω2
∇ ∇ E ¼ μ0 ε0 εðr; ωÞω2 E ¼ E: ð2:582Þ
|{z} c2
1=c2
εðr; ωÞω2
∇ ∇ E ¼ ∇ ∇E |ffl{zffl}
∇∇ E ¼ E: ð2:583Þ
c2
Δ
Based on Maxwell Eq. (2.1), we conclude that ∇E ¼ 0, and since the typical
attenuation in modern SMS is below 0.2 dB/km, we can neglect the attenuation in
Eq. (2.580) so that εðr; ωÞ ffi n2 ðr; ωÞ: The spatial dependence of refractive index
can be neglected and after substituting εðr; ωÞ ffi n2 ðωÞ and ∇E ¼ 0 into
Eq. (2.583), we obtain the following wave equation:
n2 ðωÞω2
ΔE þ E¼0: ð2:584Þ
c2
where k0 ¼ ω/c ¼ 2π/λ is the free space wave number. A specific solution of the
wave equation, subject to appropriate boundary conditions, is commonly referred to
as an optical mode. The spatial field distributions, E(r,ω) ¼ E0(ρ,ϕ)exp[jβ(ω)
166 2 Propagation Effects in Optical and Wireless Communications. . .
where n1 is the refractive index of the core of radius a and n2 is the refractive index
of the cladding, as shown in Fig. 2.7. The wave equation for Ez component can
easily be solved using the method of separation of variables, leading to the
following overall solution [1–4]:
AJ m ðpρÞejmϕ ejβz , ρ a
Ez ðρ; ϕ; zÞ ¼ ð2:587Þ
BK m ðqρÞejmϕ ejβz , ρ>a
where Jm(x) and Km(x) are corresponding Bessel functions of mth order, introduced
earlier (A and B are constants to be determined from the boundary conditions). The
similar equation is valid for Hz. The other four components can be expressed in
terms of axial ones by using Maxwell’s equations, and in the core region, we obtain
[2–4, 96]:
j ∂Ez ω ∂H z j β ∂Ez ∂Hz
Eρ ¼ β þ μ Eϕ ¼ μ ω
p2 ∂ρ 0
ρ ∂ϕ p2 ρ ∂ϕ 0
∂ρ
ð2:588Þ
j ∂H z ω ∂Ez j β ∂H z ∂H z
Hρ ¼ 2 β ε0 n 2 Hϕ ¼ 2 þ ε 0 n2 ω
p ∂ρ ρ ∂ϕ p ρ ∂ϕ ∂ρ
where p2 ¼ n21 k20 β2 . The similar equations can be obtained for cladding by
replacing p2 with –q2, where q2 ¼ β2 n22 k20 . By satisfying the boundary condi-
tions, the homogeneous system of equation is obtained, which has the nontrivial
solution only if corresponding determinant is zero, which leads to the following
characteristic (eigenvalue) equation [2–4, 96]:
2.4 Signal Propagation in Optical Fibers and Corresponding Channel Impairments 167
0
J 0m ðpaÞ K 0m ðqaÞ J m ðpaÞ n22 K 0m ðqaÞ
þ þ
paJ m ðpaÞ qaK m ðqaÞ paJ m ðpaÞ n21 qaK m ðqaÞ
" # " # ð2:589Þ
1 1 1 n22 1
¼m 2
þ þ
ðpaÞ2 ðqaÞ2 ðpaÞ2 n21 ðqaÞ2
For given fiber parameters n1, n2, and a and the operating wavelength, we can
determine the normalized frequency V. For fixed V and a given m, there exist
multiple solutions n ¼ 1,2,3,. . . that lead to different modes-propagating modes.
The case m ¼ 0 corresponds to meridional rays (the rays that periodically intersect
the center axis of the fiber), the electric/magnetic components are independent of ϕ,
and the corresponding modes are classified as TE0n (Ez ¼ 0) and TM0n (Hz ¼ 0)
modes. The case m6¼0 corresponds to skew rays, the electric and magnetic fields
components are functions of ϕ, and the corresponding modes are classified as HEmn
(Hz dominates over Ez) and EHmn (Ez dominates over Hz) modes. Once the mode is
identified (m and n are fixed) from Eq. (2.589) and by using the definition expres-
sions for p and q above, we can easily determine the propagation constant of the
mode βmn.
The propagating light pulse is a composite optical signal containing a number of
monochromatic spectral components. Each spectral component behaves differently
in a dispersion medium, such as optical fiber, leading to the light pulse distortion.
Each axial component of the monochromatic electromagnetic wave can be
represented by its complex electric field function [2–4, 96]:
The light pulse distortion, which is observed through the pulse broadening along the
fiber, can be evaluated by knowing the frequency dependence of the propagation
constant β ¼ β(ω) at a specific distance z along the fiber. Each spectral component
will experience a phase shift proportional to β(ω)z. The amplitude spectrum
observed at point z along the fiber length, in the frequency domain, is given by:
The behavior of the pulse envelope during the propagation process can be evaluated
through the inverse Fourier transform of previous equation, which is very compli-
cated to calculate, unless additional simplifications are made, for example, by
expressing the propagation constant in terms of a Taylor series:
168 2 Propagation Effects in Optical and Wireless Communications. . .
dβ 1 d 2 β 2 1 d3 β
βðωÞ βðωc Þ þ ð ω ωc Þ þ ω¼ω ðω ωc Þ þ ðω ωc Þ3 þ . . .
dω ω¼ωc 2 dω2 c 6 dω3 ω¼ωc
ð2:593Þ
we get
ð
1
Aðz; tÞ ¼
1 ~ ð0; ωÞexp j β1 Δω þ β2 Δω2 þ β3 Δω3 z expðjðΔωÞtÞdðΔωÞ:
A
2π 2 6
1
ð2:595Þ
ð
1
∂Aðz; tÞ 1 β2 2 β3 3 ~
¼ j β1 Δω þ Δω þ Δω A ð0; ΔωÞ
∂z 2π 2 6 ð2:596Þ
1
jðβ1 Δωþ 22 Δω2 þ 63 Δω3 Þz jðΔωÞt
β β
e e dðΔωÞ
Finally, by taking the inverse Fourier transform of Eq. (2.596), we derive basic
propagation equation describing the pulse propagation in single-mode optical fibers:
2 3
∂Aðz; tÞ ∂Aðz; tÞ β2 ∂ Aðz; tÞ β3 ∂ Aðz; tÞ
¼ β1 j þ : ð2:597Þ
∂z ∂t 2 ∂t2 6 ∂t3
The polarization unit vector, representing the state of polarization (SOP) of the
electric field vector, does not remain constant in practical optical fibers, rather, it
changes in a random fashion along the fiber because of its fluctuating birefringence
[102–105]. Two common birefringence sources are (1) geometric birefringence
(related to small departures from perfect cylindrical symmetry) and (2) anisotropic
stress (produced on the fiber core during manufacturing or cabling of the fiber).
2.4 Signal Propagation in Optical Fibers and Corresponding Channel Impairments 169
c c dβx, y
ngx, y ¼ ¼ , β1x, y ¼ ð2:598Þ
vgx, y 1=β1x, y dω
so that the difference in time arrivals (at the end of fiber of length L ) for two
orthogonal polarization modes, known as the differential group delay (DGD), can
be calculated by [2, 4, 96]:
L L
Δτ ¼ ¼ Lβ1x β1y ¼ LΔβ1 : ð2:599Þ
vgx vgy
DGD can be quite large in PMF (~ 1 ns/km) due to their large birefringence.
Conventional fibers exhibit much smaller birefringence, but its magnitude and
polarization orientation change randomly at scale known as the correlation length
lc (with typical values in the range 10–100m). The analytical treatment of PMD is
quite complex due to statistical nature. A simple model divides the fiber into a large
number of segments (tens to thousands of segments), with both the degree of
birefringence and the orientation of the principal states being constant in each
segment but change randomly from section to section, as shown in Fig. 2.53.
Even though the fiber is composed of many segments having different birefrin-
gence, there exist principal states of polarization (PSP). If we launch a pulse light
into one PSP, it will propagate to the corresponding output PSP without spreading
due to PMD. Output PSPs are different from input PSPs. Output PSPs are frequency
independent up to the first-order approximation. A pulse launched into the fiber
with arbitrary polarization can be represented as a superposition of two input PSPs.
170 2 Propagation Effects in Optical and Wireless Communications. . .
where the parameters in Eq. (2.600) are already introduced above. For long fibers,
L
lc, the root-mean-squared (RMS) DGD follows:
D E1=2 pffiffiffiffiffiffiffiffiffi pffiffiffi
ðΔT Þ2 ¼ Δβ1 2lc L ¼ Dp L, ð2:601Þ
where Dp[ps/√km] is the PMD parameter. Typical values for PMD parameter are in
the range 0.01–10 ps/(km)1/2, in new fibers Dp < 0.1 ps/(km)1/2. The first-order
PMD coefficient, Dp, can be characterized again by Maxwellian PDF [102–105]:
rffiffiffi 2 !
2Dp D2p
f Dp ¼ exp 2 , ð2:602Þ
π α3 2α
where α is the coefficient with a typical value around 30 ps [102, 103]. The mean
value <Dp> determined from Maxwellian PDF is <Dp> ¼ (8/π)1/2α. The overall
probability Pr(Dp) that coefficient Dp will be larger than prespecified value can be
determined by:
ðp
D
pffiffiffi
ΔT ¼ 3 Dp L: ð2:604Þ
The second-order PMD occurs due to frequency dependence of both DGD and
PSP and can be characterized by coefficient DP2 [102]:
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
2 2
1 ∂DP1 DP1 ∂jsj
DP2 ¼ þ , ð2:605Þ
2 ∂ω 2 ∂ω
where the first term describes the frequency dependence of DGD and the second
term describes the frequency dependence of Stokes vector s (describing the position
of PSP) [103]. The statistical nature of second-order PMD coefficient in real fiber is
characterized by PDF of DP2 [104]:
2σ 2 DP2 tanhðσDP2 Þ
f ðDP2 Þ ¼ : ð2:606Þ
π coshðσDP2 Þ
The probability that the second-order PMD coefficient is larger than 3<DP2> is still
not negligible. However, it becomes negligible for larger values of 5<DP2>, so that the
total pulse spreading due to the second-order PMD effect can be expressed as [96]:
Nonlinear effects
Four-wave mixing
(FWM)
ðL ðL
P0 Leff ¼ PðzÞdz ¼ P0 eαz dz, ð2:608Þ
0 0
where α denotes the attenuation coefficient. By solving the previous equation for
Leff, we obtain:
1 eαL
Leff ¼ 1=α, ð2:609Þ
α
and the approximation is valid for fibers which are at least several tens of kilometers
in length. The affective length after M amplifiers is given by:
2.4 Signal Propagation in Optical Fibers and Corresponding Channel Impairments 173
1 eαL 1 eαL L
Leff , total ¼ M¼ , ð2:610Þ
α α l
where L is the total transmission length, l is the amplifier spacing, and M is the
number of amplifiers. If the amplifier spacing increases, the optical amplifier gain
increases in proportion to exp(αl), to compensate for the fiber losses. On the other
hand, the increase in the power enhances the nonlinear effects. Therefore, what
matters is the product of launched power P0 and the total effective length Leff,total as
follows: P0Leff,total.
The nonlinear effects are inversely proportional to the area of the fiber core
because the concentration of the optical power per unit cross-sectional area (power
density) is higher for smaller cross-sectional area and vice versa. Optical power
distribution across the cross-sectional area is closely related to the overall refractive
index, and to characterize it, the concept of effective cross-sectional area (Aeff) is
introduced [3, 4, 96]:
" #2
Ð Ð 2
rdrdθjEðr; θÞj
r θ
Aeff ¼ Ð Ð , ð2:611Þ
rdrdθjEðr; θÞj4
r θ
where E(r,θ) is the distribution of electric field in cross-section and (r,θ) denote the
polar coordinates. For the Gaussian approximation E(r,θ) ¼ E0exp(r2/w2), the
effective cross-sectional area is simply Aeff ¼ πw2, where w is the mode radius. The
Gaussian approximation is not applicable to the optical fibers having more compli-
cated index profile, such as DSFs, NZDFs, and DCFs. In these cases, the effective
cross-sectional area can be found by [4, 96]:
where the correction factor cf is smaller than one for DCFs and some NZDSFs and
larger than one for NZDSF with larger effective cross-sectional area.
For relatively high power density, the index of refraction acts as the function
density; the effect is known as Kerr effect:
P
n ð PÞ ¼ n0 þ n 2 , ð2:613Þ
Aeff
2πn2
βðPÞ ¼ β0 þ γP, β0 ¼ 2πn0 =λ, γ¼ , ð2:614Þ
λAeff
where γ is the nonlinear coefficient, with typical values being 0.9–2.75 W1km1 at
1550 nm. The propagation constant β will vary along the duration of optical pulse,
because the different points along the pulse will “see” different optical powers and
the frequency chirping is introduced. The propagation constant associated with the
leading edge of the pulse will be lower than that related to the central part of the
pulse. The difference in propagation constants will cause the difference in phases
associated with different portions of the pulse. The central part of the pulse will
acquire phase more rapidly than the leading and trailing edges. The total nonlinear
phase shift after some length L can be found by:
ðL ðL
1 eαL Leff
ΔΦ½P ¼ ½βðP0 Þ βdz ¼ γPðzÞdz ¼ γP0 ¼ , ð2:615Þ
|{z} α ffl} LNL
0 0
|fflfflfflfflffl{zfflfflfflffl
1=LNL
Leff
where LNL ¼ [γP0]1 is the nonlinear length. The frequency variation (chirp) can be
found as the first derivative of the nonlinear phase shift with respect to time:
Assuming that the fiber loss and the second-order GVD can be neglected, the
GNLSE simplifies to:
2
∂Aðz; tÞ ∂Aðz; tÞ β ∂ Aðz; tÞ
¼ β1 j 2 þ jγ jAðz; tÞj2 Aðz; tÞ: ð2:619Þ
∂z ∂t 2 ∂t2
When N
1, the nonlinear length is much larger than the dispersion length so that
the nonlinear effects can be neglected compared to those of chromatic dispersion. If
chromatic dispersion can be neglected (LD > 1), the NLSE can be solved
analytically [97]:
2
U ðz; τÞ ¼ U ð0; τÞejzjUð0;τÞj =LNL
: ð2:621Þ
Interestingly, the SPM modulation causes a phase change but no change in the
envelope of the pulse. Thus, SPM by itself leads only to chirping, regardless of the
pulse shape. The SPM-induced chirp, however, modifies the pulse-broadening
effects of chromatic dispersion.
The XPM is another effect caused by the intensity dependence of the refractive
index, but it is related to the multichannel transmission and occurs during propa-
gation of a composite signal. The nonlinear phase shift of a specific optical channel,
say the n-th channel, is affected not only by the power of that channel but also by
the optical power of the other channels as follows:
" #
X
N
2π Leff n2 X N
ΔΦn ðtÞ ¼ γLeff P0n ðtÞ þ P0i ðtÞ ¼ P0n ðtÞ þ P0i ðtÞ , ð2:622Þ
i¼1, i6¼n
λ Aeff i¼1, i6¼n
where P0n(t) denotes the pulse shape in the n-th channel, other parameters are the
same as before, and N denotes the number of wavelength channels. The nonlinear
phase shift is bit-pattern dependent. In the worst-case scenario, assuming that all
wavelength channels carry the same data stream, we can write:
2π Leff n2
ΔΦn ðtÞ ¼ ð2N 1ÞP0n ðtÞ: ð2:623Þ
λ Aeff
In practice, the optical pulses from different optical channels propagate at different
speeds (they have different group velocities). The phase shift given above can occur
only during the overlapping time. The overlapping among neighboring channels is
longer than the overlapping of channels spaced apart, and it will produce the most
176 2 Propagation Effects in Optical and Wireless Communications. . .
significant impact on the phase shift. If pulses walk through one another quickly
(due to significant chromatic dispersion or when the channels are widely separated),
the described effects on both pulses are diminished because the distortion done by
the trailing edge is undone by the leading edge.
The FWM is another effect that occurs in optical fibers during the propagation of
a composite optical signal, such as the WDM signal. It gives a rise to the optical
signals. The three optical signals with different carrier frequencies fi, fj, and fk (i,j,
k ¼ 1,. . .,M ) interact to generate the new optical signal at frequency fijk ¼ fi + fj fk,
providing that the phase-matching condition is satisfied:
βijk ¼ βi þ βj βk , ð2:624Þ
Δβ ¼ βi þ βj βk βijk , ð2:625Þ
where dijk is the measure of degeneracy, which takes value 3 in degenerate case or
value 6 in non-degenerate case. FWM can produce significant signal degradation in
WDM systems since several newly generated frequencies can coincide with any
specific channel. Namely, the total number of newly generated frequencies
N through the FWM process is N ¼ M2(M1)/2. Fortunately, some of the newly
generated frequencies have negligible impact. However, some of them will have
significant impact especially those coinciding with already existing WDM
channels.
The FWM can be reduced either by reducing the power per channel or by
preventing the perfect phase matching by increasing the chromatic dispersion or
increasing the channel spacing. One option would be to use nonuniform channel
spacing. On the other hand, the FWM process can be used to perform some useful
2.4 Signal Propagation in Optical Fibers and Corresponding Channel Impairments 177
ðt
Pðr; tÞ ¼ ε0 χ ð1Þ ðt t0 ÞEðr; t0 Þdt0 þ ε0 χ ð3Þ E3 ðr; tÞ ð2:627Þ
1
where the first term corresponds to the linear part and the second term, PNL(r,t), to
the nonlinear part. χ(1) denotes the linear susceptibility, χ(3) denotes the third-order
susceptibility, and ε0 is the permittivity of vacuum. (Because of the symmetry of
silica molecules, only odd terms are present in Taylor expansion of P(r,t).) A
wavelength division multiplexing (WDM) signal can be represented as the sum of
N monochromatic plane waves of angular frequency ωi (the modulation process is
ignored in this simplified analysis):
X
N
Eðr; tÞ ¼ En cos ðωn t βn zÞ: ð2:628Þ
n¼1
The nonlinear polarization can be written as after substitution of Eq. (2.628) into
second term of Eq. (2.627) as follows:
X
N X
N X
N
ð2:629Þ
3 ð3Þ X N
PNL ðz; tÞ ¼ ε0 χ E2i Ei cos ðωi t βi zÞ
4 i¼1
3 XN X
þ ε0 χ ð3Þ 2Ei Ej Ei cos ðωi t βi zÞ
4 i¼1 j6¼i
3 XN X
þ ε0 χ ð3Þ E2i Ej cos 2ωi ωj t 2βi βj z
4 i¼1 j6¼i
6 XN XX
þ ε0 χ ð3Þ Ei Ej Ek cos ωi þ ωj ωk t βi þ βj βk z þ . . .
4 i¼1 j>i k>j
ð2:630Þ
178 2 Propagation Effects in Optical and Wireless Communications. . .
The first term in the first line corresponds to the SPM, the second term in the
same line corresponds to the XPM, the term in the second line corresponds to the
degenerate FWM case, and the last term corresponds to the non-degenerate FWM.
Raman scattering is a nonlinear effect that occurs when a propagating optical
signal interacts with glass molecules in the fiber undergoing a wavelength shift. The
result of interaction is a transfer of energy from some photons of the input optical
signal to vibrating silica molecules and creation of new photons with lower energy
than the energy of incident photons. The incident optical signal is commonly
referred to as a pump, and the generated signal is called the Stokes signal. The
difference in frequencies between the pump (ωp) and the Stokes signal (ωs) is
known as the Raman frequency shift ωR ¼ ωpωs. Scattered photons are not in
phase with each other and do not follow the same scattering patter, meaning that
energy transfer from pump to Stokes photons is not a uniform process. As a result,
there exists the frequency band that includes frequencies of all scattered Stokes
photons. Scattered Stokes photons can take any direction that can be either forward
or backward with respect to the direction of the pump, meaning that Raman
scattering is isotropic process. If the pump power is lower than a certain threshold
value, the Raman scattering process will have a spontaneous character, character-
ized by the small number of pump photons that will be scattered and converted to
the Stokes photons. However, when the pump power exceeds the threshold value,
Raman scattering becomes a stimulated process. SRS can be explained as a positive
feedback process in the pump signal interacts with Stokes signal and creates the
beat frequency ωR ¼ ωpωs, and the beat frequency then serves as s stimulator of
molecular oscillations, and the process is enhanced or amplified. Assuming that the
Stokes signal propagates in the same direction as the pump signal, the intensity of
the pump signal Ip ¼ Pp/Aeff and the intensity of the Stokes signal Is ¼ Ps/Aeff are
related by the following systems of coupled differential equations [3, 4, 96, 97]:
dI p ωP dI s
¼ gR I p I s αp I p , ¼ gR I p I s αs I s , ð2:631Þ
dz ωS dz
where αp (αs) is the fiber attenuation coefficient of the pump (Stokes) signal and gR
is the Raman gain coefficient. Because the SRS process is not the uniform process,
the scattered Stokes photons will occupy a certain frequency band, and the Raman
gain is not constant but the function of frequency. It can roughly be approximated
by the Lorentzian spectral profile [3, 4, 96, 97]:
gR ð Ω R Þ
g R ð ωR Þ ¼ , ð2:632Þ
1 þ ðωR ΩR Þ2 T 2R
where TR is vibration states decay time (in the order 0.1 ps for silica-based materials)
and ΩR is the Raman frequency shift corresponding the Raman gain peak. The actual
gain profile extends over 40 THz (~320 nm), with a peak around 13.2 THz. The
Raman gain peak gR(ΩR) ¼ gR,max is between 1012 and 1013 m/W for wavelengths
2.4 Signal Propagation in Optical Fibers and Corresponding Channel Impairments 179
above 1300 nm. The gain profile can also be approximated by a triangle function,
which is commonly used in analytical studies of SRS [3, 4, 96, 97]:
gR ðΩR ÞωR
g R ð ωR Þ ¼ : ð2:633Þ
ΩR
The Raman threshold, defined as the incident power at which half of the pump
power is converted to the Stokes signal, can be estimated using the system of
differential equations by replacing gR by gR,max. The amplification of Stokes power
along distance L can be determined by:
gR, max Ps, 0 L
Ps ðLÞ ¼ Ps, 0 exp , ð2:634Þ
2Aeff
where Ps , 0 ¼ Ps(0). The Raman threshold can be determined by [3, 4, 96, 97]:
16Aeff
PR, threshold ¼ Ps, 0 ð2:635Þ
gR, max Leff
and for typical SMF parameters (Aeff ¼ 50μm2 , Leff ¼ 20 km , and gR , max ¼ 7 10–13
m/W), it is around 500 mW.
The SRS can effectively be used for optical signal amplification (Raman ampli-
fiers), as we explained earlier. In WDM systems, however, the SRS effect can be
quite detrimental, because the Raman gain spectrum is very broad, which enables
the energy transfer from the lower to higher wavelength channels. The shortest
wavelength channel within the WDM system acts as a pump for several long
wavelength channels while undergoing the most intense depletion. The fraction
of power coupled out of the channel 0 to all the other channels (1, 2, . . ., M–1; M is
the number of wavelengths), when the Raman gain shape is approximated as a
triangle, is [3, 4, 96, 97]:
X
N 1
gR, max ΔλPLeff N ðN 1Þ
P0 ¼ P 0 ð nÞ ¼ , ð2:636Þ
n¼1
2ΔλC Aeff 2
where Δλ is the channel spacing and Δλcffi125 nm. The energy transfer between
two channels is bit-pattern dependent and occurs only if both wavelengths are
synchronously loaded with 1 bit, meaning that the energy transfer will be reduced
if dispersion is higher due to the walk-off effect (difference in velocities of different
wavelength channels will reduce the time of overlapping).
Brillouin scattering is a physical process that occurs when an optical signal
interacts with acoustical phonons, rather than the glass molecules. During this
process, an incident optical signal reflects backward from the grating formed by
acoustic vibrations and downshifts in frequency. The acoustic vibrations originate
from the thermal effect if the power of an incident optical signal is relatively small.
180 2 Propagation Effects in Optical and Wireless Communications. . .
If the power of incident light goes up, it increases the material density through the
electrostrictive effect. The change in density enhances acoustic vibrations and
forces Brillouin scattering to become stimulated. The SBS process can also be
explained as a positive feedback mechanism, in which the incident light (the pump)
interacts with Stokes signal and creates the beat frequency ωB ¼ ωp–ωs. The
parametric interaction between pump, Stokes signal, and acoustical waves requires
both the energy and momentum conservations: the energy is effectively preserved
through the downshift in frequency, while the momentum conservation occurs
through the backward direction of the Stokes signal. Since the SBS can be effec-
tively suppressed by dithering the source (directly modulating the laser with a
sinusoid at a frequency much lower than the receiver low-frequency cutoff), it is not
discussed much here.
The GNLSE has already been introduced in previous section. Here we describe it in
operator form, discuss its efficient solving, and extend it to the multichannel
transmission. Additionally, the GNLSE for polarization division multiplexing
(PDM) is described as well. Finally, we describe the GNLSE suitable for study of
propagation is spatial division multiplexing (SDM) systems.
The operator form of GNLSE is given by [3, 4, 96, 106, 107]:
∂Eðz; tÞ ^ ^
2 3
¼ D þ N E, ^ ¼ α jβ2 ∂ þ β3 ∂ ,
D N^ ¼ jγ E2 , ð2:637Þ
∂z 2 2 ∂t2 6 ∂t3
where E is the signal electric field magnitude, D ^ and N^ denote the linear and
nonlinear operators, while α, β2, β3, and γ represent attenuation coefficient, GVD,
second-order GVD, and nonlinear coefficient, respectively. To solve the NSE, the
split-step Fourier method is commonly used [3, 4, 96, 106, 107]. The key idea
behind this method is to split the fiber into sections, each with length Δz, and
perform the integration of NSE on each section, which leads to expression:
^ þ N^ Δz Eðz; tÞ:
Eðz þ Δz; tÞ ¼ exp D ð2:638Þ
In addition, the Taylor expansion can be used to present exponential term from
Eq. (2.638) as:
X
1
Instead of Taylor expansion, the following two approximations are commonly used
in practice:
2.4 Signal Propagation in Optical Fibers and Corresponding Channel Impairments 181
(
^ ^ ^
eDΔz=2 eN Δz eDΔz=2 Eðz; tÞ
Eðz þ Δz; tÞ ^ ^ ð2:640Þ
eDΔz eN Δz Eðz; tÞ
where the first method (the upper arm on the right side of above equation) is known
as symmetric split-step Fourier method (SSSFM), while the second (the lower arm
on the right side of above equation) is known as asymmetric split-step Fourier
method (ASSFM). Clearly, these methods have similarities with corresponding
methods to describe the propagation in atmospheric turbulence channels. The linear
operator in either method corresponds to multiplication in frequency domain,
which is:
α β β
exp ΔhD^ Eðz; tÞ ¼ FT1 exp þ j 2 ω2 þ j 3 ω3 Δh FT½Eðz; tÞ ,
2 2 6
ð2:641Þ
^
Eðz þ Δz; tÞ ¼ exp DΔz=2 exp@ N ðz0 Þdz0 Aexp DΔz=2
^ Eðz; tÞ
z
^
N^ ðz þ ΔzÞ þ N^ ðzÞ
^
The iteration procedure that should be applied in accordance with Eq. (2.643) is
illustrated in Fig. 2.55. Since this iteration procedure can be time extensive, the
following less accurate approximation can be considered instead:
(
^
exp DΔz=2 exp N^ ðz þ Δz=2ÞΔz exp DΔz=2
^ Eðz; tÞ, for SSSFM
Eðz þ Δz; tÞ
:
^ exp N^ ðzÞΔz Eðz; tÞ, for ASSFM
exp DΔz
ð2:644Þ
182 2 Propagation Effects in Optical and Wireless Communications. . .
Eprev(z +Δz, t)
No
|E-Eprev| / |E|<e
Yes
E(z +Δz, t)
eA eB ¼ eAþBþ2½A;Bþ12½A;½A;B12½B;½A;B24½B;½A;½A;Bþ,
1 1 1 1
ð2:645Þ
where [A, B] is the commutator of two operators A and B, defined as: [A, B] ¼ AB –
BA. By applying this formula to SSSFM and ASSFM, we obtain that:
^ N^ Δz ^ ^ 1 ^ N^ Δz2 þ
D;
e DΔz
e ffi eDΔzþN Δzþ 2 , 3 ð2:646Þ
1 ^ ^ ^ D=2
^
e
^
DΔz=2 N^ Δz DΔz=2
e
^
e ffie
^
DΔzþ N^ Δzþ N
6 þ D=2; N; Δz þ :
As we can see, the operator error in ASSFM is in the order of (Δz2), while the
operator error in SSSFM is in order of (Δz3), which means that SSSFM offers better
accuracy.
The step-size selection is analyzed in several papers [108–110]. The step-size is
traditionally chosen as a function of characteristic length over which the phase
2.4 Signal Propagation in Optical Fibers and Corresponding Channel Impairments 183
distortion reaches maximum tolerable value. For chromatic dispersion (CD) and
Kerr nonlinearities (NL), the characteristic lengths are given as [106, 107]:
where PTx is the launched power and ωmax is the highest frequency in the spectrum
of modulated signal, which is:
2πRs , single-carrier systems
ωmax ð2:648Þ
2π ðN sc þ 1ÞΔf sc , OFDM systems
with Rs being the symbol rate, Nsc being the number of subcarriers, and Δfsc being
the subcarrier spacing. If the maximum phase shifts that can be tolerated due to
chromatic dispersion and nonlinearities are denoted by ΔϕCD and ΔϕNL, respec-
tively, we can determine the step-size as [106, 107]:
Another approach is to keep the local error Δε below tolerable value by choosing
the step-size as [109, 110]:
8n h
<
2 io1=3
Δε= γPðzÞ jβ2 jω2max , for SSSFM
Δz ¼ ð2:650Þ
:
1=2
Δε= γPðzÞ jβ2 jω2max , for ASSFM
where Δf is the channel spacing. This approach can be called the “total-field
propagation model.” The second approach is to consider individual WDM sepa-
rately and then solve the set of coupled GNLSEs:
∂Ei ðz; tÞ ^
¼ D i þ N^ i Ei ðz; tÞ,
∂z !
2 3 X 2
D^ i ¼ α β1, i ∂ jβ2 ∂ þ β3 ∂ , N^ i ¼ jγ jEi j þ
2 Ej :
2 ∂t 2 ∂t2 6 ∂t3 j6¼i
ð2:652Þ
184 2 Propagation Effects in Optical and Wireless Communications. . .
The GNLSE for PDM systems can be described as follows [106, 107]:
∂Eðz; tÞ ^
^ Eðz; tÞ,
¼ DþN
∂z
2 3
D^ ¼ α β1 ∂ jβ2 ∂ þ β3 ∂ , ^ ¼ jγ jEj2 I - 1 E{ YE Y ,
N
2 ∂t 2 ∂t2 6 ∂t3 3
ð2:653Þ
where ~ E ¼ [ExEy]T denotes the Jones vector of electric field; α denotes the
attenuation coefficients in x- and y-polarizations; and β1, β2, and β3 denote the
group velocity, GVD, and second-order GVD parameters, respectively, while Y
denotes the Pauli-Y matrix in quantum mechanics notation [7]. The Pauli matrices
are defined here as:
0 1 0 j 1 0
X¼ , Y¼ , Z¼ : ð2:654Þ
1 0 j 0 0 1
where 2θk and 2εk are azimuth and ellipticity angles of k-th fiber section and δk
corresponds to differential group delay (DGD) of the section. The PDM-GNLSE
should be solved through iterative relation:
h
i
Eðz þ Δz; tÞ ¼ exp Δz D ^ Eðz; tÞ,
^ þN ð2:656Þ
where the complexity of propagation simulation is clearly higher than in the single-
polarization case.
In the rest of this section, we describe the GNLSE for few-mode fiber
(FMF)-based mode-division multiplexing, based on N modes, introduced in [111]
(see also [112]). The electric field in a group of N/2 degenerate spatial modes is
represented by N-dimensional complex valued vector ~ E. For example, if we
consider two-mode fiber (LP01 and LP11), then the ~ E can be expanded as:
~
E ¼ ½ E1 E2 T ¼ ½ E1x E1y E2x E2y T , ð2:657Þ
which is constructed by stacking the Jones vectors of N spatial modes one on top of
~i denotes the i-th spatial mode. We separate the linear
each other. In Eq. (2.657), E
and nonlinear operators as follows:
2.4 Signal Propagation in Optical Fibers and Corresponding Channel Impairments 185
d~
E ^ ^
~
¼ DþN E, ð2:658Þ
dz
^ is the linear part and the N
where the D ^ is the nonlinear part. The linear part vector
form GNLSE can be written as:
2 3
^ ¼ 1 ~ dy ∂ 1 ∂
D α β~1 j β~2 2 þ β~3 3 , ð2:659Þ
2 dx ∂t 3! ∂t
β~1 ¼ U Α U{ , ð2:660Þ
where U and Α are random unitary Gaussian matrix [113] and different mode delay
matrix, respectively. Both U and Α are matrices of size 2N-by-2N and U{ is the
conjugated transpose of U. Α can be further represented as:
0 τPMD1 1
τ~1 þ σ~1 ... ~
022
B 2 C
B C
A¼B
B ⋮ ⋱ ⋮ C,
C ð2:661Þ
@ A
~ τPMDN
022 τ~N þ σ~1
2
DPMD1
τPMDi ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi , ð2:662Þ
2 2 Lcorrelation
where E ~i denotes the i-th propagation mode, which includes both x- and
y-polarization modes. fself and fcross are general self- and cross-mode coupling
~ 2
coefficients [112, 114]. The i-th spatial mode power E i can be calculated as
186 2 Propagation Effects in Optical and Wireless Communications. . .
2 2 2
~
Ei ¼ E~ix þ E~iy . The nonlinearity factor γ in Eq. (2.847) can be obtained as
described in previous section by:
2πn2 f ref
γ¼ , ð2:664Þ
cAeff
where n2 is the nonlinear index, fref is the reference frequency, and Aeff is the
core area.
The total noise is a stochastic process that has both multiplicative (introduced only
when the signal is present) and additive (always present) components. Multiplica-
tive noise components are mode partition noise (MPN), laser intensity noise (RIN),
modal noise, quantum shot noise, and avalanche shot noise. Additive noise compo-
nents are dark current noise, thermal noise, amplified spontaneous emission (ASE)
noise, and cross talk noise.
Originators of the noise in an optical transmission system can be identified as
follows. In semiconductor lasers, the laser intensity noise, laser phase noise, and
mode partition noise are present. In optical cable, in fiber and splicing, the modal
noise and reflection-induced noise are present. In optical amplifiers, the spontane-
ous emission and amplified spontaneous emission noises are present. At the
receiver side, during the photodetection process, the thermal noise and quantum
noise are generated. The noise components at the receiver side are cumulative. The
most relevant optical noise components at the input of optical preamplifier are
intensity noise and spontaneous emission noise, which contains the spontaneous
emission noise from the preceding in-line amplifier and accumulated ASE noise
from other in-line amplifiers. The optical preamplifier will enhance all optical
inputs in proportion to the gain, and it will also generate additional spontaneous
emission noise. During the photodetection process, as already indicated above, the
quantum noise and thermal noise will be generated; in addition, different beating
components, such as signal-noise beating and noise-noise beating components, will
be created. The most important noise sources coming from the front-end amplifiers
are ASE noise and signal-noise beating component. The front-end amplifier will
generate additional thermal noise.
The mode partition noise (MPN) is the relative fluctuation in power between the
main and side modes. The total power can remain unchanged but the distribution of
2.5 Noise Sources in Optical Channels 187
power among modes changes. MPN is present (up to certain amount) even in DFBs.
MPN can affect the RIN significantly by enhancing it. It will occur even when the
mode suppression ratio (MSR) is around 20 dB. Different modes will travel at
different velocities due to dispersion, so that MPN can lead to the ISI.
where na and nb denote the refractive index coefficients of materials facing each
other.
The strongest reflection occurs at the glass-air interface, rref [(1.46 1)/(1.46
+ 1)]2 3.5% (–14.56 dB). It can be reduced below 0.1% if index-matching oils or
gels are used. The considerable amount of back-reflected light can come back and
enter the laser cavity, negatively affecting the laser operation and leading to excess
intensity noise. The RIN can be increased by up to 20 dB if the back-reflected light
exceeds 30 dBm. The multiple back and forth reflections between splices and
connectors can be the sources of additional intensity noise.
The operating characteristics of semiconductor lasers are well described by the set
of ordinary differential equations – the rate equations – which describe the inter-
action between photons and electrons inside the active region [2–4, 96]:
dP P
¼ GP þ Rsp þ FP ðtÞ, ð2:666Þ
dt τp
dN I N
¼ GP þ FN ðtÞ ð2:667Þ
dt q τc
188 2 Propagation Effects in Optical and Wireless Communications. . .
and
dϕ 1 1
¼ αchirp G þ Fϕ ðtÞ: ð2:668Þ
dt 2 τp
In Eq. (2.666), the term GP denotes the increase in photon number (P) due to
stimulated emission, the term Rsp denotes the increase in P due to spontaneous
emission and can be calculated by Rsp ¼ nspG (nsp-the spontaneous emission factor,
typically nsp 2), the term –P/τp denotes the decrease in P due to emission through
the mirrors and scattering/absorption by free carriers, and the term Fp(t) corre-
sponds to the noise process. In Eq. (2.667), the term I/q denotes the increase in
electron numbers (N ) due to injection current I, the term –N/τc denotes the decrease
in N due to spontaneous emission and nonradiative recombination, the term –GP
denotes the decrease in N due to stimulated emission, and the term Fn(t) corre-
sponds to the noise process. Finally, in Eq. (2.668), the first term corresponds to
dynamic chirp, the second term to the adiabatic chirp, and Fϕ(t) corresponds to the
noise process. The noise terms Fp(t), Fn(t), and Fϕ(t) introduced above are known as
Langevin forces that are commonly modeled as zero-mean Gaussian random
processes. The photon lifetime τp is related to the internal losses (αint) and mirror
losses (αmir) by τp ¼ [vg(αint + αmir)]1, with vg being the group velocity. The carrier
lifetime τc is related to the spontaneous recombination time (τspon) and nonradiation
recombination time (τnr) by τc ¼ τsponτnr/(τspon + τnr). The net rate of stimulated
emission G is related to the material gain gm by G ¼ Γvggm, where Γ is the
confinement factor.
Noise in semiconductor lasers originates from two sources: (1) spontaneous
emission (the dominant noise source) and (2) electron-hole recombination shot
noise. As mentioned above, the noise effects can be modeled by random driving
terms in laser rate equations known as Langevin forces, which can be described as
zero-mean Gaussian random processes with autocorrelation function (Markoffian
approximation) [2–4, 96]:
Fi ðtÞFj ðt0 Þ ¼ 2Dij δðt t0 Þ; i, j 2 fP; N; ϕg, ð2:669Þ
with dominating factor being Dpp ¼ RspP and Dϕϕ ¼ Rsp /4P. Fluctuation in inten-
sity can be described by intensity autocorrelation function [2–4, 96]:
The RIN spectrum can be found by FT of the autocorrelation function [2–4, 96]:
ð
1
jωt 1=P3 at low P
RINðωÞ ¼ Cpp ðτÞe dτe ð2:671Þ
1=P at high P
1
2.5 Noise Sources in Optical Channels 189
ð
1
S ð ωÞ ¼ Γ EE ðtÞejðωω0 Þτ dτ,
ð2:673Þ
1
∗
where Δϕ(τ) ¼ ϕ(t + τ) ϕ(t). By describing the laser phase noise process as Wie-
ner-Lévy process, that is, a zero-mean Gaussian process with variance 2πΔν|t|
(where Δν is the laser linewidth), the spectrum of emitted light is found to
Lorentzian:
2 3
P 6 1 1 7
SEE ðνÞ ¼ 4 2 þ 2 5, ð2:674Þ
2πΔν 2ðνþν0 Þ 2ðνν0 Þ
1þ Δν 1þ Δν
where ν0 is the central frequency and other parameters are already introduced above.
The phase fluctuation variance (neglecting the relaxation oscillation) [2–4, 96] is:
2 Rsp
Δϕ ðτÞ ¼ 1 þ α2chirp jτj ¼ 2πΔνjτj: ð2:675Þ
2P
Rsp
Δν ¼ 1 þ α2
, ð2:676Þ
4π P chirp
and we conclude
that the chirp effect enhances the laser linewidth by factor
1 þ α2chirp .
190 2 Propagation Effects in Optical and Wireless Communications. . .
4kB Θ 2 4kB Θ
Sthermal ¼ , i thermal ¼ Δf ð2:677Þ
RL RL
The spontaneous emission of light appears during the optical signal amplification,
and it is not correlated with signal (it is additive in nature). The noise introduced by
spontaneous emission has a flat frequency characterized by Gaussian probability
density function (PDF), and the (double-sided) PSD in one state of polarization is
given by [2–4, 96]:
where G is the amplifier gain and hν is the photon energy. The optical amplifier
noise figure Fno, defined as the ratio of SNRs at the input and output of the optical
amplifier, is related to the spontaneous emission factor nsp ¼ N2/(N2 N1) (for the
two-level system) by [2–4, 96]:
1
Fno ¼ 2nsp 1 ffi 2nsp 2: ð2:679Þ
G
In the most of practical cases, the noise figure is between 3 and 7 dB. The
effective noise figure of the cascade of K amplifiers with corresponding gains Gi
and noise figures Fno,i (i ¼ 1,2,. . .,K ) [2–4, 96] is as follows:
The total power of the spontaneous emission noise, for an amplifier followed by
an optical filter of bandwidth Bop, is determined by:
2
Psp ¼ 2Esp ¼ 2Ssp ðνÞBop ¼ ðG 1ÞFno hνBop , ð2:681Þ
where E(t) denotes the electric field at the receiver input and n(t) denotes the
amplifier spontaneous emission noise, which is the Gaussian process with PSD
given by Eq. (2.678). The photocurrent has the following form:
Optical receiver
p.i.n
G OF EF
Pin P PD OF-optical filter
Bop Bel EF-electrical filter
Si(f)
R2Ssp2 Bop
2R2Ssp
R[GPin + SspBop] sig-sp Shot noise
Following the procedure described [2–4, 96], we can determine the variance of
different noise and beating components as follows:
Bðel
σ ¼
2
Si ðf Þdf ¼ σ 2sh þ σ 2sig-sp þ σ 2sp-sp , σ 2sh ¼ 2qR GPin þ Ssp Bop Bel ,
Bel
σ 2sig-sp ¼ 4R2 GPin Ssp Bel , σ 2sp-sp ¼ R2 S2sp 2Bop Bel Bel
ð2:684Þ
where we used sub-scripts “sh” to denote the variance of shot noise, “sp-sp” to
denote the variance of spontaneous-spontaneous beat noise, and “sig-sp” to denote
the variance of signal-spontaneous beating noise. Ssp is the PSD of spontaneous
emission noise (Eq. (2.21)), Pin is the average power of incoming signal (see
Fig. 2.1), and the components of the PSD of photocurrent i(t), denoted by Si( f ),
are shown in Fig. 2.57.
N n eN
pð nÞ ¼ , ð2:685Þ
n!
2.5 Noise Sources in Optical Channels 193
where N is the average number of generated electron-hole pairs. The Poisson PDF
approaches Gaussian for large N. The mean of photocurrent intensity:
qN qN
I ¼ hiðtÞi ¼ ¼ , Δt ¼ T ð2:686Þ
Δt T
For Poisson distribution, the variance equals the mean 〈(n N )2〉 ¼ N so the
photocurrent can be calculated by i(t) ¼ qn/T. The shot-noise mean-square value
can be determined by:
D E
2 D E q 2
½n N 2 q2 N
i sn ¼ ½iðtÞ I 2 ¼ ¼
T2 T2
qI Rb 1
¼ ¼ 2qIΔf , Δf ¼ Rb ¼ ð2:687Þ
T 2 T
where Rb is the bit rate. Equation (2.13) is derived from NRZ modulation format,
but validity is more general. Therefore, the power spectral density of shot noise is
determined by Ssn( f ) ¼ 2qI. To determine the APD shot-noise mean-square value,
the p-i-n shot-noise mean-square value has to be multiplied by the excess noise
factor F(M ) to account for the randomness of impact ionization effect:
2 APD
i sn ¼ Ssn APD
ðf ÞΔf ¼ 2qM2 FðMÞIΔf ,
ð2:688Þ
1
Fð M Þ ¼ k N M þ ð 1 k N Þ 2 ,
M
where M is the average APD multiplication factor and kN is the ratio of impact
ionization factors of holes and electrons, respectively. The often used excess noise
factor approximation is the following one [96]:
The dark current Id flows through the reversed-biased photodiode even in the
absence of incoming light. The dark current consists of electron-hole pairs created
due to thermal effects in p-n junction. The dark current noise power can be
calculated as follows [2–4, 96]:
2 APD
i dcn ¼ Sdcn
APD
ðf ÞΔf ¼ 2qhMi2 FðMÞI d Δf : ð2:690Þ
194 2 Propagation Effects in Optical and Wireless Communications. . .
λ1 λ1
Signal λ2
λ1 λ2 Crosstalk
λ2 λ1
λ1 λ2 Signal λ2
Crosstalk
(a) (b)
Fig. 2.58 Illustration of the sources of interchannel cross talk: (a) demux and (b) the optical
switch
2.5.9 Crosstalk
The cross talk effects occur in multichannel (WDM) systems and can be classified
as (1) interchannel component (the cross talk wavelength is sufficiently different
from observed channel wavelength) and (2) intrachannel (the cross talk signal is at
the same wavelength as observed channel or sufficiently close) component.
Interchannel cross talk (also known as out-of-band or hetero-wavelength cross
talk) is introduced by either an optical filter or demultiplexer that selects desired
channel and imperfectly rejects the neighboring channels, which is illustrated in
Fig. 2.58a. Another source of interchannel cross talk is an optical switch, shown in
Fig. 2.58b, in which the cross talk arises because of imperfect isolation among
different wavelength ports. The cross talk signal behaves as noise and it is a source
of linear (noncoherent) cross talk, so that the photocurrent at receiver can be written
as [2, 4, 97]:
X
I ¼ Rm Pm þ Rn Xmn Pn I ch þ I X , Rm ¼ ηm q=hνm ,
n6¼m
X ð2:691Þ
IX ¼ Rn Xmn Pn
n6¼m
where Rm is the photodiode responsivity of mth WDM channel with average power
Pm, Ich ¼ RmPm is the photocurrent corresponding to the selected channel, IX is the
cross talk photocurrent, and Xmn is the portion of n-th channel power captured by
the optical receiver of the mth optical channel.
The intrachannel cross talk in transmission systems may occur due to multiple
reflections. However, it is much more important in optical networks. In optical
networks it arises from cascading optical (WDM) demux and mux or from an
optical switch, which is illustrated in Fig. 2.59. Receiver current I(t) ¼ R|Em(t)|2
contains interference or beat terms, in addition to the desired signal: (1) signal-cross
talk beating terms (like EmEn) and (2) cross talk-cross talk beating terms (like EnEk,
k 6¼ m, n 6¼ m). The total electric field Em and receiver current I(t), observing only
the in-band cross talk, can be written as [2, 4, 97]:
2.6 Indoor Optical Wireless Communication Channels 195
λ1
Signal λ1
λ1 λ1
Signal
λ1
λ1
Leakage λ1 Signal
Crosstalk
λ2
Demux Mux Optical switch Crosstalk
(a) (b)
Fig. 2.59 Illustration of the sources of intrachannel cross talk: (a) a demux-mux pair and (b) the
optical switch
!
X
Em ðtÞ ¼ Em þ En ejωm t ,
n6¼m
ð2:692Þ
2
X
N pffiffiffiffiffiffiffiffiffiffiffi
I ðtÞ ¼ RjEm ðtÞj RPm ðtÞ þ 2R Pm Pn cos ½ϕm ðtÞ ϕn ðtÞ
n6¼m
where ϕn(t) denotes the phase of n-th channel and R is the photodiode responsivity.
Each term acts as an independent random variable, and the cross talk effect can be
observed as the intensity noise (i.e., Gaussian for large N ):
The intensity modulation and direct detection is considered by many authors, and it
is only a viable technology for both IR OWCs and VLCs. One typical OFDM-based
WOC link is shown in Fig. 2.60. Because of unguided propagation, the OWC links
face significant free-space loss. Similarly as wireless indoor links, the most impor-
tant factor in performance degradation is the multipath effect. Namely, in addition
to the LOS component, several diffuse reflection-based components arrive at the
receiver side. Because the direct detection is used, we do not worry about
co-phasing of different multipath components. However, since high-speed signals
are transmitted over an IR link, different multipath components arrive in time slots
of neighboring symbols causing the ISI. To deal with ISI effect, different methods
can be classified into three broad categories: (1) equalization, (2) multicarrier
modulation (such as OFDM), and (3) spread spectrum. Multicarrier modulation
can also be combined with diversity and multi-input multi-output (MIMO) tech-
niques. The dominant noise source in IR links is the ambient light, which is
responsible for the shot-noise component. Artificial light sources also introduce
harmonics up to 1 MHz in the transmitted signal. When the ambient light is weak,
the receiver preamplifier is a predominant noise source. Fortunately, most of the
ambient noise can be removed by proper optical filtering. A typical receiver for
OWC consists of an optical front end, with an optical concentrator being used to
collect the incoming radiation, an optical filter (to reduce the ambient light), a
photodetector, and an electrical front end. The OFDM-based OWC receiver con-
tains an OFDM receiver. By reducing the number of subcarriers to one, the phase
modulated signals can be transmitted over direct detection links. For intensity
modulation with direct detection (IM/DD), the bias addition circuit should be
omitted and OFDM transmitter replaced by a NRZ/RZ/pulse-position modulator.
On receiver side, for IM/DD, OFDM transmitter should be replaced by the
corresponding RF demodulator.
Fig. 2.60 A typical OFDM-based optical wireless communication link with direct modulation
and direct detection. LD laser diode
2.6 Indoor Optical Wireless Communication Channels 197
Different link types used in OWC systems, shown in Fig. 2.61, can be classified
as [117] point-to-point links (there exists a LOS component), diffuse links (trans-
mitter emits optical power over a wide solid angle, emitted light get reflected from
ceiling so that receiver gets illuminated from diffused light), and quasi-diffuse links
(the transmitter illuminates the ceiling with a series of slowly diverging beam
sources). The quasi-diffuse links are also known as non-LOS links. The point-to-
point links may contain both LOS component and diffused reflected multipath
components (see Fig. 2.61d). The channel transfer function can be written as
follows:
where HLOS corresponds to the LOS path amplitude gain and Hdiff( f ) represents the
contribution of diffuse reflected multipath components, which can be approximated
as a low-pass filtering function [116]. When the room is homogeneous and isotro-
pic, the Rician factor, introduced in section on wireless channel modeling, can be
used to quantify the ratio between the LOS and diffuse components as follows:
K ¼ (HLOS/Hdiff)2.
When the LOS link is a reasonably short, the LED is used as the source, the
nonimaging concentrator to collect the light; we can model the transfer function of
LOS as follows [121, 122]:
where AR is the active area, ϕ is the transmit angle with respect to the maximum
radiation direction, while ψ and r are the angle of irradiance and the distance to
illuminated surface, respectively, as shown in Fig. 2.62. In Eq. (2.695), ψ FOV
denotes the field-of-view (FOV) angle.
Parameter m denotes the Lambert index related to the source radiation semi-
angle by m ¼ 1/log2(cosθ1/2), with θ1/2 being the IR LED semi-angle at half-
power. In Eq. (2.695), we use ts(ψ) to denote the transmission of an optical filter and
g(ψ) to denote the gain of nonimaging concentrator g(ψ) ¼ n2/sin 2
ψ FOV
pffiffiffiffiffiffi ,
0 ψ ψ FOV (n is the refractive index). Providing that r
AR , the
corresponding impulse response of the LOS component is given by:
where r/c is clearly the propagation delay. For the point-to-pint links and IM/DD,
the Rx signal, after the photodetection takes place, can be determined as the
convolution of transmitted signal s(t) and impulse response of the channel as
follows:
198 2 Propagation Effects in Optical and Wireless Communications. . .
Input Output
data data
(a)
(b)
(c)
Opaque surface
Diffuse reflection
component
LOS component
Transmitter Receiver
(d)
Fig. 2.61 Different link types in OWCs: (a) a point-to-point link, (b) a diffuse link, and (c) quasi-
diffuse link (non-LOS link). (d) In point-to-point links, received signal may contain both LOS
components and diffusion reflected components
2.6 Indoor Optical Wireless Communication Channels 199
φ
r
ψFOV ψ
Rx
AR Aref , i r refl, i
hrefl, i ðtÞ ¼ 2 2
ðm þ 1Þcos m ϕTx, i cos ψ Tx, i ts ψ Rx, i g ψ Rx, i
2πr Tx, i r Rx, i
r Tx, i þ r Rx, i
cos ψ Rx, i δ t ,
c
ð2:697bÞ
where rrefl,i is the reflection coefficient, Aref,i is the area of the reflector, and
corresponding angles are shown in Fig. 2.63. The transmission and gain functions
are the same as defined above.
200 2 Propagation Effects in Optical and Wireless Communications. . .
φ Rx,i ψTx,i
rRx,i rTx,i
Rx Tx
VLCs represent a relatively new research area [118–120] with operating wave-
lengths of 380–720 nm by employing white-light LEDs with available bandwidth of
around 20 MHz. With visible light LEDs (VLEDs), it would be possible to
broadcast broadband signals in various environments such as offices where the
lighting is used already. Power line communication systems or plastic optical fiber
systems can be used as feeders. VLCs can also be used in car-to-car communica-
tions by employing LED-based head and tail lights and probably in airplanes to
provide high-speed Internet. The VLC system model is similar to that shown in
Fig. 2.60; white-light LED is used instead of laser diode. The VLC channel model
can be represented by:
X expðj2πf Δτdiff Þ
H ðf Þ ¼ HLOS , iexpðj2πf ΔτLOS, i Þ þ H diff , ð2:698Þ
1 þ j f =f cutoff
i |fflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflffl}
H diff ðf Þ
where HLOS,i and Hdiff represent the channel gain of i-th LOS component (coming
from i-th LED) and diffuse signal gain, respectively. The ΔτLOS,i and Δτdiff
represent the corresponding delays of i-th LOS component and diffuse signal
components. Frequency f cutoff denotes the cutoff frequency of diffuse channel
frequency response, and for medium-size room, it is about 10 MHz [120]. The LOS
gain from i-th LED chip is related to the luminous flux:
ð 780 nm
Φ ¼ K max Φe ðλÞV ðλÞdλ, ð2:699Þ
380 nm
2.6 Indoor Optical Wireless Communication Channels 201
where Φe(λ) is the source power distribution, V(λ) is the standard sensitivity
function, and Kmax is the maximum visibility (683 lm/W at 555 nm). The
corresponding luminous intensity is the first derivative of the luminous flux with
respect to the solid angle Ω, in other words I ¼ dΦ/dΩ. The radiation intensity at the
desk surface is given by:
where ϕ is the transmit angle with respect to the maximum radiation direction
and m denotes the Lambert index related to the source radiation semi-angle by
m ¼ 1/log2(cosθ1/2), with θ1/2 being the VLED semi-angle at half-power. Now,
the LOS gain from the i-th white LED is given by:
where AR is the active area, ϕi is the transmit angle with respect to the maximum
radiation direction of the i-th light source, while ψ i and ri are the angle of irradiance
and the distance to the illuminated surface, respectively. As expected, this
expression is very similar to Eq. (2.695). Figure 2.62 is still applicable here,
where Tx is now white LED. In Eq. (2.701), we use ts(ψ i) to denote the transmission
of the optical filter and g(ψ i) to denote the gain of nonimaging concentrator g(ψ i) ¼
n2/sin2ψ con , 0 ψ ψ con (n is the refractive index and ψ con is the maximum angle
of the concentrator). The corresponding impulse response of the i-th LOS compo-
nent is given by:
AR ðm þ 1Þ r pffiffiffiffiffiffi
hLOS , iðtÞ ¼ 2
cos m ðϕi Þts ðψ i Þgðψ i Þ cos ðψ i Þδ t i , ri AR ð2:702Þ
2πr i c
The diffuse signal magnitude Hdiff in Eq. (2.698) can commonly be modeled as
being constant, in average, anywhere in the room, and it is related to the effective
receiver surface AR, the room size Aroom, and average reflectivity rrefl by [120]:
For the point-to-pint VLC links and IM/DD, the Rx signal, after the photodetection
takes place, can be determined as the convolution of transmitted signal s(t) and
impulse response of the VLC channel as follows:
P
r ðtÞ ¼ R sðtÞ∗ i hLOS, i ðtÞ þ hdiff ðtÞ þ nðtÞ
ð
1
hX i
ð2:704Þ
¼ R sðt0 Þ i
h LOS , i ð tÞ þ h diff ð t t0
Þ dt0 þ nðtÞ,
1
This chapter has been devoted to propagation effects, noise sources, and channel
impairments in wireless, free-space optical, and fiber-optics communication sys-
tems. The key idea behind the chapter has been to study the propagation effects in
different channel types based on Maxwell’s equations. The chapter has been
organized as follows. In Sect. 2.1, basic concepts from electromagnetic fields and
wave equations have been described. In this section, the vector derivatives needed
to study the propagation over different media have been described in generic
orthogonal curvilinear coordinate system, for which Cartesian, cylindrical polar,
and spherical coordinate systems have been just special cases. In Sect. 2.2.1, we
have studied the vectorial nature of the light, derived Snell’s law of refraction from
Maxwell’s equations, studied total internal reflection, and explained the light
confinement in step-index optical fibers. Additionally, we have described how
arbitrary polarization state can be generated by employing three basic polarizing
elements, namely, polarizer, phase shifter (retarder), and rotator. In Sect. 2.2.3, we
have introduced the electromagnetic potentials to simplify the study of generation
of electromagnetic waves, followed by antenna theory basics. In Sect. 2.2.4, we
have discussed the interference, coherence, and diffraction effects in optics, which
have been used later to study the propagation effects in various wireless and optical
communication channels. In Sect. 2.2.5, the detailed description of the laser beam
propagation effects over the atmospheric turbulence channels has been provided,
including the description of simulation models. In Sect. 2.3, the wireless commu-
nication channel propagation effects have been studied, in particular the path loss,
shadowing, and multipath fading propagation effects. Both ray theory-based and
statistical multipath wireless communication channel models have been described.
Section 2.4 has been devoted to the signal propagation effects in optical fibers,
namely, (1) fiber attenuation and insertion loss, (2) chromatic dispersion effects,
(3) polarization-mode dispersion effects, and (4) fiber nonlinearities. Regarding the
fiber nonlinearities, both Kerr nonlinear effects (self-phase modulation, cross-phase
modulation) and nonlinear scattering effects, such as stimulated Raman scattering,
have been described. In Sect. 2.4.5, the generalized nonlinear Schr€odinger equation
has been described for both single-mode and few-mode fibers and the
corresponding split-step Fourier algorithms to solve for it. In Sect. 2.5, the follow-
ing noise sources related to optical communication have been described: mode
partition noise, relative intensity noise, laser phase noise, modal noise, thermal
noise, spontaneous emission noise, noise beating components, quantum shot noise,
dark current noise, and cross talk. Section 2.6 has been devoted to indoor optical
wireless communications. In this section, the channel models for both infrared and
visible light communications have been introduced.
References 203
References
30. Andrews LC, Philips RL (2005) Laser beam propagation through random media, 2nd edn.
SPIE Press, Washington, DC
31. Willebrand H, Ghuman BS (2002) Free-space optics: enabling optical connectivity in today’s
networks. Sams Publishing, Indianapolis
32. Ishimaru A (1978) Wave propagation and scattering in random media. Academic, New York
33. Andrews LC, Phillips RL, Hopen CY (2001) Laser beam scintillation with applications. SPIE
Press, Bellingham
34. Karp S, Gagliardi R, Moran SE, Stotts LB (1988) Optical Channels. Plenum, New York
35. Anguita JA, Djordjevic IB, Neifeld MA, Vasic BV (2005) Shannon capacities and error–
correction codes for optical atmospheric turbulent channels. OSA Journal of Optical Net-
working 4:586–601
36. Djordjevic IB, Vasic B, Neifeld MA (2007) LDPC coded OFDM over the atmospheric
turbulence channel. Opt Express 15(10):6332–6346
37. Djordjevic IB, Anguita J, Vasic B (2012) Error-correction coded orbital-angular-momentum
modulation for FSO channels affected by turbulence. IEEE/OSA J Lightw Technol 30
(17):2846–2852
38. Shieh W, Djordjevic I (2009) OFDM for optical communications. Elsevier/Academic Press,
Amsterdam/Boston
39. Djordjevic IB (2012) Coding and modulation techniques for optical wireless channels. In:
Arnon S, Barry J, Karagiannidis G, Schober R, Uysal M (eds) Advanced optical wireless
communication systems. Cambridge University Press, Cambridge
40. Djordjevic IB, Qu Z (2016) Coded orbital-angular-momentum-based free-space optical
transmission, in wiley encyclopedia of electrical and electronics engineering. John Wiley
& Sons, Inc., http://onlinelibrary.wiley.com/doi/10.1002/047134608X.W8291/abstract
41. Kolmogorov AN (1941) Local structure of turbulence in liquid under very large Rayleigh
numbers. Dok Akad Nauk SSR 30(4):299–303 (in Russian)
42. Obukhov AM (1943) Energy dissipation in spectra of a turbulent stream. Dok Akad Nauk
SSR 32:22–24
43. Kolmogorov AN (1991) The local structure of turbulence in incompressible viscous fluid for
very large Rayleigh numbers. Proc R Soc London 434:9–13. Translated by V. Levin
44. Obukhov AM (1941) Concerning the distribution of energy in the spectrum of a turbulent
stream. Izvestiia Akadimii Nauk S.S.S.R., Ser. Geogr. & Geofiz. 5(4 & 5):453
45. Obukhov AM (1949) Structure of the temperature field in turbulent flow. Izvestiia Akademii
Nauk SSSR, Ser Geogr & Geofiz 2(1):58–69
46. Landau LD, Lifschitz EM (1982) Fluid mechanics, 2nd edn. Pergamon Press, Oxford
47. Clifford SF (1978) The classical theory of wave propagation in a turbulent medium. In:
Strohbehn JW (ed) Laser beam propagation in the atmosphere. Springer, New York, pp 9–43
48. Proakis JG (2001) Digital communications, 4th edn. McGraw-Hill, Boston
49. Haykin S (2014) Digital communication systems. John Wiley & Sons, Hoboken
50. Hayes MH (1996) Statistical digital signal processing. John Wiley & Sons, New York
51. Tatarskii VI (1967) The effects of the turbulent atmosphere on wave propagation (Translated
by Israel Program for Scientific Translations in 1971). U.S. Dept. of Commerce, National
Technical Information Service, Springfield
52. Andrews LC (1992) An analytical model for the refractive index power spectrum and its
application to optical scintillation in the atmosphere. J Mod Opt 39(9):1849–1853
53. Fried DL (1965) Statistics of a geometric representation of wavefront distortion. J Opt Soc
Am 55(11):1427–1431
54. Noll R (1976) Zernike polynomials and atmospheric turbulence. J Opt Soc Am 66:207–211
55. Welsh BM (1997) A Fourier phase screen generator for simulating anisoplanatic geometries
and temporal evolution. In Proc SPIE 3125:327–338
56. Eckert RJ, Goda ME (2006) Polar phase screens: a comparative analysis with other methods
of random phase screen generation. In Proc. SPIE 6303: 630301-1-630301-14
References 205
57. Lane RG, Glindemann A, Dainty JC (1992) Simulation of a Kolmogorov phase screen.
Waves in Random Media 2:209–224
58. Rytov SM (1937) Diffraction of light by ultrasound waves. Ivestiya AN SSSR, Seriya
Fizicheskaya 2:223
59. Obukhov AM (1953) Effect of weak inhomogeneities in the atmosphere on the propagation of
light and sound. Izvestiya AN SSSR, Seriya Geofizicheskaya 2:155
60. Chernov LA (1955) Correlation of amplitude and phase fluctuations for wave propagation in
a medium with random inhomogeneities. Akusticheskii Zhurnal 1(1):89
61. Chernov LA (1958) Wave propagation in a medium with random inhomogeneities.
Izdatel’stvo AN SSSR
62. Tatarskii VI (1969) Light propagation in a medium with random refractive index inhomoge-
neities in the Markov random process approximation. Soviet Physics JETP 29(6):1133–1138
63. Al-Habash MA, Andrews LC, Phillips RL (2001) Mathematical model for the irradiance
probability density function of a laser beam propagating through turbulent media. Opt Eng
40:1554–1562
64. Goldsmith A (2005) Wireless communications. Cambridge University Press, Cambridge
65. Tse D, Viswanath P (2005) Fundamentals of wireless communication. Cambridge University
Press, Cambridge
66. Benedetto S, Biglieri E (1999) Principles of digital transmission with wireless applications.
Kluwer Academic/Plenum Publishers, New York
67. Biglieri E (2005) Coding for wireless channels. Springer, New York
68. Duman TM, Ghrayeb A (2007) Coding for MIMO communication systems. John Wiley &
Sons, Chichester
69. Amitay N (1992) Modeling and computer simulation of wave propagation in lineal line-of-
sight microcells. IEEE Trans Vech Tech 41(4):337–342
70. Schaubach K, Davis NJ, Rappaport TS (1992) A ray tracing method for predicting path loss
and delay spread in microcellular environments. In: Proceeding IEEE Vehicular Technology
Conference 2, IEEE, Denver, pp 932–935
71. Lawton MC, McGeehan JP (1992) The application of GTD and ray launching techniques to
channel modeling for cordless radio systems. In: Proceeding IEEE Vehicular Technology
Conference 1, IEEE, Denver, pp 125–130
72. Lee WCY (1982) Mobile communications engineering. McGraw-Hill, New York
73. Tsang L, Kong JA, Ding K-H (2000) Scattering of electromagnetic waves: theories and
applications. John Wiley & Sons, New York
74. Seidel SMI (1981) Introduction to radar systems, 2nd edn. McGraw-Hill, Auckland
75. Seidel SY, Rappaport TS, Jain S, Lord ML, Singh R (1991) Path loss, scattering and
multipath delay statistics in four European cities for digital cellular and microcellular
radiotelephone. IEEE Trans Veh Tech 40(4):721–730
76. Harley P (1989) Short distance attenuation measurements at 900 MHz and 1.8 GHz using low
antenna heights for microcells. IEEE Sel Area Comm 7(1):5–11
77. Okumura T, Ohmori E, Fukuda K (1968) Field strength and its variability in VHF and UHF
land mobile services. Rev Elec Comm Lab 16(9-10):825–873
78. Hata M (1980) Empirical formula for propagation loss in land mobile radio services. IEEE
Trans Veh Technol VT-29(3):317–325
79. European Cooperative in the Field of Science and Technical Research EURO-COST
213 (1991) Urban transmission loss models for mobile radio in the 900 and 1800 MHz
bands. Rev, Hague
80. Hata/Davidson (1997) A Report on technology independent methodology for the modeling,
simulation and empirical verification of wireless communications system performance in
noise and interference limited systems operating on frequencies between 30 and 1500 MHz.
TIA TR8 Working Group, IEEE Vehicular Technology Society Propagation Committee
81. Lee JS, Miller LE (1998) CDMA systems engineering handbook. Artech House,
Boston/London
206 2 Propagation Effects in Optical and Wireless Communications. . .
82. Jakes WC (1974) Microwave mobile communications. John Wiley & Sons, New York
83. Gudmundson M (1994) Correlation model for shadow fading in mobile radio systems. Elec
Lett 27(23):2145–2146
84. Weitzen JA, Lowe TJ (2002) Measurement of angular and distance correlation properties of
log-normal shadowing at 1900 MHz and its application to design of PCS systems. IEEE Trans
Veh Tech 51(2):265–273
85. Clark RH (1968) A statistical theory of mobile-radio reception. Bell Syst Tech
J 47(6):957–1000
86. Yacoub MD (2002) The α μ distribution: a general fading distribution. Proc IEEE Int Symp
Pers, Indo Mob Radio Commun 2:629–633
87. Yacoub MD (2007) The αμ distribution: a physical fading model for the Stacy distribution.
IEEE Transactions on Vehicular Technology 56(1):27–34
88. Djordjevic IB, Djordjevic GT (2009) On the communication over strong atmospheric turbu-
lence channels by adaptive modulation and coding. Opt Express 17(20):18250–18262
89. Djordjevic GT, Djordjevic IB, Karagiannidis GK (2012) Partially coherent EGC reception of
uncoded and LDPC-coded signals over generalized fading channels. Wireless Personal
Communications 66(1):25–39
90. Rice SO (1944) Mathematical analysis of random noise. Bell Syst Tech J 23(3):282–333
91. Rice SO (1948) Statistical properties of a sine wave plus noise. Bell Syst Tech J 27:109–157
92. Stüber GL (2012) Principles of mobile communication, 3rd edn. Springer, New York
93. Turin GL (1980) Introduction to spread spectrum antimultipath techniques and their appli-
cation to urban radio. Proc IEEE 68(3):328–353
94. Wang HS, Moayeri N (1995) Finite-state Markov channel-a useful model for radio commu-
nication channels. IEEE Trans Veh Technol 44(1):163–171
95. Bello PA (1963) Characterization of randomly time-variant linear channel. IEEE Trans
Comm Sys 11(4):360–393
96. Cvijetic M, Djordjevic IB (2013) Advanced optical communication systems and networks.
Artech House, Boston/London
97. Ramaswami R, Sivarajan K (2002) Optical networks: a practical perspective, Second edn.
Morgan Kaufman, San Francisco
98. Kazovsky L, Benedetto S, Willner A (1996) Optical fiber communication systems. Artech
House, Boston
99. Palais JC (2005) Fiber optic communications, 5th edn. Pearson Prentice Hall, Upper Saddle
River
100. Agrawal GP (2005) Lightwave technology: telecommunication systems. John Wiley & Sons,
Hoboken
101. Kaminow I, Li T, Willner A (2013) Optical fiber telecommunications VIB. Elsevier/Aca-
demic Press, Oxford
102. Staif M, Mecozzi A, Nagel J (2000) Mean square magnitude of all orders PMD and the
relation with the bandwidth of principal states. IEEE Photon Tehcnol Lett 12(1):53–55
103. Kogelnik H, Nelson LE, Jobson RM (2002) Polarization mode dispersion. In: Kaminow IP,
Li T (eds) Optical fiber telecommunications. Academic Press, San Diego
104. Foschini GJ, Pole CD (1991) Statistical theory of polarization mode dispersion in single-
mode fibers. IEEE J Lightw Technol 9(11):1439–1456
105. Ciprut P, Gisin B, Gisin N, Passy R, von der Weid JP, Prieto F, Zimmer CW (1998) Second-
order PMD: impact on analog and digital transmissions. IEEE J Lightw Technol
16(5):757–771
106. Ip E, Kahn JM (2008) Compensation of dispersion and nonlinear impairments using digital
backpropagation. IEEE J Lightw Technol 26(20):3416–3425
107. Ip E, Kahn JM (2009) Nonlinear impairment compensation using backpropagation. In:
Lethien C (ed) Optical fibre, new developments. In-Tech, Vienna/Austria
References 207
108. Sinkin OV, Holzlohner R, Zweck J, Menyuk CR (2003) Optimization of the split-step
Fourier method in modeling optical-fiber communications systems. IEEE J Lightw Technol
21(1):61–68
109. Rieznik A, Tolisano T, Callegari FA, Grosz D, Fragnito H (2005) Uncertainty relation for the
optimization of optical-fiber transmission systems simulations. Opt Express 13:3822–3834
110. Zhang Q, Hayee MI (2008) Symmetrized split-step Fourier scheme to control global
simulation accuracy in fiber-optic communication systems. IEEE J Lightw Technol
26(2):302–316
111. Lin C, Djordjevic IB, Zou D (2015) Achievable information rates calculation for optical
OFDM transmission over few-mode fiber long-haul transmission systems. Opt Express
23(13):16846–16856
112. Lin C, Djordjevic IB, Cvijetic M, Zou D (2014) Mode-multiplexed multi-Tb/s superchannel
transmission with advanced multidimensional signaling in the presence of fiber nonlinear-
ities. IEEE Trans Comm 62(7):2507–2514
113. Ho K-P, Kahn JM (2011) Statistics of group delays in multimode fiber with strong mode
coupling. IEEE J Lightw Technol 29(21):3119–3128
114. Mumtaz S, Essiambre R-J, Agrawal GP (2012) Nonlinear propagation in multimode and
multicore fibers: generalization of the Manakov equations. J Lightw Technol 31(3):398–406
115. Langer K-D, Grubor J (2007) “Recent developments in optical wireless communications
using infrared and visible Light,” In: Proceeding ICTON 2007, pp 146–152
116. Grubor J., Jungnickel V., Langer K Rate-adaptive multiple-subcarrier-based transmission for
broadband infrared wireless communication, In: Optical fiber communication conference and
exposition and the national fiber optic engineers conference, technical digest (CD) (optical
society of America, 2006), paper NThG2
117. Hranilovic S (2004) Wireless optical communication systems. Springer, New York
118. Tanaka Y. et al (2001) “Indoor visible communication utilizing plural white LEDs as
lighting,” in Proceeding Personal, Indoor & Mobile Radio Communications (PIMRC),
pp F81–F85
119. Komine T, Nakagawa M (2004) Fundamental analysis for visible-light communication
system using LED lightings. IEEE Trans on Consumer Electronics 15(1):100–107
120. Grubor J, Gaete Jamett OC, Walewski JW, Randel S, Langer K-D (2007) High-speed
wireless indoor communication via visible light. In: ITG fachbericht 198. Berlin und Offen-
bach, VDE-Verlag, pp 203–208
121. Ghassemlooy Z, Popoola W, Rajbhandari S (2013) Optical wireless communications: system
and channel modelling with MATLAB. CRC Press, Boca Raton
122. Kahn JM, Barry JR (1997) Wireless infrared communications. Proc IEEE 85(2):265–298
Chapter 3
Components, Modules, and Subsystems
This section describes the basic optical components used in an optical transmission
system. We start this section with optical communications basics [1–35].
Data 1 λ1 Data i
Wavelength de-multiplexing
Tx,1
Wavelength multiplexing
Rx,i
Tx: Transmitter
Rx: Receiver
OADM: Optical add-drop multiplexer
EDFA: Erbium-doped fiber amplifier
Bias voltage
AGC
From SMF Front-end
Optical amplifier
DEMUX The output
sequence
Decision
Equalizer circuit
Post-
amplifier Clock
recovery
Front end: Linear channel Data recovery
- O/E conversion
- Photocurrent
amplification
Fig. 3.2 A typical direct-detection receiver architecture. O/E optical to electrical, AGC automatic
gain control
10 Gb/s and above, instead, the semiconductor laser diode (LD) is commonly
biased at constant current to provide continuous wave (CW) output, and external
modulators are used to impose the information signal to be transmitted. The most
popular modulators are electro-optic optical modulators, such as Mach-Zehnder
modulators, and electroabsorption modulators. The principle of the external mod-
ulator is illustrated in Fig. 3.3. Through the external modulation process, a certain
parameter of the CW signal, used as a signal carrier, is varied in accordance with the
information-bearing signal. For example, a monochromatic electromagnetic wave
is commonly used as a carrier, and its electrical field E(t) can be represented by:
distortion and imposes the limitations in signal bandwidth. The second type of
optical fibers, SMFs, effectively eliminates multimode dispersion by limiting the
number of propagating modes to a fundamental one. SMFs, however, introduce
another signal impairment known as the chromatic dispersion. Chromatic disper-
sion is caused by the difference in velocities among different spectral components
within the same mode.
The attenuation of signal propagating through optical fiber is low compared to
other transmission media, such as copper cables or free space. Nevertheless, we
have to amplify the attenuated signal from time to time, to restore the signal level,
without any conversion into electrical domain. This can be done in optical ampli-
fiers, through the process of stimulated emission. The main ingredient of an optical
amplifier is the optical gain realized through the amplifier pumping (being either
electrical or optical) to achieve the so-called population inversion. The common
types of optical amplifiers are semiconductor optical amplifiers (SOAs), EDFAs,
and Raman amplifiers. The amplification process is commonly followed by the
noise process, not related to the signal, which occurs due to spontaneous emission.
The amplification process degrades the SNR, because of amplified spontaneous
emission (ASE), added to the signal in every amplifier stage.
Before providing more details about basic building blocks identified in this
section, let us give more global picture, by describing a typical optical network
shown in Fig. 3.4. We can identify three ellipses representing the core network, the
edge network, and the access network [1–3]. The long-haul core network intercon-
nects big cities, major communications hubs, and even different continents by
means of submarine transmission systems. The core networks are often called the
wide area networks (WANs) or interchange carrier networks. The edge optical
networks are deployed within smaller geographical areas and are commonly rec-
ognized as metropolitan area networks (MANs) or local exchange carrier networks.
The access networks represent peripheral part of optical network and provide the
last-mile access or the bandwidth distribution to the individual end users. The
common access networks are local area networks (LANs) and distribution net-
works. The common physical network topologies are mesh network (often present
in core networks), ring network (in edge networks), and star networks (commonly
used in access networks).
Given this general description of key optical components in the rest of this
section, we provide more details about basic building blocks: optical transmitters
are described in Sect. 3.1.2, optical receivers in Sect. 3.1.3, optical fibers in Sect.
3.1.4, optical amplifiers in Sect. 3.1.5, and other optical processing blocks are
described, such as WDM multiplexers/demultiplexers, optical filters, and couplers,
in Sect. 3.1.6. The Sect. 3.1.7 is devoted to the principles of coherent optical
detection, followed by subsection on optical hybrids (Sect. 3.1.8). In Sect. 3.1.9,
the balanced coherent optical detectors are described.
214 3 Components, Modules, and Subsystems
Access network
EN
CN EN
EN CN
EN
EN EN
CN CN
EN CN: Core node
Core network EN EN: Edge node
The role of the optical transmitter is to generate the optical signal, impose the
information-bearing signal, and launch the modulated signal into the optical fiber.
This section is devoted to different lasers including Fabry-Perot, distributed feed-
back (DFB), and distributed Bragg reflector (DBR) lasers as well as to different
external modulators including Mach-Zehnder modulator, electroabsorption modu-
lator, phase modulator, I/Q modulator, and polar modulator.
3.1.2.1 Lasers
Excited state, N2 E2 E2 E2
hν
hν hν hν
hν
Ground state, N1 E1 E1 E1
Fig. 3.5 Illustrating the interaction of the light with the matter
Equivalent model
z=0 Mirrors z=L
(a)
Injection current
to SMF
Bragg grating
p-type
Active region
n-type
p-type
n-type
where R1 and R2 are facet reflectivities (see Fig. 3.6), L is the length of active
medium, and I0 and I(2 L) correspond to initial and round-trip intensities. The gain
threshold is obtained by solving the Eq. (3.4) per γ:
1 1
γ th ¼ αs þ ln ¼ αint þ αmir , ð3:5Þ
2L R1 R2
where the internal losses (corresponding to αs) and mirror losses ((1/2 L )ln(1/R1R2))
are denoted by αint and αmir, respectively. After the round trip, the resultant phase
must be equal to the initial phase, leading to the phase-matching condition:
3.1 Key Optical Components, Modules, and Subsystems 217
λ 2nav Λ
2Λ ¼ m ) λB ¼ , ð3:8Þ
nav m
where Λ is the grating period, nav is the average refractive index of a waveguide
mode, and λ/nav is the average wavelength of the light in the waveguide mode. If the
grating element is put outside of active region or instead of the facet mirrors, the
distributed Bragg reflector (DBR) laser is obtained, which is illustrated in Fig. 3.6c.
Both DFB and DBR laser belongs to the class of single-mode lasers. Different
semiconductor lasers shown in Fig. 3.6 are edge-emitting lasers.
Another important semiconductor laser type is vertical cavity surface emitting
laser (VCSEL), which emits the light vertical to the active layer plane [1–7]. The
VCSELs are usually based on In-GaAs-P layers acting as Bragg reflectors and
providing the positive feedback leading to the stimulated emission.
The spectral curve of the single-mode lasers is a result of transition between
discrete energy levels and can often be represented using the Lorentzian shape [1–7]:
Δν
gðνÞ ¼ h Δν2 i , ð3:9Þ
2π ðv v0 Þ2 þ 2
where ν0 is the central optical frequency, and Δν represents the laser linewidth [1–7]:
218 3 Components, Modules, and Subsystems
nsp G 1 þ α2chirp
Δν ¼ , ð3:10Þ
4πP
where nsp is the spontaneous emission factor, G is the net rate of stimulated
emission, P denotes the output power, and αchirp is the chirp factor (representing
the amplitude-phase coupling parameter).
The small-signal frequency response of the semiconductor laser is determined by
[1–7]:
Ω2R þ Γ2R
H ðωÞ ¼ , ð3:11Þ
ðΩR þ ω jΓR ÞðΩR ω þ jΓR Þ
αchirp d d
δνðtÞ ¼ ln PðtÞ þ χPðtÞ ¼ Cdyn PðtÞ þ Cad PðtÞ, ð3:12Þ
4π dt dt
where P(t) is the time variation of the output power, χ is the constant (varying from
zero to several tens) related to the material and design parameters, and αchirp is the
chirp factor defined as the ratio between the refractive index n change and gain
G change with respect to the number of carriers N: αchirp ¼ (dn/dN)/(dG/dN). The
first term on the right-hand side of (3.12) represents dynamic (transient or instan-
taneous) chirp, and the second term the adiabatic (steady-state) frequency chirp.
The random fluctuation in carrier density due to spontaneous emission also leads to
the linewidth enhancement proportional to (1 + α2chirp). To avoid the chirp problem,
the external modulation is used, while the semiconductor lasers are biased by a dc
voltage to produce a continuous wave operation.
There are two types of external modulators commonly used in practice: Mach-
Zehnder modulator (MZM) and electroabsorption modulator (EAM), whose oper-
ational principle is illustrated in Fig. 3.7. The MZM is based on electro-optic effect,
the effect that in certain materials (such as LiNbO3) where the refractive index
n changes with respect to the voltage V applied across electrodes [1–7]:
3.1 Key Optical Components, Modules, and Subsystems 219
Bias
Modulation voltage
data (RF) (DC)
V1(t)
Ein(t) Eout(t)
Modulated
output
V2(t)
(a)
Injection current -V
bias and modulation
to SMF
Bragg grating
p-type p-type
Active region
n-type n-type
+V
bias and modulation
CW laser EA modulator
(b)
Fig. 3.7 External optical modulators: (a) Mach-Zehnder modulator, and (b) electroabsorption
modulator
1 2π
Δn ¼ Γn3 r 33 ðV=de Þ ) Δϕ ¼ ΔnL, ð3:13Þ
2 λ
1 π π
Eout ðtÞ ¼ exp j V 1 ðtÞ þ exp j V 2 ðtÞ Ein , ð3:14Þ
2 Vπ Vπ
where Vπ is now the differential drive voltage required to introduce the phase shift
of π radians between two waveguide arms. With V1(t) and V2(t), we denoted the
220 3 Components, Modules, and Subsystems
electrical drive signals applied to upper and lower electrodes, respectively. We can
implement different modulation formats by using this MZM as a building block,
including on-off keying (OOK), binary phase-shift keying (BPSK), QPSK, differ-
ential PSK (DPSK), differential QPSK (DQPSK), and return-to-zero (RZ) OOK.
For instance, zero-chirp OOK, or BPSK, can be generated by setting V1(t) ¼ V(t)
Vπ/2 , V2(t) ¼ V(t) + Vπ/2, so that Eq. (3.14) becomes:
Eout ðtÞ πV ðtÞ
¼ sin : ð3:15Þ
Ein Vπ
On the other hand, if we set V1(t) ¼ V(t)/2 , V2(t) ¼ V(t)/2, the Eq. (3.14)
becomes:
Eout ðtÞ πV ðtÞ
¼ cos , ð3:16Þ
Ein 2V π
and we say that MZM is operated in the push-pull mode. The corresponding power
transfer function of MZM is obtained as magnitude squared of electric field ratio:
Eout ðtÞ2
¼ cos 2 πV ðtÞ ¼ 1 þ cos ðπV ðtÞ=V π Þ : ð3:17Þ
E 2V π 2
in
QP QP
0.5
0.0
NP NP
-0.5
-1.0
Vπ π Vπ
V ðt Þ ¼ sin 2πRs t , ð3:18Þ
2 2 2
so that RZ pulses of duty cycle 50% are being generated at the output of MZM.
Accordingly, we have that:
Eout ðtÞ π π π
¼ cos sin 2πRs t : ð3:19Þ
Ein ðtÞ 4 2 4
Eout ðtÞ πV ðtÞ
¼ exp j ð3:20Þ
Ein Vπ
By using two MZM modules and one PM, which introduces the π/2 phase shift,
we can implement the I/Q modulator in a way shown in Fig. 3.10. It can be shown
that output Eout and input Ein electrical fields of I/Q modulator are related as:
where VI and VQ are in-phase and quadrature RF modulating signals. When the
amplitudes of VI and VQ are sufficiently small and in-phase/quadrature signals are
chosen as follows V I ðtÞ ¼ 4 4
π V π I ðtÞ þ V π , V Q ðtÞ ¼ π V π QðtÞ þ V π , , the MZM
nonlinearities can be neglected, and Eq. (3.21) can be rewritten as:
Eout ðtÞ
ffi I ðtÞ þ jQðtÞ, ð3:22Þ
Ein
where I(t) and Q(t) are in-phase and quadrature components of RF signal. There-
fore, different QAM constellations can be directly applied on this scheme. Equation
(3.21) can also be represented in polar coordinates in a form:
Eout ðtÞ
¼ RðtÞ cos ½ΨðtÞ, ð3:23Þ
Ein
where the envelope R(t) and phase Ψ(t) are expressed as:
3.1 Key Optical Components, Modules, and Subsystems 223
1=2
Eout ðtÞ 1
RðtÞ ¼ ¼ cos 2 1 πV I ðtÞ þ cos 2 1 πV Q ðtÞ ,
Ein 2 2 Vπ 2 Vπ
8 9
>
> 2 1 πV Q ðtÞ > > ð3:24Þ
<cos =
2 Vπ
ΨðtÞ ¼ tan 1 :
>
> 1 πV I ðtÞ >
>
: cos 2 ;
2 Vπ
The representation given by Eq. (3.23) indicates that instead of I/Q modulator,
we can use an equivalent polar modulator shown in Fig. 3.11. The real part of the
output of polar modulator corresponds to Eq. (3.21).
The purpose of the optical receiver is to convert the optical signal into electrical
domain and to recover the transmitted data. The typical OOK receiver configuration
is already given in Fig. 3.2. We can identify three different stages: front-end stage,
the linear channel stage, and data recovery stage. The front-end stage is composed
of a photodetector and a preamplifier. The most commonly used front-end stages
are high-impedance front end and transimpedance front end, both shown in Fig. 3.8.
High-impedance front end (Fig. 3.12a) employs a large value load resistance to
reduce the level of thermal noise and has a good receiver sensitivity. However, the
bandwidth of this scheme is low because the RC constant is large. To achieve both
the high receiver sensitivity and large bandwidth, the transimpedance front-end
scheme, shown in Fig. 3.12b, is used. Even though the load resistance is high, the
negative feedback reduces the effective input resistance by a factor of G1, where
224 3 Components, Modules, and Subsystems
+V +V
RF
From SMF
From SMF
Fig. 3.12 Optical receiver front-end stage schemes: (a) high-impedance front end and (b)
transimpedance front end
G is the front-end amplifier gain. The bandwidth is increased for the same factor
compared to high-impedance front-end scheme.
The photodiode is an integral part of both front-end stage schemes. The key role
of the photodiode is to absorb photons in incoming optical signal and convert them
back to the electrical level through the process opposite to one taking place in
semiconductor lasers. The common photodiodes are p-n photodiode, p-i-n photo-
diode, avalanche photodiode (APD), and metal-semiconductor-metal (MSM) pho-
todetectors [1–7]. The p-n photodiode is based on a reverse-biased p-n junction.
The thickness of the depletion region is often less than the absorption depth for
incident light, and the photons are absorbed outside of the depletion region, leading
to the slow response speed. p-i-n photodiode consists of an intrinsic region
sandwiched between p- and n-type layers, as shown in Fig. 3.13a. Under the reverse
bias, the depletion depth can be made sufficiently thick to absorb most of the
incident photons. Avalanche photodiode, shown in Fig. 3.13b, is a modified p-i-n
photodiode that is operated at very high reverse bias. Under high-field conditions,
photo-generated carriers induce generation of secondary electron-hole pairs by the
process of impact ionization, and this process leads to internal electrical gain.
Metal-semiconductor-metal photodetectors employ interdigitated Schottky barrier
contacts on one face of the device and are compatible with planar processing and
optoelectronic integration. Depending on the device design, the device is illumi-
nated through the p- or n-type contact. In Si, Ge, or GaAs diodes, the substrate is
absorbing so that the device has to be illuminated through the top contact, as shown
in Fig. 3.13a.
On the other hand, in InGaAs or InGaAsP, the substrate is transparent, and the
device can be designed to be illuminated either through the substrate or top contact.
In order to increase the depletion region and to minimize the diffusion current
component, an intrinsic layer (i-type) is introduced to the p-i-n photodiode struc-
ture. The p-i-n photodiode is reverse biased and has very high internal impedance,
meaning that it acts as a current source generating the photocurrent proportional to
3.1 Key Optical Components, Modules, and Subsystems 225
Incoming
AR coating
optical signal
-V
hν
AR coating Incoming
optical signal p+-type
-V
h
Absorption
i-type e
region
p-type
Multiplication
i-type p-type
region
n-type
n+-type
V V
(a) (b)
Rs
iph Cp Rsh
(c)
Fig. 3.13 The semiconductor photodiodes: (a) p-i-n photodiode and (b) avalanche photodiode. (c)
The equivalent p-i-n photodiode model
the incoming optical signal power. The equivalent scheme of p-i-n photodiode is
shown in Fig. 3.13c. Typically the internal series resistance Rs is low, while the
internal shunt resistance is high, so that the junction capacitance Cp dominates and
can be determined by:
1=2
A εs N A N D
Cp ¼ εs ¼ , ð3:25Þ
w 2ð N A N D Þ ð V 0 V A Þ
where εs is the semiconductor permittivity, A is the area of the space charge region
(SCR), w is the width of SCR, NA and ND denote dopant (acceptor and donor)
densities, V0 is the built in potential across the junction, and VA is applied negative
voltage. The photocurrent iph(t) is proportional to the power of incident light P(t),
that is iph(t) ¼ R P(t), where R [A/W] is the photodiode responsivity. The photo-
diode responsivity is related to the quantum efficiency η, defined as the ratio of
number of generated electrons and the number of incident photons, by R ¼ ηq/hν,
where q is an electron charge, and hv is a photon energy. Using this model, we can
determine the 3 dB bandwidth of high-impedance front-end scheme as B3 dB ¼ 1/
226 3 Components, Modules, and Subsystems
Incoming light
Incoming light
Core Core
Cladding Cladding
(a) (b)
n(ρ)
n1
a
n2
b
φ Guided ray
ρ
θi n1>n2 Core
a- the core radius
b- the cladding radius
ρ- the radial distance n0=1 n2 Cladding
(c) (d)
Fig. 3.14 Optical fibers: (a) multimode optical fiber, (b) single-mode optical fiber, (c) refractive-
index profile for step-index fiber, and (d) the light confinement in step-index fibers through the
total internal reflection
the axis of the optical fiber core. Its radial distribution can be approximated by
Gaussian curve. The number of modes (M ) that can effectively propagate through
an optical fiber is determined by the normalized frequency (V parameter or
V number): M V2/2, when V is large. The normalized frequency is defined by:
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
2πa
V¼ n21 n22 , ð3:26Þ
λ
where a is the fiber core radius, λ is the carrier wavelength, and n1 and n2 are
refractive indices related to the fiber core and the fiber cladding, respectively.
Each mode propagating through the fiber is characterized by its own propagation
constant β. The dependence of the electric and magnetic fields on axial coordinate
z is expressed through the factor exp(jβz). The propagation constant must satisfy
the following condition:
β2 ð2πn2 =λÞ2
b¼ : ð3:28Þ
ð2πn1 =λÞ2 ð2πn2 =λÞ2
The purpose of an optical amplifier is to restore the signal power level, reduced due
to losses during propagation, without any optical to electrical conversion. The
general form of an optical amplifier is given in Fig. 3.15a. Most optical amplifiers
amplify incident light through the stimulated emission, the same mechanism that is
used in lasers but without the feedback mechanism. The main ingredient is the
optical gain realized through the amplifier pumping (electrical or optical) to
achieve the population inversion. The optical gain, generally speaking, is not
only a function of frequency but also a function of local beam intensity. To illustrate
the basic concepts, we consider the case in which the gain medium is modeled as
two-level system, as shown in Fig. 3.15b. The amplification factor G is defined as
the ratio of amplifier output Pout and input Pin powers G ¼ Pout/Pin. The amplifi-
cation factor can be determined by knowing the dependence of evolution of power
through the gain media [1–7]:
dP g0
¼ gP, g ð ωÞ ¼ , ð3:30Þ
dz 1 þ ðω ω0 Þ2 T 22 þ P=Ps
where g is the gain coefficient, g0 is the gain peak value, ω0 is the atomic transition
frequency, T2 is the dipole relaxation time (<1 ps), ω is the optical frequency of
incident signal, P is the incident signal power, and PS is the saturation power.
In the unsaturated regime (P << PS), the differential Eq. (3.30) can be solved by
separation of variables to get the following dependence of power P(z) ¼ P(0)exp
(gz), so that the amplification factor can be obtained by:
Pump power
Pump
Weak Amplified Fiber
Fiber signal signal Pout
Pin
Optical amplifier medium N2
Gain
N1 medium
Optical signal output
Optical signal output z=0 z=L
(a) (b)
Fig. 3.15 (a) Optical amplifier principle and (b) two-level amplifier system model
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ln 2
ΔνA ¼ Δνg , G0 ¼ expðg0 LÞ ð3:32Þ
ln ðG0 =2Þ
dP g0 P
¼ : ð3:33Þ
dz 1 þ P=PS
By solving the differential Eq. (3.33) with respect to the boundary conditions, P
(0) ¼ Pin, and P(L ) ¼ Pout ¼ GPin, we get:
G 1 Pout
G ¼ G0 exp : ð3:34Þ
G PS
From Eq. (3.34) we can determine another important optical amplifier parame-
ter, the output saturation power, as being the optical power at which the gain G is
reduced to G0/2 (3 dB down):
G0 ln 2
sat
Pout ¼ Ps ðln 2ÞPs 0:69Ps ðG0 > 20dBÞ: ð3:35Þ
G0 2
Txx … Rxx
Tx Rx
(a) (b)
Fiber
Tx Rx
Pre-amplifier
(c)
Fig. 3.16 Possible application of optical amplifiers: (a) booster amplifier, (b) in-line amplifiers,
and (c) preamplifier
propagation of optical signal. The optical preamplifiers are used to increase the
signal level before the photodetection takes place, improving therefore the receiver
sensitivity.
Several types of optical amplifiers have been introduced so far: semiconductor
optical amplifiers (SOAs), fiber Raman (and Brillouin) amplifiers, rare-earth-doped
fiber amplifiers (erbium-doped EDFA operating at 1500 nm, praseodymium-doped
PDFA operating at 1300 nm), and parametric amplifiers.
Semiconductor lasers act as amplifiers before reaching the threshold. To prevent the
lasing, antireflection (AR) coatings are used in SOAs, as shown in Fig. 3.17. Even
with AR coating, the multiple reflections must be included when considering the
Fabry-Perot (FP) cavity. The gain of FP amplifiers is given by [1–7]:
ð1 R1 Þð1 R2 ÞGðνÞ
GFP ðνÞ ¼ pffiffiffiffiffiffiffiffiffiffi2 pffiffiffiffiffiffiffiffiffiffi , ð3:36Þ
1 GðνÞ R1 R2 þ 4G R1 R2 sin 2 ½π ðν νm Þ=ΔνL
where R1 and R2 denote the facet reflectivities, G(ν) is the single-pass amplification
factor, νm is the cavity resonance frequency, and ΔνL is the free-spectral range.
The FP amplifier bandwidth can be determined as follows [1–7]:
" pffiffiffiffiffiffiffiffiffiffi #
2ΔνL 1 1 G R1 R2
ΔνA ¼ sin pffiffiffiffiffiffiffiffiffiffi1=2 : ð3:37Þ
π 4G R1 R2
3.1 Key Optical Components, Modules, and Subsystems 231
Electrical drive
current
R1 R2
Weak Optical Amplified
Signal Input Optical Signal
Semiconductor cavity
Antireflection
coatings
dPs g dPp ωp g R
¼ αs Ps þ R Pp Ps ¼ αp Pp Pp Ps ð3:38Þ
dz ap dz ωs a p
where as denotes the signal cross-sectional area, and ωp and ωs denote the pump and
signal frequency, respectively, while other parameters are already introduced
above.
In small-signal amplification regime (when the pump depletion can be
neglected), the pump power evolution is exponential, Pp(z) ¼ Pp(0)exp[αpz], so
that the Raman amplifier gain is found to be:
232 3 Components, Modules, and Subsystems
Pump signal, ωp
Fiber Amplified
optical signal, ωs
Fiber coupler Optical
Optical
Filter, ω
Filter, ωss
Weak incoming
optical signal, ωs
Ps ð0Þexp gR Pp ð0ÞLeff =ap αs L
GA ¼ ¼ expðg0 LÞ,
Ps ð0Þexpðαs LÞ
ð3:39Þ
Pp ð0Þ Leff gR Pp ð0Þ
g0 ¼ gR ðαP L >> 1Þ:
ap L ap α p L
1 þ r0 ωp P s ð 0 Þ
GS ¼ , r0 ¼ ð3:40Þ
r 0 þ 1=G1þr
A
0 ωs P p ð 0 Þ
The amplifier gain is reduced down by 3 dB when GAr0 1, the condition that is
satisfied when the amplified signal power becomes comparable to the input pump
power Ps(L) ¼ Pp(0). Typically P0 ~ 1 W, and channel powers in a WDM systems
are around 1 mW, meaning that Raman amplifier operates in unsaturated or linear
regime.
Fiber coupler
Weak incoming
optical signal Narrowband
filter
4I13/2 1530 nm
980 nm
1480 nm
Pump Emission
Bands wavelengths
4I15/2
decay to the primary emission transition band. The pumping with 1.48 μm is
directly to the upper transition levels of the emission band.
EDFAs can be designed to operate in such a way that the pump and signal travel
in opposite directions; this configuration is commonly referred to as backward
pumping. In bidirectional pumping, the amplifier is pumped in both directions
simultaneously by using two semiconductor lasers located at the both fiber ends.
Different optical components can be classified into two broad categories depending
on whether they can operate without an external electric power source or not into
passive or active. Important active components are lasers, external modulators,
optical amplifiers, photodiodes, optical switches, and wavelength converters. On
the other hand, important passive components are optical couplers, isolators,
multiplexers/demultiplexers, and filters. Some components, such as optical filters,
can be either passive or active depending on operational principle. In this section,
we will briefly explain some important optical components not being described in
previous subsections.
234 3 Components, Modules, and Subsystems
Pref
Pcross
Coupling region
Ein,2 Eout,2
Pout,2
(a)
Inputs GRIN rod GRIN rod Output fiber
Optical filter
(b)
Fig. 3.21 Optical couplers: (a) fiber fusing based and (b) GRIN rode based
The 2
2 optical coupler is fundamental device that can be implemented using the
fiber fusing or be based on graded-index (GRIN) rods and optical filters, as shown
in Fig. 3.21. The fused optical couplers (shown in Fig. 3.21a) are obtained when the
cladding of two optical fibers is removed; the cores are brought together and then
heated and stretched. The obtained waveguide structure can exchange energy in the
coupling region between the branches. If both inputs are used, 2
2 coupler is
obtained; if only one input is used, 1
2 coupler is obtained. The optical couplers
are recognized either as optical tap (1
2) couplers or directional (2
2) couplers.
The power coupler splitting ratio depending on purpose can be different with
typical values being 50%/50%, 10%/90%, 5%/95%, and 1%/99%. Directional
coupler parameters (defined when only input 1 is active) are splitting ratio Pout,1/
(Pout,1 + Pout,2), excess loss 10log10[Pin,1/(Pout,1+ Pout,2)], insertion loss 10log10(Pin,
i/Pout,j), and cross talk 10log10(Pcross/Pin,1).
The operation principle of directional coupler can be explained using coupled
mode theory [1, 2, 6, 9, 10] or simple scattering (propagation) matrix S approach,
assuming that coupler is lossless and reciprocal device:
3.1 Key Optical Components, Modules, and Subsystems 235
Eout, 1 1 1 j Ein, 1
¼ pffiffiffi : ð3:42Þ
Eout, 2 2 j 1 Ein, 2
The combination of two GRIN rods and an optical filter can effectively be used
as an optical coupler, as illustrated in Fig. 3.21b. The GRIN rods are used as
collimators, to collimate the light from two input ports and deliver to the output
port, while the optical filter is used to select a desired wavelength channel.
The optical couplers can be used to create more complicated optical devices such
as M
N optical stars, directional optical switches, different optical filters,
multiplexers, etc.
An optical filter modifies the spectrum of incoming light and can mathematically be
described by corresponding transfer function Hof(ω):
Z1
1 ~ in ðωÞH of ðωÞejωt dω,
Eout ðtÞ ¼ E ð3:43Þ
2π
1
where Ein(t) and Eout(t) denote the input and output electrical field, respectively, and
we used ~ to denote the FT as before. Depending on the operational principle, the
optical filters can be classified into two broad categories as diffraction or interfer-
ence filters. The important class of optical filters are tunable optical filters, which
are able to dynamically change the operating frequency to the desired wavelength
channel. The basic tunable optical filter types include tunable 2
2 directional
couplers, Fabry-Perot (FP) filters, Mach-Zehnder (MZ) interferometer filters,
Michelson filters, and acousto-optical filters. Two basic optical filters, FP filter
and MZ interferometer filter, are shown in Fig. 3.22. An FP filter is in fact a cavity
between two high-reflectivity mirrors. It can act as a tunable optical filter if the
cavity length is controlled, for example, by using a piezoelectric transducer.
Tunable FP filters can also be made by using liquid crystals, dielectric thin films,
236 3 Components, Modules, and Subsystems
Mirrors
Piezoelectric transducer
(a) (b)
Fig. 3.22 Basic optical filters: (a) Fabry-Perot filter and (b) Mach-Zehnder interferometer
ð1 RÞejπ
HFP ðωÞ ¼ , τ ¼ 2L=vg ð3:44Þ
1 Rejωτ
where τ is the round-trip time within the cavity, and vg is the group velocity. The
transfer function of FP filter is periodic with period being the free-spectral range
(FSR) Δν ¼ vg/(2 L ). Another FP filter important parameter is the finesse defined as
[1–7]:
pffiffiffi
π R
F ¼ Δν =ΔνFP ffi , ð3:45Þ
1R
Y
M
jH MZ ðωÞj2 ¼ cos 2 ðωτm =2Þ, ð3:46Þ
m¼1
λi
λj
λk
Optical Fibers
Conventional
lens y ns
(a)
Input waveguides Output waveguides L
Planar star
coupler
d
Output
Input
coupler
coupler
nc
(b) (c)
Fig. 3.23 Optical multiplexers/demultiplexers: (a) grating-based demultiplexer, (b) array wave-
guide grating (AWG) demultiplexer, and (c) illustrating the operating principle of AWG
phase-matching condition (see Fig. 3.23c) and knowing that the focusing is
achieved when the path-length difference ΔL between adjacent array waveguides
is an integer multiple of the central design wavelength λc, that is, ncΔL ¼ mλc, we
derive the following expression for the channel spacing [17]:
y ns cd nc
Δν ¼ , ð3:47Þ
L mλ2 ng
where d is the spacing between the grating array waveguides, y is spacing between
the centers of output ports, L is the separation between center of arrayed wave-
guides and center of output waveguides, nc is the refractive index of waveguides in
grating array, ns is the refractive index of star coupler, ng is the group index, and
m is the diffraction order.
The free-spectral range can be obtained by [17]:
c
ΔνFSR ¼ , ð3:48Þ
ng ΔL þ d sin Θin, i þ d sin Θout, j
where the diffraction angles from the ith input Θin,i and jth output Θout,j ports
(measured from the center of the array) can be found as Θin,i ¼ iy/L and Θout,
j ¼ jy/L, respectively.
In order to exploit the enormous bandwidth potential of the optical fiber, different
multiplexing techniques (OTDMA, WDMA, CDMA, SCMA), modulation formats
(OOK, ASK, PSK, FSK, PolSK, CPFSK, DPSK, etc.), demodulation schemes
(direct detection or coherent optical detection), and technologies were developed,
and some important aspects are discussed in this section. The coherent optical
detection offers several important advantages compared to direct detection:
(i) improved receiver sensitivity, (ii) better frequency selectivity, (iii) possibility
of using constant amplitude modulation formats (FSK, PSK), (iv) tunable optical
receivers similar to RF receivers are possible, and (v) with coherent detection the
chromatic dispersion and PMD can easier be mitigated.
There is local laser, known as local oscillator laser, employed within coherent
optical receiver. We can recognize several detection schemes based on the value of
operating frequency of the local laser with respect to the frequency of incoming
optical signal, and they are (i) homodyne detection, in which these frequencies are
identical; (ii) heterodyne detection, in which the frequency difference is larger than
the signal symbol rate, so that all related signal processing upon photodetection is
performed at suitable intermediate frequency (IF); and (iii) intradyne detection, in
which the frequency difference is smaller than the symbol rate but higher than zero.
Further on, different coherent detection schemes can be classified into following
3.1 Key Optical Components, Modules, and Subsystems 239
np Photodetector Integrator
Fig. 3.24 Block diagrams of (a) direct-detection scheme and (b) coherent detection scheme
categories: (i) synchronous (PSK, FSK, ASK) schemes, (ii) asynchronous (FSK,
ASK) schemes, (iii) differential detection (CPFSK, DPSK) schemes, (iv) phase
diversity reception schemes, (v) polarization diversity reception schemes, and
(vi) polarization-division multiplexing schemes. Synchronous detection schemes
can further be categorized as residual carrier or suppressed carrier ones.
In Fig. 3.24, we show the basic difference between direct-detection (Fig. 3.24a)
and coherent detection (Fig. 3.24b) schemes. Coherent optical detection, in addition
to the photodetector and integrator already in use for direct detection, employs a
local laser whose frequency and polarization is matched to the frequency and
polarization of incoming optical signal. The incoming optical signal and local
laser output signal are mixed in optical domain (a mirror is used in this illustrative
example; in practice an optical hybrid, described in incoming section, is used
instead).
For additional details on coherent optical systems, an interested reader is
referred to [1, 3, 5, 10, 26, 28].
where k is the power splitting ratio, and ϕ is the phase shift introduced by the phase
trimmer (see Fig. 3.25). The Eq. (3.49) can also be written in terms of scattering (S-)
matrix as follows:
240 3 Components, Modules, and Subsystems
Output 2
Output 1
Control
voltage Phase Input 2
trimmer
Eo1 Eo1
Eo ¼ ¼S ¼ SEi ,
Eo2 Eo2
" pffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffi # ð3:50Þ
s11 s12 1k 1k
S¼ ¼ pffiffiffi jϕ
pffiffiffi
s21 s22 k e k
s11 s12
S¼ : ð3:52Þ
s21 s22 ejπ=2
2 h pffiffiffiffiffiffiffiffiffiffiffiffi i
E{0 E0 ¼ P1i þ P2i þ P1i P2i ð cos θi þ sin θi Þ ð3:53Þ
Loss
pffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffi
1 1p ffiffiffik
S ¼ pffiffiffiffiffiffiffiffiffiffi ffiffiffi k 1p
: ð3:54Þ
Loss k j k
To reduce the relative intensity noise (RIN) of transmitting laser and to eliminate
the direct-detection and signal-cross-signal interferences, the most deleterious
sources for multichannel applications, the balanced coherent optical receiver,
shown in Fig. 3.26, is commonly used. For homodyne detection, by ignoring the
laser phase noise, the upper and lower photodetectors’ output currents can, respec-
tively, be written as:
0
1 B pffiffiffiffiffiffiffiffiffiffiffiffiffi
i1 ðtÞ ¼ RjE1 j2 ¼ R@ jEs j2 þ jELO j2 þ2 PS PLO cos θS Þ þn1 ðtÞ
2 |ffl{zffl} |fflffl{zfflffl}
PS PLO
1 pffiffiffiffiffiffiffiffiffiffiffiffiffi
i2 ðtÞ ¼ RjE2 j2 ¼ R PS þ PLO 2 PS PLO cos θS þ n2 ðtÞ ð3:55Þ
2
where θs is the phase of incoming optical signal, and ni(t) (i ¼ 1,2) is the i-th
photodetector shot-noise process of PSD Sni ¼ qRjEi j2 . The balanced receiver
output current (see Fig. 3.26) can be written as:
pffiffiffiffiffiffiffiffiffiffiffiffiffi
iðtÞ ¼ i1 ðtÞ i2 ðtÞ ¼ 2R PS PLO cos θS þ nðtÞ, nðtÞ ¼ n1 ðtÞ n2 ðtÞ ð3:56Þ
π/2 phase
shifter
Y-junction E1
Sk π/2 vI
Received
optical signal E2
3 dB coupler E3
Local L vQ
laser E4
-π/2
From local
vI
oscillator laser LPF
(b)
Fig. 3.27 Directional coupler-based coherent optical detection schemes for 2-D signaling (PSK,
QAM): (a) balanced coherent optical detector architecture and (b) single optical balanced detector
based on heterodyne design. LPF low-pass filter
M,.., 2π(M1)/M} value is determined by the sequence of log2M input bits using an
appropriate mapping rule. The mapper accepts m bits, c ¼ (c1,c2,..,cm), from the
input sequence at time instance i and determines the corresponding M-ary (M ¼ 2m)
constellation point sk ¼ (Ik,Qk) ¼ |Sk|exp( jθk). The coordinates from the mapper,
after the upsampling, are used as the RF inputs of optical I/Q modulator.
Let the input to the coherent detector be given by Sk ¼ |Sk|exp[j(ωTt + ϕPN,
T + θk)], where the subscript k is used to denote the k-th symbol being transmitted,
ωT denotes the transmit laser frequency (in rad/s), ϕPN,T denotes the laser phase
noise of transmitter laser, and |Sk| and θk denote the amplitude and the phase of the
k-th symbol for M-ary QAM/PSK (or any other 2-D signal constellation). Let the
local laser (oscillator) output be denoted by L ¼ |L|exp[j(ωLOLt + ϕPN,LOL)], where
ωLOL denotes the local oscillator laser frequency and ϕPN,LOL denotes the laser
phase noise of local laser. There exist different versions of balanced coherent
optical detectors for 2-D signal constellations. The directional coupler-based bal-
anced coherent optical detector architecture is shown in Fig. 3.27a. The scattering
matrix of 3
dB directional coupler, based on Eq. (3.42), is given by
1 j
S ¼ p1ffiffi2 : The electrical fields’ outputs E1 and E2, in the upper branch, are
j 1
related to input electrical fields Sk and L, in matrix form, as follows:
3.1 Key Optical Components, Modules, and Subsystems 243
2 3
p1ffiffiffiejπ=2 Sk
E1 1 1 j 6
6 2
7
7,
¼ pffiffiffi ð3:57Þ
E2 2 j 1 4 1 5
pffiffiffiL
2
1 1
E1 ¼ jðSk þ LÞ, E2 ¼ ðSk þ LÞ: ð3:58Þ
2 2
1 2
P1 ¼ jE1 j2 ¼ E1 E∗
1 ¼ jSk j þ jLj2 þ Sk L∗ þ S∗
k L ,
4 ð3:59Þ
1
P2 ¼ jE2 j ¼ E2 E2 ¼ jSk j2 þ jLj2 Sk L∗ S∗
2 ∗
k L :
4
Assuming the unit load resistance in upper branch of the balanced coherent
optical detector, the in-phase component is obtained as (by ignoring the shot and
thermal noises):
1
vI, k ffi R jE1 j2 jE2 j2 ¼ R Sk L∗ þ S∗
k L
2 2 3
6 7 ð3:60Þ
¼ RjSk jjLj cos 4ðωT ωLO Þ t þ θk þ ϕPN, T ϕPN, LOL 5
|fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflffl}
ωIF ϕPN
where ωIF ¼ |ωT ωLOL| denotes the intermediate frequency, while ϕPN ¼
ϕPN , T ϕPN , LOL denotes the total phase noise originating from both transmit and
local oscillator lasers.
In similar fashion, the electrical fields’ outputs E3 and E4, in the lower branch of
Fig. 3.27a, are related to input electrical fields Sk and L, in matrix form, as follows:
2 3
1
pffiffiffiSk
E3 1 1 j 66 2 7,
7
¼ pffiffiffi 4 1 5 ð3:61Þ
E4 2 j 1
pffiffiffiL
2
1 1
E3 ¼ ðSk þ jLÞ, E4 ¼ ðjSk þ LÞ: ð3:62Þ
2 2
1 2
P3 ¼ j E3 j 2 ¼ E3 E ∗ jSk j þ jLj2 jSk L∗ þ jS∗
3 ¼ k L ,
4 ð3:63Þ
1
P4 ¼ jE4 j ¼ E4 E4 ¼ jSk j2 þ jLj2 þ jSk L∗ jS∗
2 ∗
k L :
4
Assuming the unit load resistance in the lower branch of the balanced coherent
optical detector, the in-phase component is obtained as (by ignoring the shot and
thermal noises):
1
vQ, k ffi R jE3 j2 jE4 j2 ¼ R Sk L∗ S∗
k L
2 2j 3
6 7 ð3:64Þ
¼ RjSk jjLj sin 4ðωT ωLO Þ t þ θk þ ϕPN, T ϕPN, LOL 5
|fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflffl}
ωIF ϕPN
We start the description of DSP basic by describing the role of the system (transfer)
function as well as establishing relationship between discrete-time (DT) and
continuous-time (CT) Fourier transforms.
where input and output to the system are denoted with x(n) and y(n), respectively.
By applying z-transform on Eq. (3.66), we can determine the system function (also
known as the transfer function) H(z) as follows:
P
M
bm zm
Y ðzÞ m¼0
H ðzÞ ¼ ¼ N , ð3:67Þ
X ðzÞ P
an zn
n¼0
where X(z) [Y(z)] denotes the z-transform of x(n) [y(n)], namely, X(z) ¼ Z{x(n)} [Y
(z) ¼ Z{y(n)}]. The frequency response can be obtained by substituting z with ejΩ:
H ejΩ ¼ H ðzÞjz¼ejΩ : ð3:68Þ
if the region of convergence (ROC) is the exterior of circle of radius r < 1. On the
other hand, DT system is bounded input-bounded output (BIBO) stable if every
bounded input sequence x(n) produces a bounded output sequence y(n). It can be
shown that an LTI system is BIBO stable if and only if the ROC of system function
contains the unit circle. Finally, a causal LTI system is BIBO stable if and only if all
the poles of the system function are located inside the unit circle.
The relationship between Fourier transforms of a continuous-time (CT) signal
xa(t) and a DT signal x(n) obtained by sampling (every T seconds) is illustrated in
Fig. 3.29. The z-transform can be related to DT Fourier transform (DTFT) by
simply substituting z ¼ exp( jΩ). In other words, the DTFT is the z-transform
evaluated on the unit circle. Because of the periodicity path along the unit circle,
the DTFT will be periodic with a period of 2π.
When a0 ¼ 1, we can express y(n) as the function of previous LTI system outputs
and current and previous LTI system inputs, based on Eq. (3.66), as follows:
Fig. 3.29 The relationship between DT and CT Fourier transforms. We use the subscript a to
denote the analog signals
P
M
!
bm zm X
M
m¼0 1
H ðzÞ ¼ ¼ bm zm ¼ H AZ ðzÞHAP ðzÞ, ð3:71Þ
P
N P
N
an zn m¼0
|fflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl} an zn
n¼0 n¼0
HAZ ðzÞ |fflfflfflfflffl{zfflfflfflfflffl}
H AP ðzÞ
HAZ(z) HAP(z)
y(n)
x(n) b0
z-1 z-1
b1 − a1
z-1 z-1
b2 − a2
…
…
…
…
bM−1 − aN−1
z-1 z-1
bM − aN
Y
K
bk0 þ bk1 z1 þ bk2 z2
H ðzÞ ¼ Hk ðzÞ, H k ðzÞ ¼ , ð3:72Þ
k¼1
1 þ ak1 z1 þ ak2 z2
X
K
bk0 þ bk1 z1 þ bk2 z2
H ðzÞ ¼ H k ðzÞ, Hk ðzÞ ¼ , ð3:73Þ
k¼1
1 þ ak1 z1 þ ak2 z2
z-1
− a1 b1
z-1
− a2 b2
…
…
…
− aM−1 bM−1
z-1
− aM bM
z-1
…
M<N
− aN−1
z-1
− aN
x(n) y(n)
H1(z) H2(z) HK(z)
HK(z)
250 3 Components, Modules, and Subsystems
(ii) the left half-plane of s-plane should map into inside of unit circle in the z-plane.
The bilinear transform, given by:
2 1 z1
s¼ , ð3:74Þ
T 1 þ z1
Zt 0 0
ϕðtÞ ¼ a0 x t dt , ð3:76Þ
1
where a0 is the VCO gain [rad/V]. The VCO output signal will be the following
cosinusoidal signal:
0 1
Zt 0 0
yðtÞ ¼ cos @ω0 t þ a0 x t dtA: ð3:77Þ
1
Fig. 3.35 The block diagram of direct digital synthesizer (DDS) with DSP implementation details
Phase accumulator
N bits
x(nT) y ( nT)
Quantiz. cos(⋅)
z −1
Q(⋅) LUT
A0 NQ bits
Ω0
φ ( nT ) + Ω 0 n = θ ( n)
Fig. 3.36 The block diagram of the DDS with finite precision
The DDS shown in Fig. 3.35 does not take the finite precision of the phase
accumulator representation. A realistic DDS with finite precision taken into account
is shown in Fig. 3.36, where we use Q() to denote the quantization operation. The
number of quantization bits NQ < N can be determined as NQ ¼ NNt, where Nt is
the number of truncated least significant bits. Let us assume that two’s complement
integer representing the phase at the output of accumulator is given by
a0a1 aN 1 ¼ a02N 1 + a12N 2 + + aN 120. The decimal representation
of the accumulated phase would be θ0θ1 θN 1 ¼ θ020 + θ121 + + θN 12
(N 1)
. Since the sampling frequency is given by Fs ¼ 1/T, the maximum fre-
quency, according to the sampling theorem, will be fmax ¼ Fs/2. The minimum
frequency is the resolution frequency determined by fmin ¼ Fs/2N. The number of
required bits for the phase accumulator content representation will then be:
f max Fs =2 N1 f max
¼ ¼2 ) N ¼ log2 þ1 , ð3:79Þ
f min Fs =2N f min
where we use de to denote the smallest integer larger than or equal to the enclosed
quantity. As an illustration, for lfmax ¼h 400 MHzi m resolution of fmin ¼ 0.1 Hz, the
and
6
number of required bits is N ¼ log2 40010 0:1 þ 1 ¼ 33, so that the size of LUT for
cos() is too large, 8.589934592109. To reduce the size of LUT, one method is to
252 3 Components, Modules, and Subsystems
Random θˆ ( n ) = θ ( n ) + Δθ ( n )
noise gen.
Phase accumulator
x(nT ) N bits N bits y(nT )
Quantiz. cos(⋅)
z −1
Q(⋅) LUT
A0 NQ bits
Dithering
Ω0 stage
θ (n)
Fig. 3.37 The compensation of the spurious spectral lines by the phase dithering method
use the truncation, mentioned above, and illustrated in Fig. 3.36. The truncation
method, however, will introduce the phase error Δθ(n) in the represented phase
θ ð nÞ ¼ b
θ ðnÞ þ ΔθðnÞ: The corresponding spectrum of complex exponential will
contain the spurious spectral lines. The complex exponential can be represented by:
b b b
ejθðnÞ ¼ ej θ ðhnÞþΔθðinÞ ¼ ejθ ðnÞ ejΔθðnhÞ ffi ejiθ ðnÞ ½1nþ jΔθ
h ðnÞi h io
ffi cos θ ðnÞ ΔθðnÞ sin θ ðnÞ þ j sin b
b b θ ðnÞ þ ΔθðnÞ cos bθ ðnÞ :
ð3:80Þ
Based on Eq. (3.80), the first line, we conclude that it is possible to average out
the phase error by phase dithering, as illustrated in Fig. 3.37. The amplitude should
be sufficiently small (on the order of 2N), and the samples of the random generator
should follow the probability density function of the phase error, with proper tails
included. The end result will be the compensation of the spurious spectral line, and
the uncompensated phase error will appear as the white noise with level well below
that of the desired spectral line.
Another method to compensate the phase error will be the application of the
second line in Eq. (3.80), and corresponding phase error correction circuit is shown
in Fig. 3.38. However, this approach requires additional multiplication and addition
operations.
It is also possible to consider the phase error as the noise process and employ the
linear predictive approaches to estimate the quantization error and subtract it from
the phase accumulator output, as illustrated in Fig. 3.39.
sin θˆ ( n ) sin θ ( n )
sin(⋅)
Phase accumulator NQ bits
N bits θ ( n )
Quantiz. and
z −1
A0
Q(⋅) θˆ ( n )
cos(⋅) −
− cosθ ( n )
Ω0 +
LUT cosθˆ ( n )
Δθ ( n )
Fig. 3.38 The compensation of the phase error by the feedforward error compensation method
sin θˆ ( n )
sin(⋅)
Phase accumulator
N bits θˆ ( n )
x(nT ) Quantiz. and
z −1
θ (n) Q(⋅)
A0 − NQ bits cos(⋅)
− cosθˆ ( n )
Ω0 +
LUT
Δθ ( n )
Linear
predictor
H(z)
Fig. 3.39 The compensation of the phase error by the feedback error compensation method
3.2.3.1 Downsampling
1 X D1
Ωk2π
XD ejΩ ¼ X ej D , ð3:82Þ
D k¼0
indicating that the spectra of aliases get expanded D times. To avoid this aliasing
problem, we need first to perform low-pass filtering with an LPF of cutoff fre-
quency fc ¼ fx/(2D) [Hz], which is equivalent to Fc ¼ 1/(2D) [cycles/sample].
Therefore, the block diagram of DSP module for downsampling operation is a
cascade of the LPF and downsampler, as shown in Fig. 3.42.
3.2.3.2 Upsampling
To get rid of aliases, we need the LPF with the system function:
3.2 Modules/Components Relevant to Wireless Communications 255
Fig. 3.43 The upsampler-LPF DSP module (interpolator) performing the upsampling operation
jΩy
C, 0 Ωy π=U
HU e ¼ ð3:85Þ
0, otherwise
3.2.3.3 Resampling
To resample the DT signal by a rational factor U/D, or in other words to perform the
rate conversion by a factor U/D, we can cascade the upsampling and downsampling
modules as shown in Fig. 3.44a. The order of interpolator and decimator is chosen
on such a way so that the two low-pass filters can be combined into one, as shown in
Fig. 3.4b, with the system function:
C, 0 Ωy minðπ=U; π=DÞ
H ejΩy ¼ ð3:86Þ
0, otherwise
Interpolator Decimator
x(n) y(m)
U HU (z) HD(z) D Sampling
Sampling
rate fx rate fy=(U/D) fx
Sampling
rate Ufx
(a)
x(n) y(m)
U LPF H(z) D Sampling
Sampling
rate fx rate fy=(U/D) fx
Sampling
rate Ufx
(b)
Fig. 3.44 DSP module to perform the resampling by a rational factor U/D: (a) cascade of
interpolator and decimator and (b) DSP resampling module in which two low-pass filters are
combined into one
(a) (b)
Fig. 3.45 The Noble identities: (a) downsampling and (b) upsampling equivalencies (identities)
1, 0 n < M
hð nÞ ¼ ð3:87Þ
0, otherwise
X
1 X
M 1
1 zM
H ðzÞ ¼ hðnÞzn ¼ zn ¼
n¼1 n¼0
1 z1
1 ð3:88Þ
¼ 1 zM ¼ H integrator ðzÞHcomb ðzÞ,
z |fflfflfflfflfflffl{zfflfflfflfflfflffl}
1
1|fflfflffl{zfflfflffl}
Hcomb ðzÞ
H integrator ðzÞ
3.2 Modules/Components Relevant to Wireless Communications 257
x(n) y(m)
[1-z−1] −1 D 1−z−1
(a)
x(n) y(m)
U 1−z−U [1-z−1] −1
x(n) y(m)
1−z−1 U [1-z−1] −1
(b)
indicating that CIC filter can be represented as a cascade of an integrator and the
comb filter, typically employed to reject periodical frequencies (or equally spaced
frequencies). The CIC filter cascaded with an upsampler/downsampler is known as
a Hogenauer filter. The CIC filter can be used either in decimator or interpolator as
the LPF. By using Noble identities, the implementation of the comb filter in both
decimator and interpolator can be simplified as shown in Fig. 3.46. Given that
DTFT of CIC filter has the form:
1 zM sin MΩ
H ejΩ ¼ H ðzÞjz¼ejΩ ¼ ¼ 2 ejðM1ÞΩ=2 , ð3:89Þ
1 z1 z¼ejΩ sin Ω2
we conclude that the magnitudes of the side-band will not be sufficiently suppressed
so that the multiple integrator stages maybe used when needed.
Let the terms in the first column of Eq. (3.90) define a sub-filter H0(zN):
H 0 zN ¼ hð0Þ þ hðN ÞzN þ hð2N Þz2N þ ð3:91Þ
Let the terms in the second column of Eq. (3.90), after removing the common
factor z1, define the sub-filter H1(zN):
H 1 zN ¼ hð1Þ þ hðN þ 1ÞzN þ hð2N þ 1Þz2N þ ð3:92Þ
Further, let the terms in the third column of Eq. (3.90), after removing the
common factor z2, define the sub-filter H2(zN):
H 2 zN ¼ hð2Þ þ hðN þ 2ÞzN þ hð2N þ 2Þz2N þ ð3:93Þ
We can then decompose the filter with system function (3.90) in terms of transfer
functions of sub-filters as follows:
H ðzÞ ¼ H0 zN þ H 1 zN z1 þ H 2 zN z2 þ þ H N1 zN zðN1Þ , ð3:95Þ
…
…
HN−2(zN)
z-1
HN−1(zN)
…
…
…
…
HD−2(zD) D D HD−2(z)
z-1 z-1
HD−1(zD) D D HD−1(z)
(a) (b)
Fig. 3.48 The use of polyphase filter structure in decimation: (a) before and (b) after the
downsampling Noble identity
fashion, the configuration of the interpolator can also be greatly simplified when the
commutator is used as shown in Fig. 3.51.
Finally, by employing the commutator and the DSP module to perform the
resampling by a rational factor U/D shown in Fig. 3.44b, we can implement the
polyphase filter-based resampling by U/D as shown in Fig. 3.52. In this module,
each input sample generates U output samples in parallel. The commutator strides
through the polyphase filter bank and outputs D samples per cycle. Once the
commutator exceeds the U-th polyphase filter bank branch, it rolls over per modulo
U, and the new input sample gets clocked into the polyphase filter bank. When
U > D, then multiple outputs get generated for each input clocked into the module.
On the other hand, when U < D, then multiple inputs get clocked into the module
260 3 Components, Modules, and Subsystems
U H1(zU) H1(z) U
z-1 z-1
U H2(zU) H2(z) U
z-1 z-1
…
…
…
…
…
…
U HU−2(zU) HU−2(z) U
z-1 z-1
U HU−1(zU) HU−1(zU) U
(a) (b)
Fig. 3.49 The use of polyphase filter structure in interpolation: (a) before and (b) after the
upsampling Noble identity
y(m)
H0(z)
Sampling
Rate fy= fx /D
H1(z)
x(n)
…
Sampling
rate fx
HD−2(z)
Commutator
rate fx
HD−1(z)
x(n)
H0(z)
Sampling
rate fx
H1(z)
y(m)
…
Sampling
Rate fy= Ufx
HU−2(z)
Commutator
rate Ufx
HU−1(z)
y(m)
…
Sampling
Rate fy= (U/D) fx
HU−2(z)
Commutator
rate Ufx /D
HU−1(z)
θ
A1
θ
A2
θ
…
A1
θ
AN−1
d
θ d
A2 θ
AN
Fig. 3.53 Linear antenna arrays: (a) two-element linear array and (b) N-element linear array
not only function of time but also a function of the angle of arrival r(t,θ), t2
{1,1}, and θ 2[0,2π]. The antenna array with radiation pattern R(θ) can be
considered as the correlator in the space domain, so that the signal after antenna
array can be represented as:
Z2π
1
r ðt; θÞRðθÞdθ ð3:96Þ
2π
0
Let the two-element array be observed, see Fig. 3.53a, with elements, denoted as
A1 and A2, separated by d, with incident angle of incoming electromagnetic
(EM) waves being θ. Clearly, the EM wave path difference is dcosθ, resulting in
path delay deference of dcosθ/c (c is the speed of light). The incident EM waves can
be, therefore, represented as:
3.2 Modules/Components Relevant to Wireless Communications 263
d
xA1 ðtÞ ¼ expðj2πf c t þ jφÞ, xA2 ðtÞ ¼ exp j2π fc t cos θ þ jφ , ð3:97Þ
c
where fc is the carrier frequency and φ is the carrier phase shift. Assuming that g and
φ are the gain coefficient and phase shift of antenna element A2 with respect to
antenna element A1, the resulting antenna array signal can be represented as:
jϕj2πfc c cos θ
d
jϕ j2πf c tþjφ
zðtÞ ¼ xA1 ðtÞ þ ge xA2 ðtÞ ¼ e 1 þ ge
0
n 2 2 o1=2
¼ ej2πf c tþjφ 1 þ g cos ϕ 2πf c dc cos θ þ g sin ϕ 2πfc dc cos θ
0 1=2 0
¼ ej2πf c tþjφ 1 þ g2 þ 2g cos ϕ 2πfc dc cos θ ¼ jRðθÞjej2πf c tþjφ ,
ð3:98Þ
where φ’ is the equivalent phase shift of the carrier and |R(θ)|2 is the magnitude
squared of the radiation pattern given by:
2 d
jR ð θ Þ j ¼ 1 þ g 2
þ 2g cos ϕ 2πfc cos θ : ð3:99Þ
c
In particular, when the distance between array elements is the half of wave-
length, d ¼ λc/2, the magnitude squared of the radiation pattern simplifies to:
λc
jRðθÞj2 d¼λc =2 ¼ 1 þ g2 þ 2g cos ϕ πfc cos θ
c ð3:100Þ
λc ¼c=f c
¼ 1 þ g þ 2g cos ðϕ π cos θÞ:
2
Based on the first line in Eq. (3.98), the radiation pattern of the N-element linear
array will be:
X
N
ðn1Þd cos θ
Rð θ Þ ¼ gn ejϕn j2πfc c : ð3:101bÞ
n¼1
When d ¼ λc/2 the radiation pattern of N-element linear array reduces to:
264 3 Components, Modules, and Subsystems
4 3
φ=π/2, g=1 φ=π, g=1
3
2
2
1 1
0 0
-1
-1
-2
-2
-3
-4 -3
-2 -1 0 1 2 3 -4 -3 -2 -1 0 1 2 3 4
Fig. 3.54 The radiation patterns can be varied by changing the parameters g and ϕ
X
N
RðθÞjd¼λc =2 ¼ gn ejϕn jπ ðn1Þ cos θ : ð3:102Þ
n¼1
By varying the number of elements in the linear array, the element spacing,
amplitudes, and phases of the complex weights, it is possible to obtain different
shapes of the radiation pattern.
For the transmit array antenna of identical elements, the radiation pattern can be
found by applying the pattern multiplication theorem [51], claiming that the array
pattern is the product of the array element pattern and the array factor (AF). The AF
is a function dependent only on the geometry of the antenna array and excitation of
the elements. Since the array factor is independent of the antenna type, the isotropic
radiators can be employed in the derivation of the AF. The field of an isotropic
radiator located in the origin is given by [51]:
I 0 ejkr
Eθ ¼ , ð3:103Þ
4π r
where r is the distance of the observation point P from the origin, k is the wave
number (k ¼ 2π/λ), and I0 is the current magnitude applied. Let us now observe the
transmit N-element linear array shown in Fig. 3.55. The current magnitudes of all
array elements are the same I0, while the phase of the n-th element relative to the
first element is denoted as ϕn so that the current of the n-th element is given by
In ¼ I0exp( jϕn). Based on Fig. 3.55, we conclude that the far field for the n-th array
element is given by:
The overall N-element array far field can be determined by the superposition
principle:
3.2 Modules/Components Relevant to Wireless Communications 265
rN
rN−1
θ
AN
…
r2
d
θ
r1=r
AN−1
…
θ
A2
d rn = r − ( n − 1) d cosθ ; n = 1,... , N
θ
A1
y
X
N
Eθ ¼ Eθ , n
n¼1
XN
I 0 ejϕn ejk½rðn1Þd cos θ I 0 ejkr X
N
¼ ¼ ej½ϕn þðn1Þkd cos θ : ð3:105Þ
n¼1
4π r 4π r n¼1
One particular version of the linear array is the uniform linear array in which
phases follow the arithmetic progression:
I 0 ejkr X
N
I 0 ejkr X N
Eθ ¼ ej½ðn1Þϕþðn1Þkd cos θ ¼ ejðn1Þðϕþkd cos θÞ :
4π r n¼1 4π r
|fflfflfflffl{zfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflfflfflffl
n¼1
array element pattern
ffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
AF
ð3:107Þ
XN
By applying the geometric progression formula n¼1
qn ¼ ð1 qn Þ=ð1 qÞ,
we obtain the following expression for array factor:
X
N
ejN ðϕþkd cos θÞ 1
AF ¼ ejðn1Þðϕþkd cos θÞ ¼
n¼1
ejðϕþkd cos θÞ 1
N ðϕþkd cos θÞ
sin 2
¼e jðN1Þϕ
ϕþkd cos θ : ð3:108Þ
sin 2
The complex exponent term will disappear when the origin is moved to the
center of the linear array so that the expression for AF simplifies to:
N ðϕþkd cos θÞ
sin 2
AF ¼ ϕþkd cos θ : ð3:109Þ
sin 2
yAGC(nT) Matched
Synchronization, carrier
phase estimation, and
filter
decision steps
cos(W IF n)
IF Estimated
ADC Resampling AGC DDS
passband sequence of
signal -sin(W IF n)
symbols
y(nT ) Matched
filter
Accumulator s Lref a ( n ) ay ( nT )
Fig. 3.56 The location of the AGC module in the passband (at IF) and the configuration of
corresponding AGC module
where discrete frequency ΩIF is related to the IF frequency ωIF by ΩIF ¼ ωIFT. In
Eq. (3.110), we use Iy(nT) and Qy(nT) to denote the in-phase and quadrature
components of the IF passband signal, while z(nT) represents the sample of the
narrowband noise. The corresponding polar coordinate-based representation is
given by:
Qy ðnT Þ ð3:111Þ
ay ðnT Þ ¼ I 2y ðnT Þ þ Q2y ðnT Þ, ψ ðnT Þ ¼ tan 1 :
I y ðnT Þ
where Lref is the reference level. Before the accumulator, the error estimate can
properly scaled by the factor s. The accumulator stores the previous value of the
envelope estimate a(n1), and the update formula is given by:
aðnÞ ¼ aðn 1Þ þ s Lref aðn 1Þay ððn 1ÞT Þ : ð3:113Þ
The AGC can also be placed in the baseband domain as shown in Fig. 3.57.
268 3 Components, Modules, and Subsystems
I (nT) IAGC(nT)
Matched
Synchronization, carrier
phase estimation, and
filter
decision steps
cos(Ω IF n)
(AGC)
IF Estimated
ADC Resampling DDS
passband sequence of
signal − sin(Ω IF n)
y(nT) symbols
Matched
filter
Q (nT) QAGC(nT)
I(nT) IAGC(nT)
Accumulator s Lref
a (n ) ã (nT )
Fig. 3.57 The location of the AGC module in the baseband and the configuration of
corresponding AGC module
The corresponding envelope update formula is very similar to Eq. (3.113) and
given by:
The key difference of this AGC scheme with respect to the corresponding
scheme form Fig. 3.56 is that it operates in baseband and as such it is possible to
implement it at lower rates. Both envelope update expressions are nonlinear and
might converge slow when the signal level is low. To overcome this problem, we
can modify the update formula to operate with dB-values of the signals as follows:
In this chapter, basic components, modules, and subsystems relevant in both optical
and wireless communications have been described.
In the first half of the chapter, Sect. 3.1, key optical components, modules, and
subsystems have been described. After describing optical communication basic,
Sect. 3.1.1, focus has been changed to the optical transmitters (Sect. 3.1.2). The
following classes of lasers have been introduced in Sect. 3.1.2: Fabry-Perot, DFB,
and DBR lasers. Regarding the external modulators, both Mach-Zehnder modulator
and electroabsorption modulator have been described, in the same subsection.
Regarding the external modulators for the multilevel modulation schemes, phase,
I/Q modulator, and polar modulators have been described. In Sect. 3.1.3, devoted to
optical receivers, after the photodetection principle, the p-i-n photodiode, APD, and
metal-semiconductor-metal photodetectors have been briefly described. In the same
subsection, both optical receiver high-impedance front end and transimpedance
front end have been described as well. In Sect. 3.1.4, devoted to optical fibers, both
SMF and MMF have been briefly described. In Sect. 3.1.5, devoted to optical
amplifiers, after describing optical amplification principles, the following classes
of optical amplifiers have been described: SOA, Raman amplifier, and EDFA. In
Sect. 3.1.6, related to optical processing components and modules, the following
components/modules have been described: optical couplers, optical filters, and
WDM multiplexers/demultiplexers. After that, the principles of coherent optical
detection have been introduced, in Sect. 3.1.7, followed by the description of
optical hybrids in Sect. 3.1.8. In Sect. 3.1.9, on coherent optical balanced detectors,
both homodyne and heterodyne optical balanced detectors for both binary and
multilevel (QAM, PSK, APSK) modulations have been described.
In the second half of the chapter, Sect. 3.2, basic components and modules of
relevance to modern wireless communications have been described. Some of these
modules are also relevant in optical communications as well. In Sect. 3.2.1, the DSP
basics have been introduced, including various discrete-time realizations. The
direct digital synthesizer, relevant in discrete-time wireless communication sys-
tems, has been described in Sect. 3.2.2. In Sect. 3.2.3, related to the multirate DSP
and resampling, various upsampling, downsampling, and resampling schemes/
modules have been described. In the same subsection, the polyphase decomposition
of the system (transfer) function has been introduced and employed in resampling.
In Sect. 3.2.4, devoted to the antenna arrays, the linear array antennas have been
described. Finally, in Sect. 3.2.5, on automatic gain control, the AGC schemes
operating in passband and baseband have been described.
270 3 Components, Modules, and Subsystems
References
26. Jacobsen G (1994) Noise in digital optical transmission systems. Artech House, Boston
27. Djordjevic IB (1999) Analysis and optimization of coherent optical systems with the phase-
locked loop. Ph.D. Dissertation, University of Nis, Serbia
28. Hooijmans PW (1994) Coherent optical system design. J. Wiley and Sons,
Chichester/New York
29. Savory SJ (2008) Digital filters for coherent optical receivers. Opt Express 16:804–817
30. Djordjevic IB, Xu L, Wang T (2008) PMD compensation in multilevel coded-modulation
schemes with coherent detection using BLAST algorithm and iterative polarization cancella-
tion. Opt Express 16(19):14845–14852
31. Djordjevic IB, Xu L, Wang T (2008) PMD compensation in coded-modulation schemes with
coherent detection using Alamouti-type polarization-time coding. Opt Express 16
(18):14163–14172
32. Djordjevic IB, Arabaci M, Minkov L (2009) Next generation FEC for high-capacity commu-
nication in optical transport networks. IEEE/OSA J Lightwave Technol 27(16):3518–3530.
(Invited paper)
33. Djordjevic IB (2016) On advanced FEC and coded modulation for ultra-high-speed optical
transmission. IEEE Commun Surv Tutorials 18(3):1920–1951. doi:10.1109/COMST.2016.
2536726. third quarter
34. Ip E, Lau APT, Barros DJF, Kahn JM (2008) Coherent detection in optical fiber systems. Opt
Express 16:753–791
35. Kikuchi K (2016) Fundamentals of coherent optical fiber communications. J Lightwave
Technol 34(1):157–179
36. Goldsmith A (2005) Wireless communications. Cambridge University Press, Cambridge
37. Tse D, Viswanath P (2005) Fundamentals of wireless communication. Cambridge University
Press, Cambridge
38. Benedetto S, Biglieri E (1999) Principles of digital transmission with wireless applications.
Kluwer Academic/Plenum Publishers, New York
39. Biglieri E (2005) Coding for wireless channels. Springer, New York
40. Duman TM, Ghrayeb A (2007) Coding for MIMO communication systems. John Wiley &
Sons, Chichester
41. Hampton JR (2014) Introduction to MIMO communications. Cambridge University Press,
Cambridge, UK
42. Stüber GL (2012) Principles of mobile communication, 3rd edn. Springer, New York
43. Lee WCY (1982) Mobile communications engineering. McGraw-Hill, New York
44. Proakis JG (2001) Digital communications. McGraw-Hill, Boston
45. Proakis JG, Manolakis DG (2007) Digital signal processing: principles, algorithms, and
applications, 4th edn. Prentice-Hall, Upper Saddle River
46. Haykin S, Van Veen B (2003) Signals and systems, 2nd edn. John Wiley & Sons
47. Oppenheim AV, Schafer RW (2010) Discrete-time signal processing, 3rd edn. Pearson Higher
Education, Upper Saddle River
48. Djordjevic IB (2008) ECE 429/529 Digital signal processing (Lecture Notes), University of
Arizona.
49. Djordjevic IB (2012) ECE 340 Engineering systems analysis (Lecture Notes), University of
Arizona
50. Verdú S (1998) Multiuser detection. Cambridge University Press, New York
51. Balanis CA (2016) Antenna theory: analysis and design, 4th edn. John Wiley & Sons, Hoboken
Chapter 4
Wireless and Optical Channels Capacities
Abstract This chapter is devoted to wireless channel and optical channel capac-
ities. The chapter starts with definitions of mutual information and channel capac-
ity, followed by the information capacity theorem. We discuss the channel capacity
of discrete memoryless channels, continuous channels, and channels with memory.
Regarding the wireless channels, we describe how to calculate the channel capacity
of flat-fading and frequency-selective channels. We also discuss different optimum
and suboptimum strategies to achieve channel capacity including the water-filling
method, multiplexed coding and decoding, channel inversion, and truncated chan-
nel inversion. We also study different strategies for channel capacity calculation
depending on what is known about the channel state information. Further, we
explain how to model the channel with memory and describe McMillan-Khinchin
model for channel capacity evaluation. We then describe how the forward recursion
of the BCJR algorithm can be used to evaluate the information capacity of channels
with memory. The next topic is related to the evaluation of the information capacity
of fiber-optics communication channels with coherent optical detection. Finally, we
describe how to evaluate the capacity of hybrid free-space optical (FSO)-RF
channels, in which FSO and RF subsystems cooperate to compensate for the
shortcoming of each other.
p(y1|x1)
x1 y1
p(y2|x1)
x2 y2
p(y1|xi)
p(yJ|x1) p(y2|xi)
…
xi yj
p(yj|xi)
The input alphabet
The output alphabet
…
p(y1|xI)
p(yJ|xi)
X={x1,…,xI} Y={y1,…,yJ}
xI yJ
p(yJ|xI)
p yj jxi ¼ P Y ¼ yj jX ¼ xi , 0 p yj jxi 1, ð4:1Þ
where i 2 {0,1, . . ., I 1}, j 2 {0,1, . . ., J 1}, while I and J denote the sizes of
input and output alphabets, respectively. The transition probability p(yj|xi) repre-
sents the conditional probability that Y ¼ yj for given input X ¼ xi.
One of the most important characteristics of the transmission channel is the
information capacity, which is obtained by maximization of mutual information I
(X,Y) over all possible input distributions:
In the above equation, H(X) represents the uncertainty about the channel input
before observing the channel output, also known as entropy, while H(X|Y) denotes
the conditional entropy or the amount of uncertainty remaining about the channel
input after the channel output has been received. (The log function from the above
equation relates to the base 2, and it will be like that throughout this chapter).
Therefore, the mutual information represents the amount of information (per sym-
bol) that is conveyed by the channel, which represents the uncertainty about the
channel input that is resolved by observing the channel output. The mutual infor-
mation can be interpreted by means of a Venn diagram [1–9] shown in Fig. 4.2a. The
left and right circles represent the entropy of the channel input and channel output,
respectively, while the mutual information is obtained as the intersection area of
these two circles. Another interpretation is illustrated in Fig. 4.2b [8]. The mutual
information, i.e., the information conveyed by the channel, is obtained as the output
information minus information lost in the channel.
4.1 Mutual Information, Channel Capacity, and Information Capacity Theorem 275
H(Y)
The amount of uncertainty remaining about
the channel input after the channel output
has been received
(a)
Unwanted information
(due to noise)
H(X|Y)
Output information
Input information The
H(Y)
H(X) Channel
Information lost
in the channel Mutual information
H(Y|X) H(Y)−H(Y|X)=I(X;Y)
(b)
Fig. 4.2 Interpretation of the mutual information by using (a) Venn diagrams and (b) the
approach due to Ingels
Since for M-ary input and M-ary output symmetric channel (MSC), we have that
p(yj|xi) ¼ Ps/(M 1) and p(yj|xj) ¼ 1 Ps, where Ps is symbol error probability, the
channel capacity, in bits/symbol, can be found as:
Ps
C ¼ log2 M þ ð1 Ps Þlog2 ð1 Ps Þ þ Ps log2 : ð4:4Þ
M1
H ðSÞ=T s C=T c ,
there exists a coding scheme for which the source output can be transmitted over the
channel and reconstructed with an arbitrary small probability of error. The param-
eter H(S)/Ts is related to the average information rate, while the parameter C/Tc is
related to the channel capacity per unit time.
For binary symmetric channel (N ¼ M ¼ 2), the inequality is reduced down to
R C, where R is the code rate. Since the proof of this theorem can be found in any
textbook on information theory, such as [5–8, 14], the proof of this theorem will be
omitted.
In this section we will discuss the channel capacity of continuous channels. Let
X ¼ [X1,X2, . . ., Xn] denote an n-dimensional multivariate, with a PDF p1(x1,x2, . . .,
xn), representing the channel input. The corresponding differential entropy is
defined by [2, 3, 5, 6]:
ð
1 ð
1
hðX1 ;X2 ;...;Xn Þ ¼ p1 ðx1 ;x2 ;...;xn Þlogp1 ðx1 ;x2 ;...;xn Þdx1 dx2 ...dxn
1 1
|fflfflfflfflffl{zfflfflfflfflffl}
n
¼ hlogp1 ðx1 ;x2 ;...;xn Þi,
ð4:5Þ
ð
1 ð
1
hðY 1 ;Y 2 ;...;Y m Þ ¼ p2 ðy1 ;y2 ;...;ym Þlogp1 ðy1 ;y2 ;...;ym Þdy1 dy2 ...dym
1 1
|fflfflfflfflffl{zfflfflfflfflffl}
m
¼ hlogp2 ðy1 ;y2 ;...;ym Þi:
ð4:6Þ
To account for the channel distortions and additive noise influence, we can
observe the corresponding conditional and joint PDFs:
Pðy1 < Y 1 < y1 þ dy1 ;...;ym < Y m < ym þ dym jX1 ¼ x1
;...;Xn ¼ xn Þ ¼ p y~j~x d~y
Pðy1 < Y 1 < y1 þ dy1 ;...;xn < Xn < xn þ dxn Þ ¼ p ~x ;~y d~x d~y
ð4:7Þ
Notice that various differential entropies h(X), h(Y), and h(Y|X) do not have
direct interpretation as far as the information processed in the channel is concerned,
as compared to their discrete counterparts, from previous subsection. Some authors,
such as Gallager in [7], prefer to define the mutual information directly by Eq. (4.8),
without considering the differential entropies at all. The mutual information,
however, has the theoretical meaning and represents the average information
processed in the channel (or amount of information conveyed by the channel).
The mutual information has the following important properties [5–8]: (1) It is
symmetric, I(X;Y) ¼ I(Y;X); (2) it is a nonnegative; (3) it is finite; (4) it is invariant
under linear transformation; and (5) it can be expressed in terms of the differential
278 4 Wireless and Optical Channels Capacities
entropy of channel output by I(X;Y) ¼ h(Y ) h(Y|X), and (6) it is related to the
channel input differential entropy by I(X;Y) ¼ h(X) h(X|Y ).
The information capacity can be obtained by maximization of Eq. (4.8) under all
possible input distributions, which is:
Let us now determine the mutual information of two random vectors, X ¼ [X1,
X2, . . ., Xn] and Y ¼ [Y1,Y2, . . ., Ym], which are normally distributed. Let Z ¼ [X;Y]
be the random vector describing the joint behavior. Without loss of generality, we
further assume that Xk ¼ 08k and Yk ¼ 08k. The corresponding PDF for X, Y, and Z
are, respectively, given as [6]:
1
p1 ðxÞ ¼ exp 0:5 A1 x; x ,
n=2
ð2π Þ ðdetA
Þ Ð
1=2
ð4:10Þ
A ¼ aij , aij ¼ xi xj p1 ðxÞdx,
1
p2 ð yÞ ¼ exp 0:5 B1 y; y ,
n=2
ð2π Þ ðdetB 1=2
Þ Ð ð4:11Þ
B ¼ bij , bij ¼ yi yj p2 ðyÞdy,
1
p3 ð z Þ ¼ ðnþmÞ=2
exp 0:5 C1 z; z ,
ð2π Þ ðdetCÐ Þ 1=2
ð4:12Þ
C ¼ cij , cij ¼ zi zj p3 ðzÞdz
where (,) denotes the dot product of two vectors. By substitution of Eqs. (4.10),
(4.11), and (4.12) into Eq. (4.8), we obtain [6]:
1 detAdetB
I ðX; YÞ ¼ log : ð4:13Þ
2 detC
The mutual information between two Gaussian random vectors can also be
expressed in terms of their correlation coefficients [6]:
1
I ðX; YÞ ¼ log 1 ρ21 . . . 1 ρ2l , l ¼ minðm; nÞ ð4:14Þ
2
ð
1
1X n
I ðX; YÞ ¼ hðYÞ hðYjXÞ ¼ hðYÞ hðZÞ ¼ hðYÞ log2πeσ 2zk : ð4:17Þ
2 k¼1
The information capacity, expressed in bits per channel use, is therefore obtained
by maximizing h(Y). Because the distribution maximizing the differential entropy
is Gaussian, the information capacity is obtained as:
!
1X n
1X n
1X n σ 2y
CðX; YÞ ¼ log2πeσ 2yk log2πeσ 2zk ¼ log 2k
2 k¼1 2 k¼1 2 k¼1 σ zk
! ð4:18Þ
1 Xn
σ xk þ σ z k
2 2
1 Xn
σ 2
¼ log ¼ log 1 þ x2 ,
2 k¼1 σ zk
2 2 k¼1 σz
where P is the average transmitted power and N0/2 is the noise power spectral
density (PSD). Eq. (4.20) represents the well-known information capacity theorem,
commonly referred to as the Shannon’s third theorem [17].
Since the Gaussian source has the maximum entropy clearly, it will maximize
the mutual information. Therefore, the equation above can be derived as follows.
Let the n-dimensional multivariate X ¼ [X1, . . ., Xn] represents the Gaussian
channel input with samples generated from zero-mean Gaussian distribution with
variance σ 2x : Let the n-dimensional multivariate Y ¼ [Y1, . . ., Yn] represents the
280 4 Wireless and Optical Channels Capacities
Gaussian channel output, with samples spaced 1/2 W apart. The channel is additive
with noise samples generated from zero-mean Gaussian distribution with variance
σ 2z : Let the PDFs of input and output be denoted by p1(x) and p2(y), respectively.
Finally, let the joint PDF of input and output of channel be denoted by p(x, y). The
maximum mutual information can be calculated from:
ð
pðx; yÞ
I ðX; YÞ ¼ pðx; yÞlog dxdy: ð4:21Þ
pðxÞPðyÞ
By following similar procedure to that used in Eqs. (4.15), (4.16), (4.17), (4.18),
and (4.19), we obtain the following expression for Gaussian channel capacity:
P
C ¼ Wlog 1 þ , N ¼ N0 W ð4:22Þ
N
where P is the average signal power and N is the average noise power.
Transmit
antenna Receive
h[i ] antenna
Power
amplifier LNA
Sequence y[i ] Est.
Mapper + I/Q
Encoder Decoder
I/Q modulator demodulator seq.
x[i ]
y[i ] 2
Channel g[i ]=|h[i ]|
h[i ] z[i ] estimator
Fig. 4.3 Typical wireless communication system together with an equivalent fading channel
model
side (CSIR), and (3) the CSI is available both at the transmitter and receiver sides
(full CSI). In CDI scenario, the PDF of g is known to both transmitter and receiver
sides. Determination of the capacity-achieving input distribution and corresponding
capacity of fading channels under CDI scenario for any distribution f(g), in closed
form, is still an open problem, except from specific fading channel models such as
i.i.d. Rayleigh fading channels and FSMCs. Other two scenarios, CSIR and full CSI
are discussed with more details below.
Two channel capacity definitions in CSIR scenario are of interest in the system
design: (1) Shannon capacity, also known as the ergodic capacity, which represents
the maximum data rate that can be sent over the channel with symbol error
probability Ps tending to zero, and (2) capacity with outage, which represents the
maximum data rate that can be transmitted over a channel with some outage
probability Poutage, defined as the probability that SNR falls below a given SNR
threshold value ρtsh corresponding to the maximum tolerable symbol error proba-
bility Ps. Clearly, in the outage, the transmission cannot be completed with negli-
gible symbol error probability. The capacity with outage corresponds to the highest
data rate can be transmitted over the fading channel reliably except when the fading
channel is in deep fade. To determine either the average symbol error probability or
outage probability in the presence of fading the distribution of SNR, f(ρ), is needed.
The average symbol error probability is then defined as:
ð
1
where Ps(ρ) is SNR-dependent expression for symbol error probability, for a given
modulation format. The outage probability is defined as:
ρðtsh
where ρtsh is the threshold SNR corresponding to the maximum tolerable symbol
error probability.
Shannon (Ergodic) Capacity
Under assumptions that the channel gain g[i] originates from the flat-fading,
average power gain is equal to one and receiver knows CSI (CSIR), we study the
channel capacity calculation. When fading is fast, with a certain decoding delay
requirement, we transmit the signal over the time duration that contains
N coherence time period Tc, namely, NTc, wherein N >> 1. In this scenario,
since the transmission is sufficiently long and the fading is fast, all possible channel
gain realizations g[i] come to the “picture,” and the channel capacity can be
calculated by averaging out channel capacities for different realizations. For n-th
coherence time period, we assume that channel gain is constant equal to g[n], so the
received SNR can be estimated as g½nρ. The corresponding channel capacity,
related to n-th gain realization, will be C½n ¼ Wlog2 ð1 þ g½nρÞ, where W is the
channel bandwidth. The Shannon (ergodic) channel capacity can be obtained by
averaging over N coherence time periods as follows:
1 XN
CN ¼ Wlog2 ð1 þ g½nρÞ: ð4:25Þ
N n¼1
ð
1
By applying the Jensen’s inequality [5], the following upper limit is obtained for
C:
C ¼ hWlog2 ð1 þ ρÞi Wlog2 ð1 þ hρiÞ ¼ Wlog2 1 þ ρ : ð4:26Þ
the received SNR ρ is constant for the duration of the transmission burst, then the
maximum possible transmission rate will be W log2(1 + ρ), with symbol error
probability tending to zero. Because the transmitter does not know the exact value
of SNR ρ, it will be forced to transmit at the fixed date rate corresponding to the
minimum tolerable SNR ρmin. The maximum data rate corresponding to SNR ρmin
will be C ¼ W log2(1 + ρmin). As indicated earlier, the probability of outage is
defined as Poutage ¼ P(ρ < ρmin). The average data rate, reliably transmitted over
many transmission bursts, can be defined as:
Coutage ¼ 1 Poutage Wlog2 ð1 þ ρmin Þ, ð4:27Þ
In full CSI scenario, both the transmitter and receiver have CSI available, and the
transmitter can adapt its transmission strategy based on this CSI. Depending on type
of fading channel, fast or slow varying, we can define either Shannon capacity or
capacity with outage.
Shannon Capacity
Let S denote the set of discrete memoryless wireless channels, and let p(s) denote
the probability that the channel is in state s 2 S. In other words, p(s) is the fraction of
the time for which the channel was in state s. The channel capacity, as defined by
Wolfowitz [14], of the time-varying channel, in full CSI scenario (when both
transmitter and receiver have the CSI available), is obtained as by averaging the
channel capacity when the channel is in state s, denoted as Cs, as follows:
X
C¼ Cs pðsÞ: ð4:28Þ
s2S
ð
1 ð
1
which is the same as in CSIR case. Therefore, the channel capacity does not
increase in full CSI case unless some form of the power adaptation is employed,
which is illustrated in Fig. 4.4.
The fading channel capacity, with power adaptation, is an optimization problem:
284 4 Wireless and Optical Channels Capacities
h[i ] z[i ]
Fig. 4.4 The wireless communication system employing the power adaptation
P( r) / P
1/rtsh
P (r) / P
1/r
r
rtsh
Fig. 4.5 The illustration of the optimum power allocation strategy, known as the water-filling
method
ð
1
1 þ PðρÞρ
Pg
C¼ max Wlog2 f ðρÞdρ, ρ¼ ð4:30Þ
Ð1 P N0W
PðρÞ: PðρÞf ðρÞdρ¼P 0
0
ð
1 ð
1
1 þ PðρÞρ
LðPðρÞÞ ¼ Wlog2 f ð ρ Þdρ μ PðρÞf ðρÞdρ, ð4:31Þ
P
0 0
ð
1
By finding the first derivative of Lagrangian with respect to P(ρ) and setting it to
zero, we obtain:
4.2 Capacity of Flat-Fading and Frequency-Selective Wireless Fading Channels 285
∂LðPðρÞÞ W= ln 2 ρ
¼ μ f ðρÞ ¼ 0: ð4:33Þ
∂PðρÞ 1 þ ρPðρÞ=P P
By solving for P(ρ) from (4.33), we obtain the optimum power allocation policy,
also known as the water-filling method, which is illustrated in Fig. 4.5, as follows:
Pð ρ Þ 1=ρtsh 1=ρ, ρ ρtsh
¼ ð4:34Þ
P 0 ρ < ρtsh
The amount of power allocated on a transmitter side for a given SNR ρ is equal to
1/ρtsh 1/ρ. In other words, the amount of allocated power is proportional to the
“water” filled between the bottom of the bowl (1/ρ) and the constant water line
(1/ρtsh). The intuition behind the water-filling is to take the advantage of realizations
when the channel conditions are good. Namely, when the channel conditions are
good and SNR ρ is large, we allocate higher power and transmit at higher date rate
over the channel. On the other hand, when the channel conditions deteriorate and ρ
becomes small, we allocate less power and reduce the date rate. Once the instanta-
neous channel SNR ρ falls below the threshold (cutoff) value, we do not transmit at
all. When the channel conditions are so bad, the reliable transmission is not possible,
and the average symbol error rate would be dominated by such transmissions.
After substituting Eq. (4.34) into (4.30), we obtain the following expression for
the channel capacity corresponding to the water-filling method:
ð
1
ρ
C¼ Wlog2 f ðρÞdρ: ð4:35Þ
ρtsh
ρtsh
After substitution of Eq. (4.34) into (4.32), we obtain the following equation that
needs to be solved numerically to determine the threshold SNR, ρtsh:
ð
1
1 1
f ðρÞdρ ¼ 1 ð4:36Þ
ρtsh ρ
ρtsh
Let us now consider the optimum allocation policy in discrete-time domain. The
channel model is similar to that from Fig. 4.3:
where n is the discrete-time index. The optimization problem can be formulated as:
286 4 Wireless and Optical Channels Capacities
Discrete-time, n
!
1 XN
P½njh½nj2 1 XN
P½ng½n
max log2 1 þ ¼ max log2 1 þ ,
P1 , P2 , ..., PN N N0 P1 , P2 , ..., PN N N0
n¼1 n¼1
ð4:38Þ
X
N
P½n P: ð4:39Þ
n¼1
and it is clearly the same allocation policy (the water-filling method) as given by
Eq. (4.34), which is illustrated in Fig. 4.6. The threshold SNR equation can be
obtained after substituting Eq. (4.40) into (4.39):
N
1 X 1 1 þ
¼1 ð4:41Þ
N n¼1 ρtsh ρ
which is identical to Eq. (4.34). The corresponding channel capacity for the
optimum power adaptation strategy in time domain will be:
4.2 Capacity of Flat-Fading and Frequency-Selective Wireless Fading Channels 287
Encoder ρ1 Decoder ρ1
h[i ] z[i ]
…
…
x[i ] y[i ]
…
…
Encoder ρN−1 Decoder ρN−1
ρ [i ]-based selection ρ [i ]-based selection
Encoder ρL Decoder ρL
System encoder System decoder
Fig. 4.7 The illustration of the multiplexed coding and decoding scheme
* + D E
Popt ðgÞ Pg P ðgÞ
C¼ Wlog2 1 þ P
¼ Wlog2 1 þ optP ρ ,
N0 g
|{z} g
ρ
þ
Popt ðgÞ 1 1
¼ ð4:43Þ
P ρtsh ρ
so that when the channel conditions are bad, we load higher power such that the
receiver sees the constant power. By substituting Eq. (4.44) into (4.32), we obtain:
ð
ðρ0 =ρÞf ðρÞdρ ¼ 1, ð4:45Þ
ρ0 ¼ 1=h1=ρi, ð4:46Þ
ρ0 =ρ, ρ ρtsh
PðρÞ=P ¼ : ð4:48Þ
0, ρ < ρtsh
ð
1
1
ρ0 ¼ 1=h1=ρiρtsh , h1=ρiρtsh ¼ f ðρÞdρ: ð4:49Þ
ρ
ρtsh
For the outage probability, defined as Poutage ¼ P(ρ < ρtsh), the corresponding
channel capacity will be:
!
1
CðPout Þ ¼ Wlog2 1þ Pðρ ρtsh Þ: ð4:50Þ
h1=ρiρtsh
z[i ]
Fig. 4.8 The illustration of the wireless communication system operating over the time-invariant
channel characterized by the transfer function H( f )
Two cases of interest are considered here: (1) time-invariant and (2) time-variant
channels.
We consider here the time-invariant channel, as shown in Fig. 4.8, and we assume
that a total transmit power cannot be larger than P. In full CSI scenario, the transfer
function H( f ) is known to both the transmitter and receiver. We first study the
block-fading assumption for H( f ) so that whole frequency band can be divided into
subchannels each of the bandwidth equal to W, wherein the transfer function is
constant for each block i, namely, H( f ) ¼ Hj, which is illustrated in Fig. 4.9.
Therefore, we decomposed the frequency-selective fading channel into a set of
the parallel AWGN channels with corresponding SNRs being |Hi|2Pi/(N0W ) on the
i-th channel, where Pi is the power allocated to the i-th channel in this parallel set of
subchannels, subject to the power constraint ∑i Pi P.
The capacity of this parallel set of channels is the sum of corresponding rates
associated with each channel, wherein the power is optimally allocated over all
subchannels:
X jH i j2 Pi X
C ¼ max Wlog2 ð1 þ Þ ¼ max Wlog2 ð1 þ ρi Þ, ð4:52Þ
P N0 W P
Pi : P P
i i
|fflfflffl{zfflfflffl} Pi :
i
Pi P
ρi
The optimum power allocation policy of the i-th subchannel is the water-filling:
Pi 1=ρtsh 1=ρi , ρi ρtsh
¼ , ð4:53Þ
P 0, ρi < ρtsh
and the threshold SNR is obtained as the solution of the following equation:
Pi / P
1/ρ tsh
Pi /P 1/ρ i
Fig. 4.10 The illustration of the water-filling in the frequency-selective block-fading channels
4.2 Capacity of Flat-Fading and Frequency-Selective Wireless Fading Channels 291
X 1
1 þ
¼ 1: ð4:54Þ
i
ρtsh ρi
When the transfer function H( f ) is continuous, the capacity for the same power
constraint P is similar to the case of the block-fading channel, but instead of
summation we need to perform the integration so that the corresponding channel
capacity expression is given by:
ð !
jH ðf Þj2 Pðf Þ
C¼ Ðmax Wlog2 1þ df : ð4:56Þ
Pðf Þ: Pðf Þdf P N0
The optimum power allocation strategy is, not surprising, again the water-filling:
2
Pð f Þ 1=ρtsh 1=ρðf Þ, ρðf Þ ρtsh jH ðf Þj P
¼ , ρð f Þ ¼ : ð4:57Þ
P 0, ρðf Þ < ρtsh N0W
After substituting Eq. (4.57) into (4.56), we obtain the following channel
capacity for the optimum power allocation case:
ð
ρð f Þ
C¼ Wlog2 df : ð4:58Þ
ρtsh
f : ρðf Þρtsh
z[i ]
Sequence
Mapper + x[i ] y[i ] Est.
Power
Encoder H(f,t) Decoder
I/Q modulator control seq.
Time-variant channel Channel
estimator
Fig. 4.11 The illustration of the wireless communication system operating over the time-varying
channel characterized by the time-variant transfer function H( f, t)
Channel bandwidth W
3 1 1 1 1 1 1
¼1þ þ þ ¼1þ þ þ ,
ρtsh ρ1 ρ2 ρ3 5 20 45
as follows: ρtsh ¼ 2.358 < ρi for very i. The corresponding channel capacity is given
by Eq. (4.55) as:
X
3 X
3
C¼ Wlog2 ð1 þ ρi Þ ¼ W log2 ð1 þ ρi Þ ¼ 16:846 kb=s:
i¼1 i¼1
Since the channels are mutually independent, the total channel capacity is just
equal to the sum of capacities on the individual narrowband flat-fading channels,
subject to the total average power constraint, averaged over both time and fre-
quency domains:
X ð
1
ρi
C¼ P
max Ci Pi , Ci ¼ Bc log2 f ðρi Þdρi , ð4:59Þ
fPi g: P P
i
ρtsh
i i
ρtsh
which requires the knowledge of the distribution functions of SNR for each
subchannel, namely, f(ρi).
When we fixed the average power per subchannel, the optimum power allocation
policy is the water-filling in the time domain. On the other hand, the optimum
power allocation strategy among subchannels is again the water-filling but now in
the frequency domain. Therefore, the optimum power allocation strategy for time-
varying channels is the two-dimensional water-filling, over both time and frequency
domains. The instantaneous SNR in the i-th subchannel at the k-th time interval is
ðN 0 Bc Þ:
given by ρi ½k ¼ jH i ½kj2 P=
The Shannon capacity assuming the perfect full CSI will be achieved by
optimizing the power allocation in both time domain, by fixing ρi[k] ¼ ρi, and
frequency domain over subchannel indices i as follows:
X ð
1
1 þ P i ð ρi Þ
C¼ P Ðmax Bc log2 f ðρi Þdρi , ð4:60Þ
Pi ðρi Þ: Pi ðρi Þf ðρi Þdρi P i
P
i 0
X ð
1
Pi ðρi Þf ðρi Þdρi ¼ P: ð4:61Þ
i
0
The threshold SNR can be obtained as the solution of the following equation:
294 4 Wireless and Optical Channels Capacities
X ð
1
After substituting Eq. (4.62) into (4.60), we obtain the following channel
capacity expression for the optimum two-dimensional adaptation strategy:
X ð
1
ρi
C¼ Bc log2 f ðρi Þdρi : ð4:64Þ
i
ρtsh
ρtsh
In this section, we will describe Markov and McMilan’s sources with memory [18]
and McMillan-Khinchin channel model with memory [19] and describe how to
determine the entropies of sources with memory and mutual information of chan-
nels with memory [20–22]. All this serves as a baseline in our later analysis of
optical channel capacity, in particular for fiber-optics communications [23–30].
The finite Markovian chain is commonly used model to describe both the sources
and channels with memory. The Markovian stochastic process with finite number of
states {S} ¼ {S1, . . ., Sn} is characterized by transition probabilities π ij of moving
from state Si to state Sj (i,j ¼ 1, . . ., n). The Markov chain is the sequence of states
with transitions governed by the following transition matrix:
2 3
π 11 π 12 . . . π 1n
6 π 21 π 22 . . . π 2n 7
Π ¼ π ij ¼ 6
4⋮ . . .7
5, ð4:65Þ
⋮ ⋱ ⋮
π n1 π n2 . . . π nn
where ∑j π ij ¼ 1.
Example Let us observe three-state Markov source shown in Fig. 4.13a. The
corresponding transition matrix is given by:
4.3 Capacity of Channels with Memory 295
0.6
S1 S1 0.75
1
(a) (b)
Fig. 4.13 Two three-state Markov chains: (a) irregular Markov chain and (b) regular Markov
chain
2 3
0:6 0:4 0
Π ¼ π ij ¼ 4 0 1 0 5:
0:3 0:7 0
As we see, the sum in any row is equal to one. From state S1 we can move to
either state S2 with probability 0.4 or to stay in state S1 with probability 0.6. Once
we enter the state S2, we stay there forever. Such a state is called absorbing, and
corresponding Markov chain is called absorbing Markov chain. The probability of
moving from state S3 to state S2 in two steps can be calculated as
ð2Þ
π 32 ¼ 0:3 0:4 þ 0:7 1 ¼ 0:82. Another way to calculate this probability is to
find the second power of transition matrix and then read out the probability of
desired transition:
2 3
h i 0:36 0:64 0
Π2 ¼ π ij ¼ ΠΠ ¼ 4 0
ð2Þ
1 0 5:
0:18 0:82 0
The probability of reaching all states from initial states after k-steps can be
determined by:
The Markov chain from the example above is non-ergodic. It is also interesting to
notice that transition matrix for this example has the following limit:
2 3
0 1 0
T ¼ lim Pk ¼ 4 0 1 0 5:
k!1
0 1 0
Example Let us now observe an example of regular Markov chain, which is shown
in Fig. 4.13b. The transition matrix Π, its fourth and fifth powers, and matrix Π
limit as k ! 1 are given, respectively, as:
2 3 2 3
0 0:25 0:75 0:5625 0:0625 0:3750
6 7 6 7
6 7 6 7
Π ¼ 60 0 1 7, Π4 ¼ 6 0:7500 0 0:2500 7,
4 5 4 5
1 0 0 0:2500 0:1875 0:5625
2 3 2 3
0:3750 0:1406 0:4844 0:4444 0:1112 0:4444
6 7 6 7
6 7 6 7
Π5 ¼ 6 0:2500 0:1875 0:5625 7, T ¼ lim Πk ¼ 6 0:4444 0:1112 0:4444 7:
4 5 k!1 4 5
0:5625 0:0625 0:3750 0:4444 0:1112 0:4444
We can see that fourth power has one zero entry, while the fifth power and all
higher powers do not have zero entries. Therefore, this Markov chain is both regular
and ergodic one. We can also notice that stationary transition matrix T has
identical rows.
It is evident from the example above that for regular Markov chain, the transition
matrix converges to stationary transition matrix T with all rows identical to each
other:
2 3
t1 t2 . . . tn
6 t1 t2 . . . tn 7
T ¼ lim Πk ¼ 6
4⋮
7: ð4:67Þ
k!1 ⋮ ⋱ ⋮5
t1 t2 . . . tn
so we can find stationary probabilities of states (or equivalently solve for elements
of T) from equations:
4.3 Capacity of Channels with Memory 297
t1 ¼ π 11 t1 þ π 21 t2 þ þ π n1 tn
t2 ¼ π 12 t1 þ π 22 t2 þ þ π n2 tn
⋮
tn ¼ π 1n t1 þ π 2n t2 þ þ π nn tn ð4:69Þ
X n
ti ¼ 1:
i¼1
For instance, for Markov chain from Fig. 4.13b, we can write that:
t1 ¼ t3 , t2 ¼ 0:25t1 , t3 ¼ 0:75t1 þ t2 , t1 þ t2 þ t3 ¼ 1,
ð1Þ
X
n
Hi ¼ π ij logπ ij : ð4:70Þ
j¼1
If the probability associated with state Si is equal to pi, we can obtain the entropy
of Markov source by averaging over entropies associated with all states. The
uncertainty of moving one step ahead becomes:
n o Xn X
n X
n
ð1Þ ð1Þ
H ðXÞ ¼ H ð1Þ ¼ E H i ¼ pi H i ¼ pi π ij logπ ij : ð4:71Þ
i¼1 i¼1 j¼1
In similar fashion, the entropy of Markov source for moving k-steps ahead from
initial states is given by:
n o Xn X
n X
n
ðkÞ ðkÞ ðk Þ ðk Þ
H ðk Þ ¼ E H i ¼ pi Hi ¼ pi π ij logπ ij : ð4:72Þ
i¼1
|{z} i¼1 j¼1
P
n
ðk Þ ðk Þ
π logπ
ij ij
j¼1
It can be shown that for ergodic Markov sources there is a limit defined as H(1)
¼ lim H ðkÞ =k: In order to prove this, we can use the following property, which
k!1
should be proved as a homework problem,
H ðkÞ
lim ¼ H ð1Þ ¼ H ðXÞ: ð4:75Þ
k!1 k
X
n X
n
H ðXÞ ¼ pi pij logpij
i¼1 j¼1
¼ 0:4444ð0:25log0:25 þ 0:75log0:75Þ 0:1111 1log1 0:4444 1log1
¼ 0:6605 bits:
McMillan’s description [18] of the discrete source with memory is more general
than that of Markov chain. In our case, we will pay attention to stationary sources.
Let S represent a finite source alphabet with corresponding letters {s1, s2, . . .,
sM} ¼ S. The source emits one symbol at the time instance tk. The transmitted
sequence can be represented as X ¼ {. . ., x1,x0,x1, . . .}, where xi 2 S. Among all
members of ensemble {X}, we are interested just in those having specified source
symbols at certain prespecified instances of time. All sequences with these proper-
ties create the so-called cylinder set.
Example Let specified location be defined by indices 1, 0, 3, and k,
with corresponding symbols at these locations equal to x1 ¼ s2, x0 ¼ s5, x3 ¼ s0,
xk ¼ sn 1. The corresponding cylinder set will be given as C1 ¼ {. . ., x2, s2, s5, x1,
x2, s0, . . ., xk ¼ sn 1,. . .}. Since we observe the stationary processes, the statistical
properties of cylinder will not change if we shift the cylinder for one-time unit in
either direction (either by T or by T1). For instance, the time-shifted C1 cylinder is
given by TC1 ¼ {. . ., x1, s2, s5, x2, x3, s0, . . ., xk+1 ¼ sn 1,. . .}.
The stationary property for arbitrary cylinder C can be expressed as:
PfTCg ¼ P T 1 C ¼ PfCg, ð4:76Þ
Hn
HðXÞ ¼ lim : ð4:78Þ
n!1 n
As we can see, the McMilan’s definition of entropy is consistent with Eq. (4.75),
which is applicable to stationary Makovian sources.
Let the input and output alphabets of the channel be finite and denoted by A and B,
respectively, while the channel input and output sequences are denoted by X and Y.
The noise behavior for memoryless channels is generally captured by a conditional
probability matrix P{bj|ak} for all bj 2 B and aj 2 A. On the other side, in channels
with finite memory (such as the optical channel), the transition probability is
dependent on the transmitted sequences up to the certain prior finite instance of
time. For instance, the transition matrix for channel described by Markov process
has the form P{Yk ¼ b|. . ., X1, X0, X1, . . .,Xk} ¼ P{Yk ¼ b|Xk}.
Let us consider a member x of input ensemble {X} ¼ {. . .,x2,x1,x0,x1,. . .} and
its corresponding channel output y from ensemble {Y} ¼ {. . .,y2,y1,y0,y1,. . .}.
Let X denote all possible input sequences and Y denote all possible output
sequences. By fixing a particular symbol at specific location, we can obtain the
cylinder. For instance, cylinder x4,1 is obtained by fixing symbol a1 to position x4, so
it is x4,1 ¼ . . ., x1,x0,x1,x2,x3,a1,x5,. . .. The output cylinder y1,2 is obtained by fixing
the output symbol b2 to position 1, namely, y1,2 ¼ . . ., y1,y0,b2, y2,y3,. . .. In order
to characterize the channel, we have to determine transition probability P(y1,2|x4,1),
which is probability that cylinder y1,2 was received if cylinder x4,1 was transmitted.
Therefore, for all possible input cylinders SA X, we have to determine the
probability that cylinder SB Y was received if SA was transmitted.
The channel is completely specified by the following: (1) input alphabet A,
(2) output alphabet B, and (3) transition probabilities P{SB|SA} ¼ vx for all SA 2 X
and SB 2 Y. Accordingly, the channel is specified by the triplet [A,vx,B]. If transition
probabilities are invariant with respect to time shift T, which means that
vTx(TS) ¼ vx(S), the channel is said to be stationary. If distribution of Yk depends
300 4 Wireless and Optical Channels Capacities
only on the statistical properties of sequence . . ., xk 1,xk, we say that the channel is
without anticipation. If, furthermore, the distribution of Yk depends only on xk m,
. . ., xk, we say that channel has finite memory of m units.
The source and channel may be described as a new source [C, ζ], where C is the
Cartesian product of input A and output B alphabets (C ¼ A B), while ζ is a
corresponding probability measure. The joint probability of symbol (x,y) 2 C,
where x 2 A and y 2 B, is obtained as the product of marginal and conditional
probabilities: P(x \ y) ¼ P{x}P{y|x}.
Let us further assume that both source and channel are stationary. Following the
description presented in [6, 19], it is useful to describe the concatenation of a
stationary source and a stationary channel as follows:
1. If the source [A, μ] (μ is the probability measure of the source alphabet) and the
channel [A, vx, B] are stationary, the product source [C, ζ] will also be stationary.
2. Each stationary source has an entropy, and therefore [A, μ], [B, η] (η is the
probability measure of the output alphabet), and [C, ζ] each have the finite
entropies.
3. These entropies can be determined for all n-term sequences x0,x1, . . ., xn 1
emitted by the source and transmitted over the channel as follows [19]:
1 1 1
Hn ðX; Y Þ ¼ Hn ðXÞ þ H n ðYjXÞ
n n n ð4:81Þ
1 1 1
Hn ðX; Y Þ ¼ Hn ðY Þ þ H n ðXjY Þ:
n n n
1 1
lim H n ðX; Y Þ ¼ H ðX; Y Þ lim H n ðXÞ ¼ H ðXÞ
n!1 n n!1 n
1 1
lim H n ðY Þ ¼ H ðY Þ lim Hn ðXjY Þ ¼ H ðXjY Þ ð4:82Þ
n!1 n n!1 n
1
lim H n ðYjXÞ ¼ H ðYjXÞ
n!1 n
The results of analysis in this section will be applied later in evaluation of the
information capacity of optical channel with memory. But, before that, we will
briefly describe the adopted model for signal propagation in single-mode optical
fibers, which will also be used in evaluation of channel capacity.
3
10 15 20 25 30 35 40
Signal-to-noise ratio, SNR [dB]
Fig. 4.15 Information capacities for linear channel model and different signal constellation sizes.
(64-star-QAM contains 8 rings with 8 points each, 256-star-QAM contains 16 rings with 16 points,
and 1024-star-QAM contains 16 rings with 64 points.) SNR is defined as Es/N0, where Es is the
symbol energy and N0 is the power spectral density
ð4:87Þ
The first term on the right side of Eq. (4.87) can be straightforwardly calculated
from conditional probability density functions (PDFs) P(y[j m, j + m]|s). We can
use the forward recursion of the multilevel BCJR algorithm, described in detail in
Chap. 9, to calculate log2P(yi|y[1, i 1]). We can now define forward metric
αj(s) ¼ log{p(sj ¼ s,y[1,j])} ( j ¼ 1,2, . . ., n) and the branch metric γ j(s’,s) ¼ log[p
(sj ¼ s,yj,sj 1 ¼ s’)] as:
304 4 Wireless and Optical Channels Capacities
h 0 0 i
∗
αj ðsÞ ¼ max αj1 s þ γ j s ; s log2 M ,
s0 h i ð4:88Þ
0
γ j s ; s ¼ log p yj jx½j m; j þ m ,
2.0
1.8
1.6
QPSK
(disp. managed transmission):
m=1
1.4 m=0
QPSK
(SMF only, backpropagation):
m=1
1.2
m=0
N spans
D- D+ D- D+
Transmitter Receiver
Fig. 4.17 Dispersion map under study is composed of N spans of length L ¼ 120 km, consisting of
2L/3 km of D+ fiber followed by L/3 km of D fiber, with pre-compensation of 1600 ps/nm and
corresponding post-compensation. The fiber parameters are given in Table 4.1
4.4 Calculation of Information Capacity by the Forward Recursion of the BCJR. . . 305
N spans
SMF
Receiver
+
Transmitter
receiver-side
back-propagation
EDFA
(a)
I- channel
Q- channel
(b)
Fig. 4.18 (a) Dispersion map composed of SMF sections only with receiver-side digital
backpropagation and (b) transmitter configuration for two-dimensional signal constellations
where max*-operator was applied for all s 2 S (S denotes the set of states in the
trellis shown in Fig. 4.14). Information capacity is defined as:
where the maximization is performed over all possible input distributions. Since the
optical channel has memory, it is natural to assume that optimum input distribution
will also be the one with the memory. By considering the stationary input distribu-
tions in the form p(xi|xi 1,xi 2,. . .) ¼ p(xi|xi 1, xi 2, . . ., xi k), we can
determine the transition probabilities of corresponding Markov model that would
maximize the information rate by nonlinear numerical optimization [31, 32].
This method is applicable to both memoryless channels and for channels with
memory. For instance, we calculated the memoryless information capacities for
different signal constellation sizes and two types of QAM constellations (square-
QAM and star-QAM) by observing a linear channel model, and the results are
shown in Fig. 4.15. As we can see, the information capacity can be closely
approached even with a uniform information source if constellation size is suffi-
ciently large. It is interesting to notice that star-QAM outperforms the corresponding
square-QAM for low and medium signal-to-noise ratios (SNR), while square-QAM
outperforms star-QAM for high SNRs. The iterative polar quantization (IPQ)-based
306 4 Wireless and Optical Channels Capacities
IPM: Ltot=2000 km
5.0 M= 16 Rs =50 GS/s
M= 32
NF= 3 dB
M= 128
4.5
4.0
3.5
3.0
-6 -4 -2 0 2 4 6 8 10
Launch power, P [dBm]
Fig. 4.20 Information capacity per single polarization against launch power P for total transmis-
sion distance of Ltot ¼ 2000 km. EDFAs NF ¼ 3 dB
4.5 Information Capacity of Systems with Coherent Optical Detection 307
modulation format, introduced in [33, 34], also known iterative polar modulation
(IPM), significantly outperforms both square-QAM and star-QAM.
Fig. 4.21 Hybrid FSO-RF system model. S/P serial-to-parallel conversion, LD laser diode, ADC
A/D converter, P/S parallel-to-serial converter, APP a posteriori probability
308 4 Wireless and Optical Channels Capacities
symbol rate is 50 GS/s, while the launch power was set to 0 dBm. For transmission
distance of 5000 km, the i.i.d. information capacity is 2.72 bits/symbol (the
aggregate rate is 136 Gb/s per wavelength), for 2000 km it is 4.2 bits/symbol
(210 Gb/s), and for 1000 km the i.i.d. information capacity is 5.06 bits/symbol
(253 Gb/s per wavelength).
The information capacity as a function of launch power for fixed total transmis-
sion distance Ltot ¼ 2000 km and NF ¼ 3 dB, and dispersion map from Fig. 4.18a, is
shown in Fig. 4.20. As we see, the single-polarization channel capacity of C-
opt ¼ 5.16 bits/s/Hz over transmission distance to 2000 km can be achieved for
optimum launch power of Popt ¼ 2 dBm and M ¼ 128, which is very close to the
result reported in [30] where star-QAM of size 2048 and optimum dispersion map
based on Raman amplifiers were employed.
Regarding the channel capacity calculation for few-mode fiber (FMF)-based
communication systems, an interested reader is referred to [35].
In this section we describe the use of a hybrid FSO-RF system with adaptive
modulation and coding (AMC) as an efficient way to deal with strong atmospheric
turbulence. Adaptive modulation and coding [2, 46, 47] can enable robust and
spectrally efficient transmission over both α-μ (or generalized gamma) wireless
fading channel and FSO channel. To enable high-speed communication over
atmospheric turbulence channels, we describe a scheme in which an LDPC-coded
sequence is partially over FSO channel and partially over wireless channel. The
channel state information of both channels is forwarded to the transmitters by an
RF-feedback channel. The transmitters then adapt powers and rates so that total
channel capacity is maximized. The AMC concept has been initially introduced for
wireless communications [10, 48].
We first describe the hybrid system, wireless channel model, and FSO channel
model. The adaptive hybrid FSO-RF communication system, shown in Fig. 4.21,
consists of two parallel FSO and RF channels. The encoded data stream is partially
transmitted over FSO and partially over RF channel. Operating symbol rate of FSO
channel is commonly many times higher than that of RF channel. FSO channel
comprises an FSO transmitter, propagation path through the atmosphere, and an
FSO receiver. The optical transmitter includes a semiconductor laser of high launch
4.6 Hybrid Free-Space Optical (FSO)-RF Channel Capacity 309
power, adaptive mapper, and power control block. To reduce the system cost, the
direct modulation of laser diode is used.
The modulated beam is projected toward the distant receiver by using an
expanding telescope assembly. Along the propagation path through the atmosphere,
the light beam experiences absorption, scattering, and atmospheric turbulence,
which cause attenuation and random variations in amplitude and phase. At the
receiver side, an optical system collects the incoming light and focuses it onto a
detector, which generates an electrical current proportional to the incoming power.
The RF channel comprises adaptive RF mapper, RF power control, RF transmitter
(Tx), transmitting antenna, wireless propagation path, receiver antenna, and RF
receiver (Rx).
The RF channel estimates and FSO irradiance estimates are transmitted back to
transmitters using the same RF-feedback channel. Because the atmospheric turbu-
lence changes slowly, with correlation time ranging from 10 μs to 10 ms, this is a
plausible scenario for FSO channels with data rates in the order of Gb/s. Notice that
erbium-doped fiber amplifiers (EDFAs) cannot be used at all in this scenario
because the fluorescence time is too long (about 10 ms). The semiconductor optical
amplifiers (SOAs) should be used instead, if needed. The data rates and powers in
both channels are varied in accordance with channel conditions. The symbol rates
on both channels are kept fixed, while the signal constellation diagram sizes are
varied based on channel conditions. When FSO (RF) channel condition is favor-
able, larger constellation size is used; when FSO (RF) channel condition is poor,
smaller constellation size is used; and when the FSO (RF) channel signal-to-noise
ratio (SNR) falls below threshold, the signal is not transmitted at all. Both sub-
systems (FSO and RF) are designed to achieve the same target bit error probability
(Pb). The RF subsystem employs M-ary quadrature amplitude modulation
(MQAM), while FSO subsystem employs the M-ary pulse amplitude modulation
(MPAM). MPAM is selected for FSO subsystem because negative amplitude
signals cannot be transmitted over FSO channels with direct detection. These two
modulation formats are selected as an illustrative example; the proposed scheme,
however, is applicable to arbitrary multilevel modulations. The optimum variable-
power variable-rate policy, maximizing total channel capacity, is described in the
next subsection. In the rest of this section, we describe the wireless and the FSO
channel models. Both RF and FSO channels are modeled as block-fading channels,
because symbol durations in both channels are much shorter than the corresponding
coherence times. The duration of the block is proportional to the coherence time of
the channel, which is from 10 μs to 10 ms for FSO channel and from 10 ms to 1 s for
RF channels. We therefore assume the IID fading between the blocks.
The signal at the RF receiver antenna (see Fig. 4.21) denoted by sk can be written
as:
sk ¼ r k ejγk ck þ zk ð4:91Þ
where rk is the fading envelope for k-th transmission block and γ k is the random
phase shift occurred during signal transmission of the same block of symbols over a
310 4 Wireless and Optical Channels Capacities
where Γ(.) is the gamma function. In Eq. (4.92) μ > 0 denotes the inverse of the
normalized variance of r tα , while r^is a α-root mean value, and they are defined,
respectively, as:
2 qffiffiffiffiffiffiffiffiffiffi
μ ¼ r tα =Var r tα , r^ ¼
α
r tα : ð4:93Þ
yk ¼ Rik xk þ nk , ð4:94Þ
where xk is the k-th transmitted block, ik is the instantaneous intensity gain, yk is the
k-th received block of symbols, nk is the vector of additive white Gaussian noise
(AWGN) samples with a normal distribution N(0,σ2) representing the
transimpedance amplifier thermal noise, and R denotes the photodiode responsivity.
(Without the loss of generality in the rest of the paper, we will set R ¼ 1 A/W.) (All
signals in (4.94) are real valued.)
Several probability density functions (PDFs) have been proposed for the inten-
sity variations at the receiver side of an FSO link [50, 51]. For example, Al-Habash
et al. [50, 51] proposed a statistical model that factorizes the irradiance as the
product of two independent random processes each with a gamma PDF. It was
shown in [51] that predicted distribution matches very well the distributions
obtained from numerical propagation simulations and experiments, and as such is
adopted here. The PDF of the intensity fluctuation is given by [50]:
where ik (k 0) is the signal intensity, α’ and β’ are parameters of the PDF, and
Kα’-β’ is the modified Bessel function of the second kind of order α’-β’. The
4.6 Hybrid Free-Space Optical (FSO)-RF Channel Capacity 311
parameters α’ and β’ are related to the scintillation, and in the case of zero inner
scale, (l0 ¼ 0) (for plane waves) are given by [50, 51]:
0 1 0 1
α ¼ " # , β ¼ " # ð4:96Þ
0:49σ 2R 0:51σ 2R
exp 7=6 1 exp 5=6 1
ð1þ1:11σ12=5
R Þ ð1þ0:69σ12=5
R Þ
where k ¼ 2π/λ (λ is the wavelength), L denotes the propagation distance, and Cn2
is refractive index structure parameter. The Rytov variance is an excellent para-
meter to be used to describe the turbulence strength, because it takes the refractive
structure parameter, the propagation distance, and operating wavelength into
account. Weak fluctuations are associated with σ 2R < 1, the moderate with
σ 2R
1, the strong with σ 2R > 1, and the saturation regime is defined by σ 2
R ! 1 [51–53].
There are many parameters that can be varied at the transmitter side relative to the
FSO (RF) channel conditions including data rate, power, coding rate, and combi-
nations of different adaptation parameters. The transmitter power adaptation can be
used to compensate for SNRs variation due to atmospheric turbulence/fading, with
the aim to maintain a desired BER in both FSO and RF channels. The power
adaptation therefore “inverts” the FSO channel scintillation and fading in wireless
channel so that both FSO and RF channels behave similarly as an AWGN channel.
The FSO channel, upon channel inversion, appears
to the receiver as standard
AWGN channel with SNRFSO ¼ Γ0FSO = 1=i2t , where Γ0FSO ¼ EsFSO =N 0 is the
signal-to-noise ratio in the absence of scintillation, with EsFSO being the symbol
energy and N0/2 being the double-side power spectral density of AWGN related to
variance by σ 2 ¼ N0/2. Notice that this definition [36, 47, 51], commonly used in
wireless communications [10–13], is different from [51] where SNR is defined as
Po/σ, where 〈 it 〉 Po. The wireless fading channel, upon channel inversion,
appears to the receiver as standard AWGN channel with SNRRF ¼ Γ0RF = 1=h2 ,
where h is channel coefficient, Γ0RF ¼ EsRF =N 0 is the signal-to-noise ratio in the
absence of fading, with EsRF being the symbol energy, and N0/2 being the double-
side power spectral density of AWGN.
In the rest of this section, we derive the optimum power adaptation policy that
maximizes the total channel capacity [2, 35, 47]. We further derive the rate
312 4 Wireless and Optical Channels Capacities
adaptation policy but assuming that symbol rates in both channels are fixed and the
symbol rate in RF channel is much smaller than that in FSO channel. As an
illustrative example, we assume that MQAM is used in RF channel, while
MPAM is used in FSO channel and determines the spectral efficiency. MPAM is
selected because negative amplitude signals cannot be transmitted over FSO chan-
nels with direct detection. The MQAM is not power efficient for transmission over
FSO channel with direct detection because it requires the addition of DC bias to
convert negative amplitudes to positive ones, and as such is not considered here.
Notice that M-ary pulse-position modulation (MPPM) can also be used for trans-
mission over FSO channel. Because MPPM is highly spectrally inefficient, we
restrict our attention to MPAM instead.
Before we continue with the description of different adaptation policies, we have
to derive a target bit error probability equations Pb for MAPM and MQAM on an
AWGN channel. In MPAM the transmitted signal x takes values from the discrete
set X ¼ {0,d, . . ., (M 1)d} (M 2), where d is the Euclidean distance between
two neighboring points. If all signal constellation points are equiprobable, the
average signal energy is given by Es ¼ d2(M 1)(2 M 1)/6, and it is related to
the bit energy Eb by Es ¼ Eblog2M, so that signal-to-noise ratio per bit is defined by
SNRb ¼ Eb/N0 ¼ ES/(N0log2M ) ¼ d2(M 1)(2 M 1)/(6N0log2M ). Following the
derivation similar to that reported in [10], the following expression for bit error
probability of FSO channel has been derived in [35, 47]:
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi!
M1 3ΓMPAM
PMPAM ffi erfc 0
, ð4:98Þ
b
Mlog2 M 2ðM 1Þð2M 1Þ
The corresponding expressions for MQAM are the same as already provided in
[10]. In derivations that follow, we will assume that target bit error probabilities in
both channels are the same PMPAMb ¼ PMQAM
b ¼ Pb . The total spectral efficiency
R as the function of bit error probability Pb can be found as [35, 47]:
1
R¼ BFSO log2 1 þ K FSO Γ0FSO þ BRF log2 1 þ K RF Γ0RF , ð4:100Þ
2:19
where KFSO ¼ 1.85/ ln(5Pb) and KRF ¼ 1.5 / ln(5Pb). Because the total spectral
efficiency changes as the channel conditions in either channel change, the spectral
4.6 Hybrid Free-Space Optical (FSO)-RF Channel Capacity 313
where ΓFSO ðik Þ ¼ i2k Γ0FSO and ΓRF ðhÞ ¼ h2 Γ0RF . To derive the optimum power
adaptation policy, subject to PFSO(ik) + PRF(h) P, we have to define the
corresponding Lagrangian, differentiate it with respect to PFSO(ik) and PRF(h),
and set corresponding derivatives to be equal to zero. The optimum power adapta-
tion policy is obtained as the result of this derivation [35, 47]:
8
K FSO PFSO ðik Þ <
1 1
, ΓFSO Γtsh
¼ Γtsh ΓFSO , ΓFSO ¼ Γ0FSO i2k
P :
8 0, Γ FSO
< Γ tsh
ð4:102Þ
K RF PRF ðhÞ < 1 1
RF , ΓRF Γtsh
¼ Γtsh Γ , Γ ¼ Γ0 h
RF RF 2
P :
0, ΓRF < Γtsh
where Γtsh is the threshold SNR, which is common to both channels. With this
adaptation policy, more power and higher data rates are transmitted when the FSO
(RF) channel conditions are good, less power and lower data rates are transmitted
when FSO (RF) channel is bad, and nothing is transmitted when the SNR falls
below the threshold Γtsh. The optimum threshold Γtsh can be obtained numerically
by solving the following equation [35, 47]:
ð
1
1 1
f ðik Þdik
pffiffiffiffiffiffiffiffiffiffiffiffiffiffi K FSO Γtsh K FSO Γ0FSO i2k
Γtsh =Γ0FSO
! ð4:103Þ
ð
1
1 1
þb f ðhÞdh ¼ 1
pffiffiffiffiffiffiffiffiffiffiffiffi
ffi K RF Γtsh K RF Γ0RF h2
Γtsh =Γ0
RF
where b ¼ BRF/BFSO, f(it) is the PDF of FSO irradiance ik given by Eq. (4.95) and p
(h) is the PDF of RF channel coefficient h given by Eq. (4.92). The optimum
spectral efficiency, defined as data rate R over channel bandwidth B, can be
evaluated by substituting Eq. (4.102) into Eq. (4.101) to obtain [35, 47]:
314 4 Wireless and Optical Channels Capacities
-3
Pb=10 :
Variable-rate variable-power -3
Channel inversion Pb=10 :
Truncated channel inversion Variable-rate variable-power
-6
Pb=10 : Channel inversion
Truncated channel inversion
Variable-rate variable-power -6
Channel inversion Pb=10 :
Truncated channel inversion Variable-rate variable-power
-9
Pb=10 : Channel inversion
Truncated channel inversion
Variable-rate variable-power -9
Channel inversion Pb=10 :
Spectral efficiency, R/B [bits/s/Hz]
4
Variable-rate variable-power
2
σR=2.0
2
1
1
σR=0.2
0
10 15 20 25 10 15 20 25
Signal-to-noise ratio, Es/N0 [dB] Signal-to-noise ratio, Es/N0 [dB]
(a) (b)
Fig. 4.22 Spectral efficiencies of FSO system against symbol SNR for different target bit
probabilities of error: (a) in weak turbulence regime and (b) in strong turbulence regime
1ð FSO 2
R 1 Γ i
¼ log2 0 k f ðik Þdik
B 2:19pffiffiffiffiffiffiffiffiffiffiffiffiffiffi Γtsh
Γtsh =Γ0FSO
ð
1 RF 2 ð4:104Þ
Γ h
þb log2 0 f ðhÞdh ½bits=s=Hz:
pffiffiffiffiffiffiffiffiffiffiffiffiffi Γtsh
Γtsh =Γ0RF
-3
-3 Pb=10 :
Pb=10 :
Variable-rate variable-power
Variable-rate variable-power
Truncated channel inversion
Truncated channel inversion -6
-6
Pb=10 :
Pb=10 :
Variable-rate variable-power Variable-rate variable-power
Truncated channel inversion Truncated channel inversion
-9
-9
Pb=10 : 4 Pb=10 :
2
2
1
1
σR=0.2; α=3, μ=2 σR=2.0; α=3, μ=2
4 8 12 16 20 24 28 4 8 12 16 20 24 28
Signal-to-noise ratio, Es/N0 [dB] Signal-to-noise ratio, Es/N0 [dB]
(a) (b)
Fig. 4.23 Spectral efficiencies of hybrid FSO-RF system with α ¼ 3, μ ¼ 2 fading against symbol
SNR for different target bit probabilities of error (a) in weak turbulence regime and (b) in strong
turbulence regime
8
1
PFSO ðik Þ < 2 FSO 2 , ΓFSO Γtsh
¼ ik EΓtsh 1=ik
P :
8 0, ΓFSO < itsh
1 ð4:105Þ
PRF ðhÞ < 2 RF , ΓRF Γtsh
¼ h EΓtsh 1=h2
P :
0, ΓRF < Γtsh
where
FSO 1ð
RF ð
1
1 f ðik Þ 1 f ð hÞ
¼ di k , ¼ dh: ð4:106Þ
i2k Γtsh pffiffiffiffiffiffiffiffiffiffiffiffiffiffi i 2
k h 2
Γtsh p ffiffiffiffiffiffiffiffiffiffiffiffi
ffi h2
FSO
Γtsh =Γ0 RF
Γtsh =Γ0
The threshold Γtsh in Eq. (4.106) is obtained by maximizing the spectral effi-
ciency as given below [35, 47]:
316 4 Wireless and Optical Channels Capacities
-3
Pb=10 : -3
Pb=10 :
Variable-rate variable-power
Truncated channel inversion Variable-rate variable-power
-6 Truncated channel inversion
Pb=10 : -6
Pb=10 :
Variable-rate variable-power
Truncated channel inversion Variable-rate variable-power
-9 Truncated channel inversion
Pb=10 : -9
4 Pb=10 :
2
2
1
1
σR=0.2; α=2, μ=1 σR=2.0; α=2, μ=1
(Rayleigh) (Rayleigh)
0 0
5 10 15 20 25 5 10 15 20 25
Signal-to-noise ratio, Es/N0 [dB] Signal-to-noise ratio, Es/N0 [dB]
(a) (b)
Fig. 4.24 Spectral efficiencies of hybrid FSO-RF system with α ¼ 2, μ ¼ 1 (Rayleigh) fading
against symbol SNR for different target bit probabilities of error (a) in weak turbulence regime and
(b) in strong turbulence regime
8 0 1
< 1 qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1
R ¼ max BFSO log2 @1 þ K FSO Γ0FSO AP ik Γtsh =Γ FSO
Γtsh :2:19 FSO 0
1=i2k Γtsh
0 1 9
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi=
1
þBRF log2 @1 þ K RF Γ0RF A P h Γtsh =Γ0RF ,
2 RF
1=h Γtsh ;
ð4:107Þ
where
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ð
1
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ð
1
LDPC(100515,80412)
Channel inversion 5
4
4
Upper FSO bound
3 (without scintillation)
3
2
2
1
-6 1
Pb=10
0
0 5 10 15 20 25 5 10 15 20 25
Signal-to-noise ratio, Es/N0 [dB]
Signal-to-noise ratio, Es/N0 [dB]
(a) (b)
Fig. 4.25 Spectral efficiencies against symbol SNR for adaptive LDPC-coded modulation: (a)
FSO with RF feedback only and (b) hybrid FSO-RF system
In Fig. 4.22 we show the spectral efficiencies for FSO system only, which can be
achieved using the optimum power and rate adaptation, MPAM for different target
bit error probabilities, and both (a) weak turbulence regime (σ R ¼ 0.2, α’ ¼ 51.913,
β’ ¼ 49.113) and (b) strong turbulence regime (σ R ¼ 2, α’ ¼ 4.3407, β’ ¼ 1.3088).
For example, the spectral efficiency R/B of 2 bits/s/Hz at Pb ¼ 109 is achieved for
symbol SNR of 23.3 dB in weak turbulence regime and 26.2 dB in strong turbu-
lence regime. In the same figure, we report the spectral efficiencies that can be
achieved by both channel inversion (Γtsh ¼ 0) and truncated channel inversion
(Γtsh > 0). In the weak turbulence regime (see Fig. 4.24a), even simple channel
inversion performs comparable to optimum adaptive-power adaptive-rate scheme.
However, in the strong turbulence regime (see Fig. 4.24b), this scheme faces
significant performance degradation. On the other hand, the truncated channel
inversion scheme in strong turbulence regime faces moderate performance degra-
dation, about 3.7 dB at Pb ¼ 109 for spectral efficiency of 2 bits/s/Hz. The
optimum adaptation policy for FSO channel at Pb ¼ 106 for spectral efficiency
4 bits/s/Hz provides moderate improvement of 3.3 dB in the weak turbulence
318 4 Wireless and Optical Channels Capacities
regime over nonadaptive scheme, while the improvement in the strong turbulence
regime is significant 31.7 dB.
In Fig. 4.23 we report the spectral efficiencies for hybrid FSO-RF system shown
in Fig. 4.21, with RF subsystem fading parameters α ¼ 3, μ ¼ 2 in both weak
turbulence regime (Fig. 4.23a) and strong turbulence regime (Fig. 4.23b). We
assume that FSO subsystem symbol rate is ten times larger than RF subsystem
data rate, that is, b ¼ 0.1. For spectral efficiency of 2 bits/s/Hz, the hybrid FSO-RF
system outperforms the FSO system by 3.39 dB at BER of 106 and 3.49 dB at BER
of 109. It is interesting to notice that even truncated channel inversion for hybrid
system outperforms the optimum adaptation of FSO system by 0.8 dB at BER of 10
9
and spectral efficiency of 2 bits/s/Hz.
In Fig. 4.24 we report the spectral efficiencies for hybrid FSO-RF system, with
RF subsystem fading parameters α ¼ 2, μ ¼ 1 (corresponding to Rayleigh fading) in
both weak turbulence regime (Fig. 4.24a) and strong turbulence regime
[Fig. 4.24b]. This case corresponds to the situation where there is no line of site
between transmit and receive antennas for RF subsystem. We again assume that
b ¼ 0.1. For spectral efficiency of 2 bits/s/Hz, the hybrid FSO-RF system out-
performs the FSO system by 3.01 dB at BER of 106 and 3.11 dB at BER of 109.
The truncated channel inversion for hybrid system performs comparable to the
optimum adaptation of FSO system.
In this section we described two different adaptive modulation scenarios for both
FSO system with RF feedback and hybrid FSO-RF system. In the next section, we
describe the adaptive coding based on coded modulation.
By using the trellis coded modulation (TCM) or cosset codes, we can separate
the encoding and modulation process (see [10, 48] for more details). However, to
keep the complexity of this approach reasonably low, the convolutional or block
codes should be simple and short. Those codes are in the principle of low rate and
are weak so that coding gains are moderate. For example, the adaptive coding
scheme based on TCM proposed in [48] is about 5 dB away from channel capacity.
Instead, in this paper we propose to implement adaptive coding based on LDPC-
coded modulation. For FSO system, the input data are LDPC encoded and written to
a buffer. Based on FSO channel irradiance, it, log2M(it) bits are taken at a time from
a buffer and used to select the corresponding point from MPAM signal constella-
tion. For hybrid FSO-RF system, the LDPC-encoded sequence is split between FSO
and RF subsystem (see Fig. 4.21). To facilitate the implementation, we assume that
symbol rates in both subsystems are fixed, while constellation sizes and emitted
powers are determined based on channel conditions in both channels using the
adaptation scenarios described in previous section. We further assume that symbol
rate in RF subsystem is at least ten times lower than that in FSO subsystem (e.g.,
1 giga symbol/s in FSO subsystem and 100 mega symbol/s in RF subsystem).
In Fig. 4.25a we show R/B performance of FSO system with adaptive LDPC-
coded MPAM for different adaptation scenarios. Given the fact that the channel
capacity of FSO channel under atmospheric turbulence is an open problem, we
show in the same figure an upper bound in the absence of atmospheric turbulence
from [54]. The coding gain over adaptive modulation at Pb ¼ 106 for R/B ¼ 4 bits/
s/Hz is 7.2 dB in both (weak and strong) turbulence regimes. Larger coding gains
4.7 Concluding Remarks 319
are expected at lower BERs and for higher spectral efficiencies. Further improve-
ments can be obtained by increasing the girth of LDPC codes and employing better
modulation formats. The increase in codeword length to 100,515 does not improve
R/B performance that much as shown in Fig. 4.25a. It is interesting to notice that by
employing adaptive coding, the communication under saturation regime is possible,
as shown in Fig. 4.25a. Moreover, for variable-rate variable-power scheme, there is
no degradation in saturation regime compared to strong turbulence regime. Overall
improvement from adaptive modulation and coding for R/B ¼ 4 bits/s/Hz at
Pb ¼ 106 over nonadaptive uncoded modulation ranges from 10.5 dB (3.3 dB
from adaptive modulation and 7.2 dB from coding) in the weak turbulence regime
to 38.9 dB in the strong turbulence regime (31.7 dB from adaptive modulation and
7.2 dB from coding). In Fig. 4.25b we show R/B performance of hybrid FSO-RF
system with adaptive LDPC-coded modulation (MPAM is used in FSO subsystem
and MQAM in RF subsystem) for different adaptation scenarios. The symbol rate in
FSO subsystem is set to be ten times larger than that in RF subsystem (b ¼ 0.1). For
spectral efficiency of 4 bits/s/Hz at BER of 106, the improvement of hybrid
FSO-RF system over FSO system is 5.25 dB in Rayleigh fading (α ¼ 2, μ ¼ 1),
5.51 dB in Nakagami m ¼ 2 fading (α ¼ 2, μ ¼ 2), and 5.63 dB in α ¼ 3, μ ¼ 2
fading. For spectral efficiency of 2 bits/s/Hz at the same BER, the improvement of
hybrid FSO-RF system over FSO system is 3.32 dB in Rayleigh fading, 3.72 dB in
Nakagami m ¼ 2 fading, and 3.86 dB in α ¼ 3, μ ¼ 2 fading.
This chapter has been devoted to wireless channel and optical channel capacities.
The chapter starts with definitions of mutual information and channel capacity for
discrete memoryless channels in Sect. 4.1.1, followed by the capacity of continuous
channels and information capacity theorem in Sect. 4.1.2. Regarding the wireless
channels capacity, described in Sect. 4.2, we describe how to calculate the channel
capacity of flat-fading channels in Sect. 4.2.1 and frequency-selective channels in
Sect. 4.2.2. We also discuss different optimum and suboptimum strategies to
achieve channel capacity including the water-filling method, multiplexed coding
and decoding, channel inversion, and truncated channel inversion. Depending on
what is known about the channel state information (CSI), different strategies are
described for channel capacity evaluation. When CSI is known on the receiver side
only (CSI), we describe Shannon (ergodic) channel capacity and capacity with
outage in Sect. 4.2.1.1. On the other hand, when CSI is available on both transmitter
and receiver sides (full CSI), we describe Shannon capacity, zero-outage capacity,
and outage capacity in Sect. 4.2.1.2. Regarding the frequency-selective fading
channel capacity, described in Sect. 4.2.2, we describe how to calculate the channel
capacity for both time-invariant channels (Sect. 4.2.2.1) and time-variant channels
(Sect. 4.2.2.2). Additionally, we describe the optimum power adaption strategies in
the same sections. For instance, the optimum power adaptation strategy for time-
variant fading channels is the two-dimensional water-filling method in both time
320 4 Wireless and Optical Channels Capacities
and frequency domains. Further, we explain how to model the channel with memory
and describe how to calculate its capacity in Sect. 4.3. The key topics of this section
include Markov sources (Sect. 4.3.1), McMillan sources (Sect. 4.3.2), together with
corresponding entropies, followed by the McMillan-Khinchin model for channel
capacity evaluation (Sect. 4.3.3). We then describe in Sect. 4.4 how to employ the
forward recursion of the BCJR algorithm to evaluate the information capacity. The
next topic, described in Sect. 4.5, is related to the evaluation of the information
capacity of fiber-optics communication channels with coherent optical detection.
Finally, in Sect. 4.6, we describe how to evaluate the capacity of hybrid FSO-RF
channels, with hybrid FSO-RF system model being described in Sect. 4.6.1 and
AMC for hybrid FSO-RF communication being described in Sect. 4.6.2.
References
1. Djordjevic IB (2013) Advanced coding for optical communication systems. In: Kaminow I,
Li T, Willner A (eds) Optical Fiber telecommunications VI. Elsevier/Academic, Amsterdam,
pp 221–296
2. Djordjevic IB, Ryan W, Vasic B (2010) Coding for optical channels. Springer, New York/
Dordrecht/Heidelberg/London
3. Cvijetic M, Djordjevic IB (2013) Advanced optical communication systems and networks.
Artech House, Norwood
4. Djordjevic IB (2016) On advanced FEC and coded modulation for ultra-high-speed optical
transmission. IEEE Communications Surveys and Tutorials 18(3):1920–1951. doi:10.1109/
COMST.2016.2536726
5. Cover TM, Thomas JA (1991) Elements of information theory. Wiley, New York
6. Reza FM (1961) An introduction to information theory. McGraw-Hill, New York
7. Gallager RG (1968) Information theory and reliable communication. Wiley, New York
8. Ingels FM (1971) Information and coding theory. Intext Educational Publishers, Scranton
9. Haykin S (2004) Communication systems. Wiley, New York
10. Goldsmith A (2005) Wireless communications. Cambridge University Press, Cambridge
11. Tse D, Viswanath P (2005) Fundamentals of wireless communication. Cambridge University
Press, Cambridge
12. Benedetto S, Biglieri E (1999) Principles of digital transmission with wireless applications.
Kluwer Academic/Plenum Publishers, New York
13. Biglieri E (2005) Coding for wireless channels. Springer, New York
14. Wolfowitz J (1964) Coding theorems of information theory, 2nd edn. Springer,
Berlin/New York
15. Duman TM, Ghrayeb A (2007) Coding for MIMO communication systems. Wiley, Chichester
16. Proakis JG (2001) Digital Communications. McGraw-Hill, Boston
17. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423
and 623–656
18. McMillan B (1952) The basic theorems of information theory. Ann Math Statistics
24:196–219
19. Khinchin AI (1957) Mathematical foundations of information theory. Dover Publications,
New York
20. Arnold D, Kavcic A, Loeliger HA, Vontobel PO, Zeng W (2003) Simulation-based computa-
tion of information rates: upper and lower bounds. In Proceedings of IEEE International
Symposium Information Theory (ISIT 2003). p 119
References 321
21. Arnold D, Loeliger HA (2001) On the information rate of binary-input channels with memory.
In: Proceedings 2001 International Conference Communications, Helsinki, June 11–14 2001.
pp 2692–2695
22. Pfitser HD, Soriaga JB, Siegel PH (2001) On the achievable information rates of finite state ISI
channels. In: Proceedings of Globecom 2001, San Antonio, Nov 25–29, 2001. pp 2992–2996
23. Djordjevic IB, Vasic B, Ivkovic M, Gabitov I (2005) Achievable information rates for high-
speed long-haul optical transmission. IEEE/OSA J Lightw Technol 23:3755–3763
24. Ivkovic M, Djordjevic IB, Vasic B (2007) Calculation of achievable information rates of long-
haul optical transmission systems using instanton approach. IEEE/OSA J Lightw Technol
25:1163–1168
25. Ivkovic M, Djordjevic I, Rajkovic P, Vasic B (2007) Pulse energy probability density
functions for long-haul optical fiber transmission systems by using instantons and edgeworth
expansion. IEEE Photon Technol Lett 19(20):1604–1606
26. Djordjevic IB, Alic N, Papen G, Radic S (2007) Determination of achievable information rates
(AIRs) of IM/DD systems and AIR loss due to chromatic dispersion and quantization. IEEE
Photon Technol Lett 19(1):12–14
27. Djordjevic IB, Minkov LL, Batshon HG (2008) Mitigation of linear and nonlinear impairments
in high-speed optical networks by using LDPC-coded turbo equalization. IEEE J Sel Areas
Comm, Optical Comm Netw 26(6):73–83
28. Djordjevic IB, Minkov LL, Xu L, Wang T (2009) Suppression of fiber nonlinearities and PMD
in coded-modulation schemes with coherent detection by using turbo equalization. IEEE/OSA
J Opt Comm Netw 1(6):555–564
29. Essiambre R-J, Foschini GJ, Kramer G, Winzer PJ (2008) Capacity limits of information
transport in fiber-optic networks. Phys Rev Lett 101:163901-1–163901-4
30. Essiambre R-J, Kramer G, Winzer PJ, Foschini GJ, Goebel B (2010) Capacity limits of optical
fiber networks. J Lightw Technol 28(4):662–701
31. Bertsekas DP (1999) Nonlinear programming, 2nd edn. Athena Scientific, Belmont
32. Chong EKP, Zak SH (2008) An introduction to optimization, 3rd edn. Wiley, New York
33. Djordjevic IB, Batshon HG, Lei Xu, Wang T (2010) Coded polarization-multiplexed iterative
polar modulation (PM-IPM) for beyond 400 Gb/s serial optical transmission. In: Proceedings
of OFC/NFOEC 2010, Paper No. OMK2, San Diego, March 21–25, 2010
34. Batshon HG, Djordjevic IB, Xu L, Wang T (2010) Iterative polar quantization based modu-
lation to achieve channel capacity in ultra-high-speed optical communication systems. IEEE
Photon J 2(4):593–599
35. Lin C, Djordjevic IB, Zou D (2015) Achievable information rates calculation for optical
OFDM transmission over few-mode fiber long-haul transmission systems. Opt Express 23
(13):16846–16856
36. Kahn JM, Ho K-P (2004) Spectral efficiency limits and modulation/detection techniques for
DWDM systems. IEEE Selected Topics Quantum Electron 10:259–272
37. Turitsyn KS, Derevyanko SA, Yurkevich IV, Turitsyn SK (2003) Information capacity of
optical fiber channels with zero average dispersion. Phys Rev Lett 91(20):203901
38. Tang J (2002) The channel capacity of a multispan DWDM system employing dispersive
nonlinear optical fibers and an ideal coherent optical receiver. J Lightwave Technol
20:1095–1101
39. Narimanov EE, Mitra P (2002) The channel capacity of a fiber optics communication system:
perturbation theory. J Lightwave Technol 20:530–537
40. Mecozzi A, Shtaif M (2001) On the capacity of intensity modulated systems using optical
amplifiers. IEEE Photon Technol Lett 13:1029–1031
41. Mitra PP, Stark JB (2001) Nonlinear limits to the information capacity of optical fiber
communications. Nature 411:1027–1030
42. Tang J (2001) The Shannon channel capacity of dispersion-free nonlinear optical fiber
transmission. J Lightwave Technol 19:1104–1109
322 4 Wireless and Optical Channels Capacities
43. Tang J (2001) The multispan effects of Kerr nonlinearity and amplifier noises on Shannon
channel capacity for a dispersion-free nonlinear optical fiber. J Lightwave Technol
19:1110–1115
44. Ho KP, Kahn JM (2002) Channel capacity of WDM systems using constant-intensity modu-
lation formats. In: Opt. Fiber Comm. Conf. (OFC ‘02), 2002, paper ThGG85
45. Kahn JM, Ho KP (2002) Ultimate spectral efficiency limits in DWDM systems. Optoelectron-
ics Commun. Conf., Yokohama, July 8–12, 2002
46. Djordjevic IB, Djordjevic GT (2009) On the communication over strong atmospheric turbu-
lence channels by adaptive modulation and coding. Opt Express 17(20):18250–18262
47. Djordjevic IB (2010) Adaptive modulation and coding for free-space optical channels. IEEE/
OSA J Opt Commun Netw 2(5):221–229
48. Goldsmith A, Chua S-G (1998) Adaptive coded modulation for fading channels. IEEE Trans
Comm 46:595–601
49. Yacoub MD (2007) The α-μ distribution: a physical fading model for the Stacy distribution.
IEEE Trans Vehic Techn 56(1):27–34
50. Al-Habash MA, Andrews LC, Phillips RL (2001) Mathematical model for the irradiance
probability density function of a laser beam propagating through turbulent media. Opt Eng
40:1554–1562
51. Andrews LC, Philips RL (2005) Laser beam propagation through random media. SPIE Press,
Bellingham
52. Djordjevic IB, Denic S, Anguita J, Vasic B, Neifeld MA (2008) LDPC-coded MIMO optical
communication over the atmospheric turbulence channel. IEEE J Lightw Technol 26
(5):478–487
53. Djordjevic IB (2012) Coding and modulation techniques for optical wireless channels. In:
Arnon S, Barry J, Karagiannidis G, Schober R, Uysal M (eds) Advanced optical wireless
communication systems. Cambridge University Press, Cambridge, pp 11–53
54. Farid AA, Hranilovic S (2007) Upper and lower bounds on the capacity of wireless optical
intensity channels. In: Proceedings of ISIT 2007, pp 2416–2420, Nice, June 24–29, 2007. Shah
AR, Hsu RCJ, Sayed AH, Jalali B (2005) Coherent optical MIMO (COMIMO). J Lightw
Technol 23(8):2410–2419
Chapter 5
Advanced Modulation and Multiplexing
Techniques
design (OSCD). The final section of the chapter is devoted to the nonuniform
signaling, in which different signal constellation points are transmitted with differ-
ent probabilities.
The key idea behind geometric representation of the signals can be summarized as
follows [1–7]: represent any set of M energy (complex-valued) signals {si(t)} as a
linear combination of N orthonormal basis functions {Φj}, where N M, as
follows:
X
N
0tT
si ðtÞ ¼ sij Φj ðtÞ, , ð5:1Þ
j¼1 i ¼ 1, 2, . . . , M
where the coefficients of expansion represent projections along the basis functions:
ðT
i ¼ 1, 2, . . . , M
sij ¼ Φj ðtÞjsi ðtÞ ¼ si ðtÞΦ∗
j ð t Þdt, : ð5:2Þ
j ¼ 1, 2, . . . , N
0
ðT (
1, i ¼ j
Φi ðtÞΦ∗
j ðtÞdt ¼ δij ¼ ð5:3Þ
0, i 6¼ j
0
where j-th component (coordinate) represents a projection along j-th basis function.
Inner (dot) product of signal vector with itself is defined by:
X
N
hsi jsi i ¼ ksi k2 ¼ s{i si ¼ sij 2 , i ¼ 1, 2, . . . , M ð5:5Þ
j¼1
The signal energy of the i-th symbol can be now expressed as:
ðT ðT "X
N
#"
X
N
#
2
Ei ¼ jsi ðtÞj dt ¼ sij Φj ðtÞ s∗ ∗
ik Φk ðtÞ dt
j¼1 k¼1
0 0
N X
X N ðT X
N ð5:6Þ
¼ sij s∗ ∗ sij 2 ¼ ksi k2 :
ik Φj ðtÞΦk ðtÞdt ¼
j¼1 k¼1 j¼1
0
|fflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl}
1, k¼j
Inner product of signals si(t) and sk(t) is related to the correlation coefficient
between them as:
ðT
{
hsi jsk i ¼ s∗
i ðtÞsk ðtÞdt ¼ si sk , ð5:7Þ
0
On the other hand, the angle between two signal vectors can be determined as:
!
1 s{i sk
θik ¼ cos : ð5:9Þ
ksi kksk k
Decision
boundaries d
s2
s1
s1 s2 s3 Φ1
D2 D1
-1 -1/2 0 1/2 1 Φ1
D1 D2 D3 d
D3 D4
Decision s3 s4
regions
(a) (b)
Fig. 5.1 Illustration of geometric representation of signals for: (a) N ¼ 1, M ¼ 3 and (b) N ¼ 2,
M¼4
Ð
1
s∗
i ðtÞsk ðtÞdt
s{i sk 1
cos θi, k ¼ ¼ 1=2 1 1=2 : ð5:10Þ
ksi kksk k Ð
1
2 Ð 2
jsi ðtÞj dt jsk ðtÞj dt
1 1
The arbitrary set of orthonormal basis functions {Φj} can be used in geometric
representation of signals. As an illustration, geometric representation of two sets of
signals, also known as signal constellations, is shown in Fig. 5.1. The
one-dimensional (for N ¼ 1) ternary signal constellation (for M ¼ 3) is shown in
Fig. 5.1a, while the two-dimensional (N ¼ 2) quaternary signal constellation, also
known as quaternary quadrature amplitude modulation (4-QAM) or quadriphase-
shift keying (QPSK), is shown in Fig. 5.1b.
To generate a given signal constellation point si, we can use the Eq. (5.4), com-
monly referred to as the synthesis equation; we can use the modulator (synthesizer)
shown in Fig. 5.2, in context of wireless communication systems. For binary
sources we need to use parallel-to-serial (P/S) convertor, whose output is used as
an address for the N-dimensional mapper, implemented as a look-up table (LUT). In
this case, every M-ary symbol carries m ¼ log2M bits.
5.1 Signal Space Theory in Wireless Communications 327
Φ1 Φ2 Φ3 … ΦN
Transmit
antenna
N-dimensional
modulator
PA
N DAC
si ( t ) = ∑ sij Φ j ( t )
j =1
Fig. 5.2 The configuration of the M-ary N-dimensional modulator (synthesizer) for wireless
communications. DAC digital-to-analog converter, PA power amplifier
Decision boundaries
Decision regions
Decision region
0 d 2d …. (M-2)d (M-1)d
Decision regions
Fig. 5.3 Signal constellation, decision regions, and decision boundaries for M-ary PAM for
optical communication systems with direct detection
Receive
antenna
|⋅|2 ∫(⋅)dt
− t=T
Selected
r(t) s1(t) Comparator: message
…
select the smallest mˆ = mk
LNA
|⋅|2 ∫(⋅)dt
− t=T
sM(t)
Fig. 5.4 Euclidean distance receiver for wireless communications. LNA: low-noise amplifier
Another decision strategy will be to use the Euclidean distance receiver [1], for
which the Euclidian distance square between received signal r(t) and m-th trans-
mitted signal sm(t) is defined as:
ðT
d2E ðr; sm Þ ¼ jr ðtÞ sm ðtÞj2 dt: ð5:12Þ
0
<H m 2 ðT <H m ð
T
2
d2E ðr; sm Þ > dE ðr; sn Þ , jr ðtÞ sm ðtÞj dt > jr ðtÞ sm ðtÞj2 dt, ð5:13Þ
Hn Hn
0 0
where we use Hm to denote the hypothesis that signal sm(t) was transmitted.
By squaring the bracket terms, assuming that signals are real-valued, and after
rearranging we obtain that:
ðT Tðs
>H m ð
Ts ðT
1 2 1
r ðtÞsm ðtÞdt jsm ðtÞj dt < r ðtÞsn ðtÞdt jsn ðtÞj2 dt: ð5:13Þ
2 Hn 2
0 0 0 0
|fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl} |fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl}
Em En
Receive
antenna
∫(⋅)dt
t=T
s1(t) − E1/2 Selected
r(t)
…
Comparator: message
2 3
r1 ðT
6 r2 7
r¼6 7
4 ⋮ 5, r n ¼ r ðtÞΦ∗
n ðtÞdt, ð5:14Þ
rN 0
X
N
s^m ¼ arg min kr sk k2 ¼ arg min r j skj 2 : ð5:15Þ
sk sk j¼1
The corresponding correlation receiver, based on Eq. (5.16), is shown in Fig. 5.6.
This scheme has lower complexity since there are N < M branches in detector/
demodulator, as shown in Fig. 5.6a.
An alternative receiver to scheme discussed above is based on so-called matched
filter-based demodulator/detector [1–7], as shown in Fig. 5.7. The output of n-th
matched filter having impulse response hn ðtÞ ¼ Φ∗ n ðT tÞ is given as:
ð
1 ð
1
Observation: r1 r2 r3 … rN
Samplers tk=kT
T T T T
∫ (⋅) dt ∫ (⋅) dt
0 0
∫ (⋅) dt
0
∫ (⋅) dt
0
Φ *1 Φ*2 Φ*3 … Φ*
Receive N
antenna
N-dim. demodulator:
correlation detector
Power splitter
LNA
(a)
Estimate m̂
Dot-product
calculator
Observation
r vector
(b)
Fig. 5.6 The reduced-complexity correlation receiver: (a) detector/demodulator and (b) signal
transmission decoder configurations
ð
1 ðT
r n ðT Þ ¼ r ðτÞhn ðT τÞdτ ¼ r ðτÞΦ∗
n ðτÞdτ, ð5:18Þ
1 0
which is the same form as the n-th output of detector in the correlation receiver.
Therefore, the correlation and matched filters-based receivers are equivalent to each
other.
5.1 Signal Space Theory in Wireless Communications 331
Observation: r1 r2 r3 … rN
Samplers tk=kT
h1 ( t ) = h2 ( t ) = h3 ( t ) = hN ( t ) =
Φ1* (T − t ) Φ*2 (T − t ) Φ*3 (T − t ) Φ*N (T − t )
Power splitter
where n is an integer. Clearly, the individual signals are mutually orthogonal since
each signal contains integer number of cycles within the symbol interval T and the
number of cycles between adjacent FSK signals differs by 1 cycle, so that the
principle orthogonality among symbols is satisfied:
ðT
sm ðtÞsn ðtÞdt ¼ δmn : ð5:20Þ
0
Since the FSK signals are mutually orthogonal, they can be used as basis
functions as follows:
332 5 Advanced Modulation and Multiplexing Techniques
1 0tT
Φm ðtÞ ¼ pffiffiffiffiffi sm ðtÞ, ð5:21Þ
Es m ¼ 1, 2, . . . , M
where Es is the symbol energy. The minimum distance between adjacent FSK
signals is given by dmin ¼ (2Es)1/2. The adjacent frequency spacing is 1/(2 T ), so
that the total bandwidth is given as B ¼ M/(2 T ). The corresponding bandwidth
efficiency, for data rate Rb, can be expressed as:
Rb 2log2 M
S¼ ¼ , ð5:22Þ
B M
Transmit
antenna
log2 L
PA
Sequence S/P bits Mapper Pulse shaper
of bits convertor (LUT) h(t)=p(t)
(a)
Receive
antenna
(b)
Fig. 5.8 The CT PAM configurations of: (a) modulator and (b) demodulator
in Fig. 5.8. At the output of serial-to-parallel (S/P) conversion block, the log2L bits
are used to select the point from PAM mapper, implemented as the look-up table
(LUT). The output of LUT can be represented as:
X
sδ ðt Þ ¼ n
sðnÞδðt nT Þ, ð5:24Þ
where δ(t) is Dirac delta function. The output of pulse shaper of impulse response
h(t) ¼ p(t) is obtained as a convolution of input a(t) and pulse shaper impulse
response:
P
sðtÞ ¼ sδ ðtÞ∗pðtÞ ¼ n sðnÞδðt nT Þ∗pðtÞ
P ð5:25Þ
¼ n sðnÞpðt nT Þ,
which is the same form as one given by Eq. (5.23). The continuous-time correlation
PAM demodulator/detector is shown in Fig. 5.8b.
The output of the correlator, which presents the projection along the basis
function p(t), is used in Euclidean distance receiver to determine the closest
amplitude level Ai from the signal constellation set. For additive channel model,
where the received signal r(t) ¼ s(t) + z(t), where z(t) is additive white Gaussian
noise, the output of correlator can be written as:
334 5 Advanced Modulation and Multiplexing Techniques
ð
1
log2 L
Sequence bits DT pulse
S/P Mapper
of bits convertor (LUT) ↑U shaper DAC
h(n)=p(nΔT)
U=T / ΔT
(a)
r(t)=sm(t)+z(t) r(n ΔT) Matched y(n ΔT) y(kT) Decision log2 L bits
ADC Filter sˆ = arg min { y ( kT ) − A }
m corresponding to ŝ
h(n)=p(−nΔT) n=k U Am
(b)
Fig. 5.9 The DT PAM configurations of: (a) modulator and (b) demodulator for wireless
communications
5.1 Signal Space Theory in Wireless Communications 335
X
sδ ðnΔT Þ ¼ k
sðkÞδðnΔT kT Þ: ð5:28Þ
The passband modulated signal s(t) can be described in terms of its in-phase and
in-quadrature (which is often referred to just as quadrature) components, in stan-
dard (or canonical) form [1, 2], as follows:
where sI(t) and sQ(t) represent in-phase and quadrature components, respectively,
while ωc denotes the carrier frequency [rad/s]. Because the sine and cosine signals
are orthogonal to each other in k-th symbol interval (kT t (k + 1)T ), the
corresponding signal space is two-dimensional. To facilitate further discussion, we
can use complex envelope (low-pass, LP) representation of the signal s(t) given by:
In frequency domain, we have the following relation between the power spectral
densities related to standard form (denoted as PSDs) and to complex envelope
representation (denoted as PSDLP):
1
PSDs ðωÞ ¼ ½PSDLP ðω ωc Þ þ PSDLP ðω þ ωc Þ: ð5:31Þ
4
where indices “S” and “LP” stand for “standard” and “low-pass” representations,
respectively. The standard form can also be represented by polar coordinates in a
form:
h i1=2
sðtÞ ¼ aðtÞ cos ½ωc t þ ϕðtÞ; aðtÞ ¼ s2I ðtÞ þ s2Q ðtÞ ,
ð5:32Þ
sQ ðtÞ
ϕðtÞ ¼ tan 1 :
sI ðtÞ
where p(t) is the pulse shape, while {Am| m ¼ 1,2,. . .,M} represents a set of possible
amplitudes. For M ¼ 2, we can set A1 ¼ 0 and A2 ¼ A. For M > 2 we can use the
PAM representation as follows Am ¼ (2 m1M )d/2, indicating that the distance
between adjacent amplitudes is d.
Similarly to signal, any linear time invariant (LTI) passband system can be
represented by its canonical impulse response:
where hI(t) and hQ(t) represent in-phase and quadrature components. The complex
envelope representation of LTI band-pass systems is given by:
The complex envelope of signal at the output of the band-pass system is obtained
by CT convolution of the complex forms:
1
~y ðtÞ ¼ h~ðtÞ∗~x ðtÞ: ð5:37Þ
2
5.2 Multilevel (Two-Dimensional) Modulation Schemes 337
Finally, the canonical form of the output of the LTI band-pass system can be
obtained as:
M-ary QAM is a 2-D generalization of M-ary PAM, with two orthogonal passband
basis functions given as:
rffiffiffiffiffi
2
ΦI ðtÞ ¼ cos ðωc tÞ, 0 t T
rTffiffiffiffis ffi ð5:39Þ
2
ΦQ ðt Þ ¼ sin ðωc tÞ, 0 t T
Ts
The m-th signal constellation point in signal (ΦI, ΦQ) space can be represented
by (Imdmin/2, Qmdmin/2), where dmin is the minimum Euclidean distance among
signal constellation points, which is related to the minimum energy signal constel-
1=2
lation point Emin by dmin =2 ¼ Emin : With (Im,Qm) we denoted the coordinates of
m-th signal constellation point. The transmitted signal in k-th symbol interval can
be represented as:
rffiffiffiffiffiffiffiffiffiffiffi rffiffiffiffiffiffiffiffiffiffiffi
2Emin 2Emin 0tT
sk ðtÞ ¼ I k cos ðωc tÞ Q sin ðωc tÞ, ð5:40Þ
Ts Ts k k ¼ 0, 1, 2, . . .
categorized into three broad categories: (i) square QAM in which the number of bits
per symbol is even (signal constellation size is a square number, M ¼ L2, where L is
a positive integer), (ii) cross-constellations in which the number of bits per symbol
is odd, and (iii) star-QAM constellations in which signal constellation points are
placed along concentric circles of different radiuses. The M-ary PSK can be
considered as a special case of star-QAM with constellation points placed uni-
formly on a single circle.
The square QAM constellations can be interpreted as being obtained as a
two-dimensional Cartesian product of 1D–PAM, described in Sect. 5.1.5, as
follows:
16-QAM 8 64-QAM
3
6
2 4
1 2
0 0
ΦQ
ΦQ
-2
-1
-4
-2
-6
-3 -8
-3 -2 -1 0 1 2 3 -8 -6 -4 -2 0 2 4 6 8
ΦI ΦI
(a) (b)
Fig. 5.10 Square QAM constellations: (a) 16-QAM, and (b) 64-QAM
6 32-QAM
Outer 4
constellation
2
(2m-3 points)
constellation
constellation
Inner square
(2m-3 points)
(2m-3 points)
0
ΦQ
constellation
Outer
Outer
(2m-1 -2
constellation
points) -4
Outer -6
constellation -6 -4 -2 0 2 4
(2m-3 points) ΦI
(a) (b)
Fig. 5.11 The cross signal constellation design: (a) designed derived from square constellations
and (b) 32-QAM
phase-shift keying (PSK) is just a special case of star-QAM having only one ring.
The transmitted M-ary PSK signal, which can be considered as a special case of
star-QAM, for the k-th symbol can be expressed as:
8 rffiffiffiffiffiffi
< 2E 2π
sm ðt Þ ¼ cos ωc t þ ðk 1Þ , 0 t T ; m ¼ 1, 2, . . . , M ð5:43Þ
: T M
0, otherwise
Q Q
011 011
010
001
010 001 r1
100 c2 c1 c0
111
100
111
101
c2 c 1 c 0
101
(a) (b)
Fig. 5.12 The constellation diagrams for: (a) 8-PSK, and (b) 8-star-QAM
where the pulse shaper impulse response p(t) (commonly rectangular pulse of unit
energy) is appropriately chosen to satisfy Nyquist criterion for zero-ISI, which is
Rp(lTs) ¼ 1 for l ¼ 0 and Rp(lTs) ¼ 0 for other l-values.
The outputs of pulse shapers, I(t) and Q(t), are used to modulate the in-phase and
quadrature carriers so that the modulated signal at the output of I/Q modulator can
be represented as:
5.2 Multilevel (Two-Dimensional) Modulation Schemes 341
∑ I δ ( t − lT )
l l
Pulse shaper I (t )
h(t)=p(t)
2 / T cos (ωct )
+ s (t )
Sequence S/P log2 M Mapper Oscillator
of bits converter bits (LUT) −
π/2
Pulse shaper
Q( t ) 2 / T sin (ωct )
∑ Q δ ( t − lT )
l l
h(t)=p(t)
I/Q modulator
(a)
rI ( t ) CT matched Ĩ (t )
r (t ) = s (t ) Ĩ ( lT ) Iˆl
filter
+ z (t ) 2 / T cos (ωc t ) h(t)=p(−t) t=lT Euclidean
Local
distance- Demapper
oscillator (LO) log2M bits
based (LUT) corresponding to ŝ
π/2
detector
− 2 / T sin (ωct ) ~ Qˆ l
CT matched Q (t ) Ĩ ( lT )
filter
rQ ( t ) h(t)=p(−t) t=lT
(b)
Fig. 5.13 The CT implementations of: (a) QAM modulator and (b) QAM demodulator, suitable
for wireless communication applications
rffiffiffi rffiffiffi
X 2 2
sðtÞ ¼ l T l
I pðt lT Þ cos ðωc tÞ Q pðt lT Þ sin ðωc tÞ, ð5:45Þ
T l
which is consistent with the Eq. (5.40). On receiver side, see Fig. 5.13b, the outputs
of matched filters represent projections along basis functions, which after sampling
can be written as:
342 5 Advanced Modulation and Multiplexing Techniques
∑ I δ ( t − lT )
l l
↑U
DT pulse I ( iΔT )
shaper
h(i)=p(iΔT)
log2M 2 / T cos ( Ω c i )
U=T/ΔT + s ( i ΔT )
Sequence S/P bits Mapper Direct digital DAC
converter (LUT) synthesizer (DDS)
−
2 / T sin ( Ωc i )
DT pulse Q ( i ΔT )
↑U shaper
∑ Q δ ( t − lT )
l l
h(i)=p(iΔT) I/Q modulator
U=T/ΔT
(a)
yI ( iΔT ) DT Ĩ ( i ΔT )
matched Ĩ ( lT )
filter Euclidean
h(i)=p(-iΔT) i =lU
2 / Ts cos ( Ωc i ) distance-based
Estimated
Direct digital detector
ADC synthesizer sequence
+
− 2 / Ts sin ( Ω ci ) ~
DT matched Q ( iΔT ) Ĩ ( lT ) Demapper
filter
yQ ( iΔT ) h(i)=p(-iΔT) i =lU
(b)
Fig. 5.14 The DT implementations of (a) QAM modulator and (b) QAM demodulator, for
wireless communication applications
P
I^ðlT s Þ ¼ m I m Rp ðmT lT Þ þ zI ðlT Þ,
ð5:46Þ
^ ðlT s Þ ¼ P Qm Rp ðmT lT Þ þ zQ ðlT Þ,
Q m
where zI and zQ represent the projection of noise process along in-phase and
quadrature basis functions, respectively. Since p(t) has rectangular shape described
above and in the absence of noise, we can perfectly recover in-phase and quadrature
coordinates of transmitted QAM constellation point, as Rp(mTs) ¼ 1 for m ¼ 0 and
Rp(mTs) ¼ 0 for m 6¼ 0. However, in presence of noise and channel distortions, we
use the Euclidean distance receiver and decide in favor of candidate constellation
^ ^
point closest to the received point I ðlT Þ; Q ðlT Þ .
The corresponding DT implementation of QAM modulator and demodulator is
shown in Fig. 5.14. The m ¼ log2M bits from S/P converter are used to select a point
from the QAM mapper. The outputs of mapper are upsampled for factor U ¼ T/ΔT,
where ΔT is the sampling period.
The outputs of pulse shapers can be obtained as DT convolution sums of inputs
and impulse responses h(i) ¼ p(iΔT) of corresponding pulse shapers, to obtain:
P
I ðiΔT Þ ¼ l I l pðiΔT lT Þ,
P ð5:47Þ
QðiΔT Þ ¼ l Ql pðiΔT kT Þ:
These outputs are used to modulate in-phase and quadrature DT carriers, gen-
erated by direct digital synthesizer. The output of DT I/Q modulator can be
represented as:
5.2 Multilevel (Two-Dimensional) Modulation Schemes 343
rffiffiffi rffiffiffi
X 2 2
sðiT Þ ¼ l T l
I pðiT lT Þ cos ðΩc nÞ Q pðiT lT Þ sin ðΩc iÞ, ð5:48Þ
T l
which is just a sampled version of waveform given by Eq. (5.45); after DAC.
Parameter Ωc is discrete frequency (expressed in radians per sample) related to the
carrier frequency ωc [rad/s] by Ωc ¼ ωcΔT, where ΔT is the sampling period. The
operation of the direct digital synthesizer (DDS) is described in Chap. 3. On
receiver side, after band-pass filtering (BPF) and ADC, discrete-time projections
along DT basis functions are obtained as follows:
P
I^ðiT Þ ¼ l I l Rp ðlT iT Þ þ zI ðiT Þ,
P ð5:49Þ
Q^ ðiT Þ ¼ l Ql Rp ðlT iT Þ þ zQ ðiT Þ,
where zI and zQ, similarly to CT case, represent the projections of noise process
along in-phase and quadrature basis functions, respectively. After re-sampling the
matched filters’ outputs at i ¼ lU, we can obtain the estimates of transmitted QAM
signal constellation point coordinates as follows:
P
I^ðlT Þ ¼ m I m Rp ðmT lT Þ þ zI ðlT Þ ¼ I l þ zI ðlT Þ,
P ð5:50Þ
^ ðlT Þ ¼
Q m Qm Rp ðmT lT Þ þ zQ ðlT Þ ¼ Ql þ zQ ðlT Þ,
where we assumed that the pulse shaper impulse response is rectangular pulse of
duration T. With Es we denoted symbol energy, Eb is the bit energy, while Tb
denotes the bit duration. If we use the null-to-null bandwidth definition,
corresponding to the main lobe in the PSD, we can establish relation B ¼ 2/T
between the bandwidth occupied by the modulated signal B and symbol duration T.
Since Rb ¼ 1/Tb, it follows that:
which means that it increases as the signal constellation size grows, but the
dependence is logarithmic. As an illustration, we can calculate that the bandwidth
344 5 Advanced Modulation and Multiplexing Techniques
There are several ways to generate M-PSK signals by using the following:
(i) concatenation (serial connection) of M E-O phase modulators (PMs), described
in Fig. 3.9 of Chap. 3, (ii) combination of E-O I/Q and phase modulators, and (iii)
single E-O I/Q modulator. The serial connection of PMs is shown in Fig. 5.15. After
serial-to-parallel conversion (or 1:m DEMUX), m output bits are properly mapped
into output signals as follows:
Vπ X 1
V i ðtÞ ¼ ci ðkÞpðt kT Þ; i ¼ 1, 2, , m: ð5:54Þ
2i1 k¼1
Sequence S/P b3 c3
convertor Mapper PS
of bits b2 c2
(1:m DEMUX) PS
b1 c1
PS
Pulse shaper V1(t), V2(t), V3(t), Vm(t),
Vπ Vπ/2 Vπ/4 Vπ/2m−1
CW
MZM PM PM PM PM
Laser
Sinusoidal
signal
Fig. 5.15 The serial configuration of multilevel PSK transmitter for optical communications. PM
E-O phase modulator, MZM Mach-Zehnder modulator, PS pulse shaper
5.2 Multilevel (Two-Dimensional) Modulation Schemes 345
where PT denotes the transmitted power, ωT is the carrier emitting frequency, while
ϕT,PT denotes the phase noise introduced by the CW transmitter laser. The
Eq. (5.55) also indicates that it is possible, at least in principle, to perform
summation of various signals described by Eq. (5.54) in electrical domain, while
employing only a single E-O PM.
The differential encoding is an efficient way to deal with the cycle slips, at the
expenses of SNR performance degradation. The differential PSK eliminates the
need for frequency locking of the local laser oscillator at the receiving side with the
transmitting laser, since it combines two basic operations at the transmitter: differ-
ential encoding and phase-shift keying. For instance, in differential BPSK
(DBPSK), to send bit 0 we advance in phase the current signal waveform by π
radians, while to send bit 1, we leave the phase unchanged. The receiver measures
the relative phase difference received during two successive bit intervals by using
either Mach-Zehnder interferometer, which is followed by either direct detection or
conventional coherent difference detection. The coherent optical detection scheme
is also suitable for compensation of linear channel impairments, while being
insensitive to cycle slips. The transmitted signal in this case can be represented as:
(
pffiffiffiffiffiffi pðtÞ, 0 t T b
E1 ðtÞ ¼ PT ejðωT tþϕT, PN Þ
pðtÞ, T b t 2T b
( ð5:56Þ
pffiffiffiffiffiffi pðtÞ, 0 t T b
E0 ðtÞ ¼ PT ejðωT tþϕT, PN Þ
pðtÞ, T b t 2T b
symbol ck unchanged with respect to previous bit and (ii) if the incoming binary
symbol bk is 0, we complement the symbol ck with respect to the previous bit. In
other words, we can write that ck ¼ bk ck1 , where the over-bar denotes the
complement operation to the summation per mod 2.
Another interpretation of M-PSK/DPSK, which requires the use of only one
phase modulator but more complicated electrical signal generation, can be
described as follows. In coherent detection scheme for M-ary PSK, the data phasor
ϕl2{0,2π/M,..,2π(M-1)/M} is sent in each l-th transmission interval. In both direct
detection and coherent difference detection for M-ary DPSK, the modulation is
differential, and the data phasor ϕl ¼ ϕl-1 + Δϕl is sent instead, where Δϕl2 {0,2π/
M,..,2π(M1)/M} is determined by the sequence of m ¼ log2M input bits using an
appropriate mapping rule.
b4 c4
PS
Sequence S/P b3 c3
convertor Mapper PS
of bits b2 c2
(1:m DEMUX) PS
b1 c1
PS
Pulse shaper V1(t), V2(t), V3(t),
Vπ/2 Vπ/4 VMZM(t)
Vπ
CW
MZM PM PM PM MZM
Laser
Sinusoidal
signal
Fig. 5.16 The operation principle of concatenated (serial) configuration of 16-star-QAM trans-
mitter for optical communications
5.2 Multilevel (Two-Dimensional) Modulation Schemes 347
amplitude that corresponds to outer circle of radius r1. The similar strategy can be
applied for arbitrary star-QAM signal constellation.
Let say signal constellation contains Mc concentric circles with Mp points per
circle. The number of required E-O PMs is mp ¼ log2Mp, while the number of
required bits to select a given circle is mc ¼ log2Mc. Only one MZM will be needed,
with driving signal having Mc amplitude levels. The number of bits per constella-
tion point is mc + mp, where the first mc bits are used to select a circle, while the
remaining mp bits are used to select a point within a given circle. The set of Mp
phase modulators, each driven with binary sequence, can be replaced with a single
one dealing with the Mc-level signal. This configuration corresponds to polar
modulator shown in Fig. 3.11, in Chap. 3. Alternatively, single I/Q modulator can
be used, but requires the mapper implemented as an LUT followed by DAC of
sufficient resolution.
For differential encoding, the mc bits that are used to select a given circle must
stay in natural mapping form, while the remaining mp bits can be differentially
encoded. The 16-star-QAM modulator can also be implemented by concatenating
one E-O I/Q modulator, one E-O PM, and one MZM. The E-O I/Q modulator is
used to generate QPSK constellation, while the E-O PM is used to introduce
additional phase shift of π/4, so that 8-PSK is generated. Finally, the MZM is
used to select one out of two 8PSK constellations. Notice that the use of more than
two amplitude levels in MZM degrades the overall OSNR.
The 16-ary star-QAM modulator shown in Fig. 5.16 can be generalized by using
mp of E-O PMs and one MZM. This modulator is able to generate star-QAM
constellation composed of two 2mp-ary PSK constellations. The output electric
field of this star-QAM modulator is given by:
!
pffiffiffiffiffiffi jðωT tþϕ Þ π Xmp
πV MZM ðtÞ
ET ðtÞ ¼ PT e T , PN
exp j V i ðtÞ cos , ð5:57Þ
V π i¼1 2Vπ
where Vi(t) (i ¼ 1,2,. . .,mp) is given by Eq. (5.54), while VMZM(t) is given by:
" #
2V π X
1
V MZM ðtÞ ¼ cos ðr 0 =r 1 Þ cmp þ1 ½kpðt kT Þ 1 : ð5:58Þ
π k
bm
Pulse shaper (PS)
…
Sequence S/P QAM
convertor b2 Mapper
of bits (1:m DEMUX)
b1 PS
VI(t) VQ(t)
CW
MZM I/Q Modulator
Laser
Sinusoidal
signal
Fig. 5.17 The operation principle of E-O I/Q modulator-based square-QAM transmitter suitable
for optical communications
one MZM per phase branch, (iv) parallel E-O I/Q modulators, (v) so-called tandem-
QAM transmitter, and so on. The configuration employing single E-O I/Q modu-
lator is shown in Fig. 5.17. The m ¼ log2M bits are used to select a QAM
constellation point stored in QAM mapper, implemented as an LUT. The
in-phase and quadrature driving signals are given as:
" #
Vπ X 1
1 π
V I ðtÞ ¼ 2 sin ðb1 ðkÞÞpðt kT Þ ,
π k¼1 2
" # ð5:59Þ
Vπ X
1
1
V Q ðt Þ ¼ 2 sin ðb2 ðkÞÞpðt kT Þ 1 :
π k¼1
It is evident, based on Eqs. (3.23) and (3.24), that polar modulator can be used
instead of E-O I/Q modulator to generate arbitrary square/cross constellation. The
polar modulator-based square QAM transmitter is shown in Fig. 5.18. The trans-
mitted electric field can be written as:
pffiffiffiffiffiffi jðωT tþϕ Þ πV MZM ðtÞ πV PM ðtÞ
ET ðtÞ ¼ PT e T , PN
cos exp j , ð5:60Þ
2Vπ Vπ
where with VMZM and VPM we denoted the MZM and PM driving signals, respec-
tively. However, the polar modulator-based square/cross transmitter requires
nonlinear transformation of QAM constellation points’ coordinates.
The square/cross-QAM transmitter employing improved E-O I/Q modulator is
shown in Fig. 5.19. In the same figure, the configuration of improved E-O I/Q
modulator is shown. The key difference with respect to conventional E-O I/Q
modulator is the introduction of additional E-O PM in in-phase branch. Notice
that, from communication theory point of view, this additional PM is redundant.
However, its introduction provides more flexibility in the sense that simpler driving
5.2 Multilevel (Two-Dimensional) Modulation Schemes 349
bm Pulse shaper
(PS)
…
Sequence S/P QAM
convertor b2 Mapper
of bits (1:m DEMUX)
b1 PS
VMZM(t) VPM(t)
CW
MZM MZM PM
Laser
Sinusoidal
signal
Fig. 5.18 The operation principle of an E-O polar modulator-based square-QAM transmitter for
optical communications
MZM PM
CW
MZM 3 dB V(MZM)Q(t) V(PM)Q(t) 3 dB
Laser
Fig. 5.19 The operation principle of improved I/Q modulator-based square-QAM transmitter. PS
pulse shaper. I/Q modulator is shown in Fig. 5.17. 3 dB: 3 dB-coupler
signals can be used to generate a desired QAM constellation. The MZM and E-O
PM driving signals in I-branch are given by:
" #
ðMZMÞ Vπ X1
1 π
VI ðtÞ ¼2 sin ðjb1 ðkÞjÞpðt kT Þ ,
π k¼1 2
ð5:61Þ
ðPMÞ Vπ X1
V I ðtÞ ¼ ð1 signðb1 ðkÞÞÞpðt kT Þ;
2 k¼1
while the MZM and PM driving signals in Q-branch are given by:
350 5 Advanced Modulation and Multiplexing Techniques
" #
ðMZMÞ Vπ X1
1 π
VQ ðtÞ ¼2 sin ðjb2 ðkÞjÞpðt kT Þ ,
π k¼1 2
ð5:62Þ
ðPMÞ Vπ X1
V Q ðtÞ ¼ ð1 signðb2 ðkÞÞÞpðt kT Þ:
2 k¼1
where the envelope R(t) and phase Ψ(t) are given, respectively, as:
1h 2
i1=2
RðtÞ ¼ RI ðtÞ þ R2Q ðtÞ þ 2RI ðtÞRQ ðtÞ cos ΨI ðtÞ ΨQ ðtÞ ,
2
ð5:64Þ
RI ðtÞ sin ΨI ðtÞ RQ ðtÞ sin ΨQ ðtÞ
ΨðtÞ ¼ tan 1 ,
RI ðtÞ cos ΨI ðtÞ RQ ðtÞ cos ΨQ ðtÞ
b1
PS V (1)Q(t)
α1
I/Q Modulator Attenuator
CW Power Power
…
Fig. 5.20 The operation principle of parallel I/Q modulator-based square-QAM transmitter.
Attenuation coefficient of the i-th branch is specified by αi ¼ (i1) 6 dB
5.3 Multicarrier Modulation 351
Sequence PS
S/P bm-1
convertor
of bits bm-2 PS
(1:m DEMUX) QAM
…
b1 Mapper
PS
V I(t) V Q(t) V 1(t), V 2(t),
Vπ V π/2
CW
MZM I/Q Modulator PM PM
Laser
Sinusoidal
signal
Fig. 5.21 The operation principle of tandem-QAM transmitter for optical communications
For instance, 16-QAM can be generated by summing up two QPSK signals, while
one of QPSK signals is being attenuated by 6 dB.
The tandem-QAM transmitter is shown in Fig. 5.21, based on [9]. The I/Q
modulator is used to generate the initial QAM constellation residing in the first
quadrant only. Two consecutive PM modulators are used to introduce the phase
shifts of π/2 and π, respectively. With this additional manipulation, we essentially
rotate the constellation diagram residing in the first quadrant for π/2 and π,
respectively, thus creating the resulting QAM constellation residing in all four
quadrants. The first m-2 bits are used to select a point from the initial signal
constellation resigning in the first quadrant. The bit bm-1 is used to control the
first PM so that, after the pulse shaper (PS), a phase shift of π/2 is introduced. The
bit bm is used to control the second PM so that after the PS a phase shift of π is
introduced. The resulting signal constellation has 2m constellation points located in
all four quadrants.
The key idea behind the multicarrier modulation is to divide the transmitted bit
stream into many lower speed substreams, which are typically orthogonal to each
other, and send these over many different subchannels [1–3, 5–7]. For wireless
communication applications, the number of substreams is chosen to insure that each
subchannel has a bandwidth smaller than the coherence bandwidth of the channel,
so that each subchannel will experience the flat fading. This is an efficient way to
deal with frequency selective fading effects. For fiber-optics communications, the
guard interval is chose on such a way that the delay spread due to dispersion effects
is smaller than the guard interval so that these dispersion effects can be successfully
compensated.
The discrete implementation of multicarrier modulation, well known as orthog-
onal frequency division multiplexing (OFDM) [1–3, 5–7, 13–15], can be
352 5 Advanced Modulation and Multiplexing Techniques
successfully used to deal with ISI introduced by various fading and dispersion
effects through the use of concept of cyclic prefix. As the name suggest, the OFDM
can be considered as a modulation technique, a multiplexing technique, or both.
This gives the OFDM flexibility that does not exist in conventional single-carrier
systems. The full details of OFDM can be found in Chap. 7; here we are concerned
with some fundamental concepts of multicarrier modulation. We describe two
versions of multicarrier systems: (i) multicarrier systems with nonoverlapping
subcarriers and (ii) multicarrier systems with overlapping subcarriers.
Rs ¼ N sc Rsc : ð5:65Þ
s(t)
…
Fig. 5.22 Multicarrier transmitter configuration for wireless communications (for real-valued
signals)
5.3 Multicarrier Modulation 353
CT matched Symbol
Band-pass
filter
filter ω1 t=kTsc demapper 1
h(t)=p(−t)
P/S converter
Local Reconstructed
…
oscillator (LO) ω1 Rates Rs/Nsc=Rsc
… data stream
…
at rate Rs
CT matched Symbol
Band-pass
filter
filter ω1 demapper Nsc
h(t)=p(−t)
t=kTsc
Local
oscillator ωNsc
Fig. 5.23 The multicarrier receiver for nonoverlapping subcarriers (for real-valued signals)
occupying the bandwidth BWsc. The total bandwidth of the multicarrier system with
nonoverlapping subcarriers will be then:
BW ¼ N sc ð1 þ β þ ΔÞRsc : ð5:66Þ
X
N sc
sðtÞ ¼ sn pðtÞ cos ð2πf n t þ φn Þ,
ð5:67Þ
n¼1
f n ¼ f 1 þ ðn 1ÞBW sc ðn ¼ 1; . . . ; N sc Þ
where sn is the symbol transmitted by the n-th subcarrier. After that the multicarrier
signal is amplified and transmitted with the help of corresponding antenna.
On receiver side, to reconstruct the n-th subcarrier, the band-pass filter of
bandwidth BWsc, centered at fn, is sufficient to reject the neighboring multicarrier
subchannels, as illustrated in Fig. 5.23. Following down-conversion to the
baseband, the rest of the receiver per subcarrier is the same as described earlier.
Tðsc
1 m n
cos 2π f 1 þ t þ φi cos 2π f 1 þ t þ φn dt
T sc T sc T sc
0
ð5:68Þ
Tðsc
1 mn 1
¼ cos 2π t þ φm φn dt þ . . . ffi δðm nÞ,
T sc T sc 2
0
354 5 Advanced Modulation and Multiplexing Techniques
CT matched Symbol
filter demapper 1
t=kTsc
h(t)=p(−t)
P/S converter
Local Reconstructed
…
oscillator (LO) ω1 Rates Rs/Nsc=Rsc
… data stream
…
at rate Rs
CT matched Symbol
filter demapper Nsc
h(t)=p(−t)
t=kTsc
Local
oscillator ωNsc
Fig. 5.24 Configuration of the multicarrier receiver with overlapping subcarriers (for real-valued
signals)
even for random phase shifts per subcarriers, providing that f1Tsc 1. Thanks to
this orthogonality of subcarriers, we can allow for partial overlap of neighboring
subcarriers, and we can choose the subcarrier frequencies as fn ¼ f1 + (n 1)
Rsc(n ¼ 1, . . . , Nsc). By assuming again that raised-cosine pulse shape is used on
subcarrier level, with rolloff factor β, the total occupied bandwidth will be:
Tðsc " #
X
N sc
s^n ¼ sm pðtÞ cos ð2πf m t þ φm Þ pðtÞ cos ð2πf n t þ φn Þdt ¼
m¼1
0
X
N sc
Tðsc
m n
¼ sm p2 ðtÞ cos 2π f 0 þ t þ ϕm cos 2π f 0 þ t þ φn dt
m¼1
T sc T sc
0
X
N sc
¼ s m δ ð m nÞ ¼ s n
m¼1
ð5:70Þ
and clearly, the n-th subcarrier symbol is properly detected. Even in the presence of
selective fading, the n-th subcarrier will see the flat fading with corresponding
channel coefficient H( fn), and the corresponding channel model is given by:
5.3 Multicarrier Modulation 355
r n ¼ H ðf n Þsn þ zn ; n ¼ 1, 2, , N sc ð5:71Þ
where zn is the AWGN sample with variance N0BWsc. Clearly, with multicarrier
modulation, by employing the orthogonality principle, we have successfully
decomposed the wireless channel into Nsc parallel subchannels.
For complex-valued signals, the multicarrier signal can be represented as:
8 8
9
=
>
> <n¼NXsc =21
n þ 0:5
< Re s exp j2π f c t , 0tT
sðt Þ ¼ : n¼N =2 nþN sc =2 T ; ð5:72Þ
>
> sc
:
0, otherwise
where fc is the carrier frequency and Ts is the symbol duration of the multicarrier
signal. Corresponding complex envelope representation is given by:
8
>
> X
n¼N sc =21 h ni
< snþNsc =2 exp j2π t , 0 t T
~s ðtÞ ¼ n¼N sc =2
T ð5:73Þ
>
>
:
0, otherwise
and represents the inverse discrete Fourier transform (IDFT) of 2-D (in-phase -
quadrature) sequence {sn}. Therefore, to efficiently implement multicarrier trans-
mitter and receiver, the fast Fourier transform (FFT) can be used, and this version of
multicarrier system is commonly referred to as OFDM [1–3, 5–7, 13–
15]. For additional details on OFDM as well as various applications an interested
reader is referred to Chap. 7, devoted to OFDM systems.
356 5 Advanced Modulation and Multiplexing Techniques
where ρtsh is the threshold SNR. After substitution of the Eq. (5.77) into (5.76), we
obtain:
X
ρn
C¼ BW sc log2 : ð5:78Þ
n: ρn >ρtsh
ρtsh
The key idea of coding with interleaving is to encode information bits into
codewords, interleave the coded bits over both time and frequency domains, and
then transmit the coded bits over different subcarriers such that the coded bits
within a codeword all experience independent flat fading. On such a way, the
channel code will be correcting random errors only, instead of both random and
burst errors introduced by flat fading. For additional details on coding with inter-
leaving, an interested reader is referred to Chap. 9.
Multiple transmitters can be used to either improve the performance though array
gain, related to improvement in SNR, and diversity gain, related to improving the
BER slope, or to increase data rate through multiplexing of independent data
streams. In multiple-input multiple-output (MIMO) systems, the transmitters and
receivers can exploit the knowledge about the channel to determine the rank of
so-called channel matrix H, denoted as RH, which is related to the number of
independent data streams that can be simultaneously transmitted. When identical
data stream is transmitted over multiple transmit antenna, the corresponding
scheme is a spatial diversity scheme. In spatial diversity scheme, M either transmit
or receive branches are properly combined in a linear combiner to improve the
SNR. This improvement in SNR is known as the array gain and can be defined as
the linear combiner average SNR ρ to single branch average SNR ρ ratio:
ρ
AG ¼ M, ð5:79Þ
ρ
and the maximum possible array gain is equal to M. The average symbol error
probability can be determined from SNR-dependent expression of symbol error
probability Ps(ρ) by averaging out over all possible values of ρ:
ð
1
where fρ ðρÞ is the PDF of the linear combiner SNR. The reduction in the symbol
error rate due to diversity can be described by more rapid slope in the corresponding
358 5 Advanced Modulation and Multiplexing Techniques
symbol error probability curve. For very high SNRs, the symbol error probability is
reversely proportional to ρ, so that the diversity gain can be defined as:
logPs ðρÞ
DG ¼ lim : ð5:81Þ
ρ!1 logρ
Coutage, p ðρÞ
MG ¼ lim , ð5:82Þ
ρ!1 log2 ρ
where Coutage, p(ρ) is the p percentage outage capacity at single-to-noise ratio ρ. The
p percentage capacity is defined as the transmission rate that can be supported in
(100-p)% of the channel realizations.
As an illustration, in Fig. 5.25 we provide the basic concept of wireless MIMO
communication, with the number of transmit antennas denoted as MTx and the
number of receive antennas denoted as MRx. The 2-D symbol transmitted on the m-
th transmit antennas is denoted by xm (m ¼ 1, 2,. . ., MTx), while the received symbol
on the n-th received antenna is denoted as yn. The channel coefficient relating the
received symbol on n-th receive antenna and transmitted symbol on the m-th
transmit antenna is denoted as hmn. By using this model, the output of the n-th
receive antenna can be represented as:
X
MTx
yn ¼ hnm xm þ zn , ð5:83Þ
m¼1
hM Rx 2 hM Rx 1
…
xM Tx hM RxM Tx yM Rx
5.4 MIMO Fundamentals 359
where zn is the zero-mean Gaussian noise sample with variance σ 2 ¼ N0B, with N0/2
being the double-sided power spectral density and B being the channel bandwidth.
A narrowband point-to-point wireless communication system composed of MTx
transmit and MRx receive antennas can be represented by the following discrete-
time model, which is matrix representation of Eq. (5.83):
y ¼ Hx þ z, ð5:84Þ
where x, y, and z represent the transmitted, received, and noise vectors defined as:
2 3 2 3 2 3
x1 y1 z1
6 x2 7 6 y2 7 6 z2 7
x¼6 7
4 . . . 5, y¼6 7
4 . . . 5, z¼6 7
4 . . . 5, ð5:85Þ
xMTx yMRx zMRx
The channel noise samples zn are complex Gaussian with zero mean and
covariance matrix σ 2IMRx, where σ 2 ¼ N0B. If the noise variance is normalized to
one that the transmitted power P can be normalized as follows P/σ 2 ¼ ρ, where ρ
denotes the average SNR per receiver antenna, assuming XMunity channel gain.
Tx
The total normalized transmitted power would be then m¼1
xi x∗
i ¼ ρ: We
use H ¼ ½hmn MTx MRx in Eq. (5.84) to denote the so-called channel matrix:
2 3
h11 h12 . . . h1MTx
6 h21 h22 . . . h2MTx 7
H¼6
4 ...
7: ð5:86Þ
... ... ... 5
hMRx 1 hMRx 2 . . . hMRx MTx
Transmit
antennas Receive
I/Q antennas
mod.
…
Complex
x =V †x y = U† y
…
…
…
symbols
x x y
y = Hx + z y
x2 y2
λ2 z2
…
…
xN yRH
λR zRH
H
pre-multiplying with rotation matrix V, and (ii) receiver shaping, in which the
receiver vector y, upon optical coherent detection, is multiplied by rotation matrix
U{. With these two operations, we effectively performed the following
manipulation:
H xþz
y~ ¼ U{ |{z} ¼ U{ UΣV{ V~
x þ U{ z ¼Σ~
x þ~z , ð5:87Þ
UΣV{ |{z}
~z
and successfully decomposed the optical MIMO optical channel into RH ¼ rank(H)
parallel single-input-single-output (SISO) channels. The equivalent wireless/opti-
cal channel model is shown in Fig. 5.27. Therefore, with the help of precoding on
transmitter side and receiver shaping on receiver side, we were able to decompose
the MIMO channel into RH independent parallel channels and therefore increase
data rate of the SISO system the RH times.
The readers interested in MIMO communications are referred to Chap. 8, for
additional details.
5.5 Polarization-Division Multiplexing (PDM) and 4-D Signaling 361
The electric field of plane linearly (PDM) polarized electromagnetic waves prop-
agating in the z-direction can be presented as follows:
where k ¼ 2π/λ is the wave propagation vector magnitude (with λ being the
operating wavelength), and δ is the relative phase difference between the two
orthogonal polarizations. In Eq. (5.88), Ex and Ey denoted x- (horizontal) and
y-(vertical) polarization states, respectively. By using the Jones vector representa-
tion of polarization wave [6, 7], we can represent the electric field as follows:
pffiffiffiffiffiffiffiffiffiffiffiffiffi
Ex ðtÞ 1p
EðtÞ ¼ ¼ E pffiffiffiffiffi jδ r ejðωtkzÞ , ð5:89Þ
Ey ðtÞ pr e
where pr is the power splitting ratio between states of polarizations (SOPs), while
the complex phasor term is omitted. Since x- and y-polarization states are orthog-
onal, they can be used as the additional basis functions. Given the fact that in-phase
and quadrature channels are orthogonal as well, we can conclude that the
corresponding space becomes four-dimensional (4-D). This enables us to use 4-D
constellations instead of 2-D ones (PSK and QAM). As compared to 2-D constel-
lations with the same symbol energy, 4-D constellations can increase the Euclidean
distance among neighboring constellation points and thus improve the SNR
[10, 11]. In addition, as shown in [12], 4-D signals constellations, when applied
to fiber-optics communications, are more robust to fiber nonlinearities.
The generic scheme suitable for wireless communication applications is pro-
vided in Fig. 5.25.
In this particular example, which employs dual-polarization transmit and receive
antennas, two independent data streams are combined properly together in
polarization-beam combiner. The configurations of RF transmitters corresponding
to x- and y-polarization states are identical to that form Fig. 5.13a, except from the
antenna element. Due to multipath effect, the initial orthogonality of polarization
states is no longer preserved on a receiver side, and we can use the channel
coefficients as shown in Fig. 5.28 to describe this depolarization effect. The
receiver now needs to compensate for cross polarization effects and then perform
demodulation in similar fashion as shown in Fig. 5.13b. The polarization-division
combiner could be just multiplexing two independent data stream or perform
polarization-time coding, in fashion similar to space-time coding, which is
described in Chap. 8.
The 4-D electro-optical modulator is shown in Fig. 5.29. The CW laser signal is
separated into two orthogonal polarizations by polarization beam splitter (PBS).
362 5 Advanced Modulation and Multiplexing Techniques
y-polarization y-pol.
Tx antenna hyy Rx antenna
hxy
Transmitted hyx
Estimated seq.
Tx antenna Rx antenna
(y-pol)
RF Tx
(y-pol.)
Transmitted
seq. (y-pol)
Each polarization branch contains either single I/Q or polar modulator. In polari-
zation-division multiplexing (PDM) applications, the QAM constellation coordi-
nates in x- and y-polarization branches are used, after pulse shaping, as in-phase
(I) and quadrature (Q) inputs of corresponding I/Q modulator. The independent
QAM streams are multiplexed together by a polarization beam combiner (PBC) .
The I/Q modulator can be replaced by polar modulators, as indicated in Fig. 5.27
(bottom). Alternatively, various 2-D modulators described in Sect. 5.2 can be used
in polarization branches. In 4-D modulation schemes, a single 4-D mapper,
implemented as LUT, is used to provide four coordinates for 4-D modulator. In
either case, the first two coordinates (after pulse shaping) are used as inputs to I/Q
modulator in x-polarization branch, while the other two coordinates (after pulse
shaping) are used as inputs to I/Q modulator in y-polarization branch. The
corresponding signal constellation point of i-th symbol interval can be represented
in a vector form as follows:
0 1 0 1 0 1
ReðEx, i Þ I x, i jsx, i j cos θx, i
B ImðEx, i Þ C B Qx, i C B jsx, i j sin θx, i C
si ¼ B
C B C B C
@ Re Ey, i A ¼ @ I y, i A ¼ @ sy, i cos θy, i A, ð5:90Þ
Im Ey, i Q y, i sy, i sin θy, i
where I and Q refer to the in-phase and quadrature components, respectively, while
x and y refer to the x- and the y-polarization states. In Eq. (5.90), |s| represents the
amplitude of the signal constellation point, while θ represents the corresponding
phase in a given polarization. The key differences between PDM and 4-D schemes
are outlined in Fig. 5.30. In PDM, see Fig. 5.30a, we employ two independent
mappers that drive two independent 2-D data streams through I/Q modulators. The
independent 2-D streams are multiplexed together by polarization beam combiner
and transmitted over optical fiber line. The same CW laser signal is used for both
5.5 Polarization-Division Multiplexing (PDM) and 4-D Signaling 363
Ix,k
3 dB MZM
MZM π/2
I/Q modulator to SMF
DFB PBS Qx,k PBC
MZM π/2
Qy,k
MZM
(a)
sx,k
vθx ,k
jθ x ,k
sx,k e
AM PM
to SMF
DFB PBS PBC
AM PM jθ y ,k
vθ y ,k sy,k e
sy,k
(b)
Fig. 5.29 The configuration of 4-D modulator suitable for polarization-division multiplexing
(PDM) and 4-D optical transmission: (a) Cartesian coordinates based modulator, and (b) polar
coordinates based modulator
polarizations, which are separated by polarization beam splitter prior the modula-
tion. On the other hand, in 4-D signaling only one 4-D mapper is used, which
provides four coordinates that are used as inputs to corresponding I/Q modulators,
as shown in Fig. 5.30b. It is evident from Fig. 5.30b that 4-D modulator is
composed of two I/Q modulators (one per polarization), one polarization-beam
splitter (PBS), and one polarization-beam combiner (PBC). As an illustration, the
16-point 4-D constellation is described by the set {1,1,1,1} [10]. At the
same time, the 32-point 4-D constellation contains 16 points mapped to different
combinations of vectors {0.5,0.5,0.5,0.5}, 4 points mapped to combinations
of {1,0,0,1}, 4 points mapped to combinations of {0,1,1,0}, and 8 points
mapped to the different combinations of {1,0,0,0}. Even though that 4-D schemes
are more popular in fiber-optics communications than wireless communications,
the scheme shown in Fig. 5.28 is also applicable in 4-D wireless communication-
based signaling.
364 5 Advanced Modulation and Multiplexing Techniques
Ix
2-D symbol
data stream Mapper (x pol.)
(x-pol.) Qx
I/Q
modulator
Transmit (x-pol.)
to SMF
laser PBS PBC
diode I/Q
modulator
(y-pol.)
Iy
2-D symbol
data stream Mapper (y pol.)
(y-pol.) Qy
(a)
Ix 4-D modulator
Qx
I/Q
modulator
4-D Transmit (x-pol.) to SMF
4-D symbol
laser PBS PBC
Mapper diode
data stream I/Q
(LUT) modulator
(y-pol.)
Iy
Qy
(b)
Fig. 5.30 The PDM vs. 4-D scheme: (a) PDM transmitter and (b) 4-D transmitter
It is also possible to transmit the same data stream in both polarizations, and we
refer to this scheme as polarization diversity scheme. The purpose of polarization
diversity scheme is to avoid the need for PMD compensation, at the expense of
deteriorating the OSNR sensitivity by 3 dB. The various PMD compensation
schemes will be described in Chap. 6. Another interesting interpretation of polar-
ization diversity modulation is to consider it as 2 2 multi-input multi-output
(MIMO) scheme and employ the MIMO signal processing, to deal with PMD,
chromatic dispersion, polarization-dependent loss (PDL), and various filtering
effects.
The spectral efficiency of 4-D modulation schemes is given by:
5.6 Spatial-Division Multiplexing and Multidimensional Signaling 365
where Rs is the symbol rate and M4-D is the 4-D signal constellation size. On the
other hand, the spectral efficiency of polarization PDM scheme is given as:
where factor 2 accounts for polarization states, while M2-D is the 2-D signal
constellation size used in each polarization. Signal constellation sizes for the
same aggregate data rate are related by M4D ¼ M22D :.
For instance, 16-ary 4-D constellation corresponds to PDM-QPSK. Interestingly
enough, in the presence of nonlinearities, 4-D modulation schemes of larger
constellation sizes show better robustness compared to PMD-QAM scheme of the
same aggregate rate, as demonstrated in [12].
The 4-D signaling can also be combined with subcarrier multiplexing as
described in [10]. The characteristics of dual-polarization receiver were described
in Chap. 3. Another alternative is to combine 4-D signaling with OFDM [11]. Also,
instead of subcarrier multiplexing, we can use fiber mode multiplexing, and
corresponding scheme can be called mode-multiplexed 4-D modulation. Finally,
the polarization diversity multiplexing can be used in combination with the polar-
ization-time (PT) coding, which is in particular suitable for use in combination with
OFDM [13]. The multidimensional coded-modulation (CM) studies [1, 14, 16, 17]
indicate that the simultaneous employment of multiple photon degrees of freedom
in an optical communication channel can enable substantial increase in bandwidth
capacity. Given the high potential of multidimensional signaling schemes, the next
section will be devoted to spatial-division multiplexing and multidimensional
signaling.
The SDM techniques with MTx transmit antennas and MRx receiver antennas can
achieve the spatial rates equal to min (MTx, MRx). Generic scheme for wireless
SDM scheme is shown in Fig. 5.31.
366 5 Advanced Modulation and Multiplexing Techniques
Rich-scattering
channel
1 h11 1
1 x1 x1 1
h1M Tx
(Serial-to-parallel converter)
(Parallel-to-serial converter)
2 2
Demultiplexer1:L
MultiplexerL:1
SDM detector
2 Channel x2 x2 Channel 2
Incoming encoder decoder
hM Rx1
…
…
…
data stream + +
…
…
Modulation MTx MRx Demodulation
L hM RxM Tx L
xMTx xMTx
where M is the signal constellation size (assuming that all independent data streams
employ the same constellation size). At the receiver side, each receive antenna
detects the complex linear combination of signal from all transmit antennas. The
purpose of SDM detector is to compensate for spatial interference and provide
accurate estimates of transmitted symbols. After SDM detection, demodulation
takes place, followed by the channel decoding. The L estimated data streams are
multiplexed together, and corresponding output is passed to outer channel decoder,
which delivers estimated information sequence to the end users. The SDM concept
is also applicable to both free-space (FSO) optical channels and fiber-optics com-
munications. Below we describe the hybrid multidimensional coded modulation
scheme, introduced in [16–21].
5.6 Spatial-Division Multiplexing and Multidimensional Signaling 367
where E is the electric field intensity, A is the vector potential, and c is the speed of
light. A is related to the magnetic field intensity H by H ¼ ∇ A and to the electric
field intensity by E ¼ c1∂A/∂t. The second term in Eq. (5.94) is identified as the
“OAM” due to the presence of the angular momentum operator r ∇. In general,
among various optical beams that can carry OAM, the Laguerre-Gauss (LG) vortex
beams/modes can easily be implemented. The field distribution of an LG beam
traveling along the z-axis can be expressed in cylindrical coordinates (r,ϕ,z)
(r denotes the radial distance from propagation axis, ϕ denotes the azimuthal
angle, and z denotes the propagation distance) as follows [28, 29]:
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffi jmj 2
2p! 1 r 2 2r
um, p ðr; ϕ; zÞ ¼ Lpm 2
π ðp þ jmjÞ!wðzÞ wðzÞ w ðzÞ ð5:95Þ
jkr 2 z
r2
w2 ðzÞ 2ðz2 þz2 Þ jð2pþjmjþ1Þtan 1 z jmϕ
e e R e zR e ,
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
where wðzÞ ¼ w0 1 þ ðz=zR Þ2 (w0 is the zero-order Gaussian radius at the waist),
zR ¼ πw20 =λ is the Rayleigh range (with λ being the wavelength), k ¼ 2π/λ is the
wave number, and Lmp() is the associated Laguerre polynomial, with p and
m representing the radial and angular mode numbers, respectively. It can be seen
from Eq. (5.95) that the m-th mode of the LG beam has the azimuthal angular
dependence given by term exp(jmϕ), where m is the azimuthal mode index. In
free space, for m ¼ 0, u(r,ϕ,z) becomes a zero-order Gaussian beam known as
TEM00 mode. For p ¼ 0, Lmp() ¼ 1 for all m’s, so that the intensity of an LG mode
is a ring of radius proportional to |m|1/2.
It can be shown that for fixed p, the following principle of orthogonality is
satisfied [22–26, 29]:
368 5 Advanced Modulation and Multiplexing Techniques
Ð
um, p jun, p ¼ u∗m, p ðr; ϕ; zÞun, p ðr; ϕ; zÞrdrdϕ
(Ð
um, p 2 rdrdϕ, n ¼ m ð5:96Þ
¼
0, n 6¼ m
where Φl(nT) define the basis functions, T is the symbol duration, and ΔT denotes
the sampling interval that is related to the symbol duration by ΔT ¼ T/U, with
U being the oversampling factor. The corresponding space described by Eq. (5.97)
is two L-dimensional. In addition, we can apply N orthogonal either OAM states or
other spatial modes and two polarization states for in multidimensional modulation.
Therefore, the corresponding signal-space is D ¼ 4 LN-dimensional. By increasing
the number of dimensions, we can also increase the aggregate data rate of the
system while ensuring reliable transmission at these ultra-high speeds using
capacity-approaching LDPC codes, described in Chap. 9.
The D-dimensional space, if compared to the conventional 2-D space, can
provide larger Euclidean distances between signal constellation points, resulting
in improved BER performance and better tolerance to fiber nonlinearities. We
should outline that modified orthogonal polynomials or any other set of orthogonal
complex basis functions can be used as well, such as Slepian sequences based one
[18–21]. The overall multidimensional transmitter configuration is depicted
in Fig. 5.32, while the corresponding multidimensional receiver in Fig. 5.33. The
D-dimensional modulator, whose configuration is shown in Fig. 5.32a, generates
the signal constellation points by:
X
D
si ¼ ϕi , d Φ d , ð5:98Þ
d¼1
where ϕi,d denotes the d-th coordinate (d ¼ 1,. . .,D) of the i-th signal constellation
point and the set {Φ1,. . .,ΦD} denotes the basis functions introduced above.
5.6 Spatial-Division Multiplexing and Multidimensional Signaling 369
Coordinates
from 1 to 4L
…
4LN-dim. mod.
4L-dimensional
modulator SDM fiber
DFB Power Spatial-division
…
laser splitter multiplexer
4L-dimensional
modulator
…
Coordinates
from 1 to 4L
(a)
Complex coordinates
ψI … ψL
Up-
↑ U U=T/ΔT ↑ U sampl.
…
DT pulse- DT pulse-
Coordinates shaping filter shaping filter
from 1 to 2L hM(n) =Ψ L(nΔT)
h1(n) = Ψ 1(nΔT)
…
2L-dimensional
modulator
From laser To SDM
PBS 4L-dim. mod. PBC 2L-dim.
diode multiplexer Re{} Im{}
2L-dimensional
modulator modulator
… DAC DAC
Coordinates to PBC
From PBS
from 1 to 2L I/Q MOD
(b) (c)
Fig. 5.32 The overall transmitter architecture of discrete-time energy-efficient hybrid D-dimen-
sional modulation scheme: (a) transmitter configuration, (b) four L-dimensional modulators, and
(c) two L-dimensional modulators. PBS(C): polarization beam splitter (combiner)
Thanks to the mutual orthogonality among the electric fields of OAM modes with
different integer OAM states, as given by Eq. (5.96), one can in principle super-
impose as many OAM modes as one wishes [24–26]. OAM state superposition
using diffractive elements enables implementation of OAM-based multiplexers as
an integral part of an FSO communication link. The simplest mathematical expres-
sion of an OAM mode and zero-order Gaussian beam with an incidence angle θ can
be written, respectively, as [25, 26]
…
scheme: (a) receiver, demultiplexer
(b) four L-dimensional
demodulators, and 4L-dimensional
(c) two L-dimensional demodulator
demodulator configurations
(a)
Estimated coordinates
from 1 to 2L
…
2L-dimensional
demodulator
Balanced coherent
optical detector
From SDM
PBS 4L-dimensional demodulator
demultiplexer Balanced coherent
optical detector
2L-dimensional
demodulator
…
Estimated coordinates
from 1 to 2L
(b)
Complex coordinate estimates
ψ’1 (mT) … ψ’L(mT)
Resampling:
m=n/U
Matched Matched
filter filter
Re{} +j Im{}
2L-dim.
ADC ADC
demod.
From PBS Balanced coherent
optical detector
(c)
Fig. 5.34 The phase pattern, experimental and analytical intensity distributions: (a, d, g) for
OAM state 1; (b, e, h) for OAM states 2 and 3; (c, f, i) for OAM states 4 and 4
Fig. 5.35 Experimental (top) and numerical (bottom) detection of OAM states from the
superimposed OAM modes: (a, e) OAM state 1 is detected using OAM state 1; (b, f) superpo-
sition of OAM states 4,4, is detected using OAM state 4; (c, g) superposition of OAM states
2,2,6,6 is detected using OAM state 2; (d, h) superposition of OAM states 2,2,6,6 is
detected using OAM state 6. Imperfections in experimental generation of OAM modes are
contributed to finite resolution of SLMs
Coordinate 1
…
Laser Power Power
E/O MOD CGH 2
diode splitter combiner
…
…
E/O MOD CGH N
Coordinate N
(a)
OAM demultiplexer
CGH* 1
…
Power CGH* 2
splitter
…
CGH* N
(b)
Fig. 5.36 SLM-based configurations of: (a) OAM N-dimensional modulator and multiplexer and
(b) OAM demultiplexer
We first describe the iterative polar modulation (IPM) based on iterative polar
quantization (IPQ) [42]. We can assume that, for an ASE noise dominated channel
model, the optimum information source is Gaussian with distribution:
2
1 I þ Q2
pðI; QÞ ¼ exp , ð5:101Þ
2πσ 2 2σ 2
Iterate the steps 1–2 until convergence. The limits of integration, which corre-
spond to decision boundaries, in steps 1–2 are determined by:
r i ¼ π m2i m2i1 =2 =½mi Li sin ðΔθi =2Þ mi1 Li1 sin ðΔθi1 =2Þ;
ð5:104Þ
i ¼ 1, 2, . . . , Lr
r4
1 m5
m3
0
-1
-2
-3
-3 -2 -1 0 1 2 3
In-phase coordinate, I
376 5 Advanced Modulation and Multiplexing Techniques
i 1 2 3 4 5 6
Li 5 11 15 17 16
2.0 16-CIPQ
32-CIPQ
Quadrature coordinate, Qx (Qy)
2.0
1.5
Quadrature coordinate, Qx (Qy) 1.5
1.0
1.0
0.5
0.5
0.0
0.0
-0.5
-0.5
-1.0
-1.0
-1.5 -1.5
-2.0 -2.0
-2.0 -1.5 -1.0 -0.5 0.0 0.5 1.0 1.5 2.0 2.5 -2.0 -1.5 -1.0 -0.5 0.0 0.5 1.0 1.5 2.0
In-phase coordinate, Ix (Iy) In-phase coordinate, Ix (Iy)
(a) (b)
Fig. 5.38 The CIPQ-based signal constellations for: (a) 16 points and (b) 32 points
We should point out that in 64-IPQ example we did not use the signal constel-
lation point placed in origin, and for large signal constellations, it does not really
matter if the point placed in origin is used or not. However, for moderate and small
signal constellation sizes, it is an advantage, in terms of energy efficiency, to place
the point in the origin. Such obtained signal constellations can be called centered-
IPQ/IPM (CIPQ/CIPM). As an illustration, 16-ary and 32-ary CIPQ constellations
are shown in Fig. 5.38.
Another algorithm for the signal constellation design algorithm for “rotationally
symmetric optical channels” with coherent detection is introduced in [43]. The
rationale of this algorithm is dictated by the fact that optical channel has memory
which requires the knowledge of conditional probability density functions (pdfs),
5.7 Optimum Signal Constellation Design 377
where with Pa we denoted the average power (AP) constraint and with Pp the peak
power (PP) constraint. Further, ri denotes i-th “mass point” (radius), while pi
denotes the corresponding probability of occurrence. These constraints are intro-
duced to take the physical limitations of the system into account and minimize the
effect of nonlinearities. The optimization problem is solved by the following split-
step optimization algorithm. After the initialization by conventional 2-D constel-
lation, we initiate the iterate steps below until either convergence is achieved or
predetermined number of iteration is reached [43]:
Step 1: pi-update rule:
It can be shown that the sequence {I( pi)}, where I() denotes the mutual
information, is a non-decreasing and converges to the channel capacity.
Yet another signal constellation algorithm aimed for improved energy efficiency
was introduced in [17] (see also [8]). The basic energy-efficient optical communi-
cation problem can be formulated as follows. The set of symbols X ¼ {x1, x2,. . .,xQ}
that occur with a priori probabilities p1,. . .,pQ [pi ¼ Pr(xi)] and carrying energies
E1,. . .,EQ are to be transmitted over the optical channel of interest. The symbols
from the set X satisfy the following two constraints: (i) ∑i pi ¼ 1 (probability
constraint), and (ii) ∑i piEi E (energy constraint). We can use the Lagrangian
method [8, 47] in maximizing the mutual information I(X,Y ), defined as I(X,Y ) ¼ H
(X)H(X|Y ), so we have that [17]:
378 5 Advanced Modulation and Multiplexing Techniques
H ðX Þ
0 H ðXjY Þ
1
zfflfflfflfflfflfflfflfflffl}|fflfflfflfflfflfflfflfflffl{
X zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{
B X X C
L¼ pi logpi B @ i pi j Pij logQji A
C
ð5:108Þ
i
P
P
þη i pi 1 þ μ i pi Ei E ,
where Pij ¼ Pr(yj|xi) can be determined by evaluation of histograms, and Qji ¼ Pr(xi|
yj) from Bayes’ rule [48]: Qji ¼ Pr(xi,yj)/Pr(yj) ¼ Pijpi/∑kPkjpk. The energy-efficient
signal constellation design algorithm (EE-SCDA) can be now formulated as
follows [17]:
Step 0 (Initialization step): Choose arbitrary auxiliary input distribution and signal
constellation, with number of constellation points Ma much larger that target
signal constellation M.
Step 1: Qji update-rule:
X
ðtÞ ðtÞ ð tÞ
Qji ¼ Pij pi = k
P kj p k , P ij ¼ Pr y j jx i : ð5:109Þ
Step 2: pi update-rule:
ðtþ1Þ exp μEi H ðtÞ ðxi jY Þ
pi ¼P
ðtÞ
,
k exp μEk H ðxk jY Þ ð5:110Þ
P
H ðxi jY Þ ¼ k Pik logQki :
Finally, we will describe the optimum signal constellation design (OSCD) algo-
rithm, introduced in [50]; see also [51]. This algorithm is convenient since it does
not require the employment of constrained optimization software. Instead, simple
Monte Carlo simulation can be used in signal constellation design. Given that
IPM-algorithm is derived under assumptions that are valid for large constellations,
5.8 Nonuniform Signaling 379
32-OSCD 3 64-OSCD
2
Quadrature coordinate, Qx (Qy)
1
1
0 0
-1 -1
-2
-2
-3
-2 -1 0 1 2 -3 -2 -1 0 1 2
In-phase coordinate, Ix (Iy) In-phase coordinate, Ix (Iy)
(a) (b)
Fig. 5.39 Signal constellations obtained by OSCD algorithm: (a) 32-ary signal constellation and
(b) 64-ary signal constellation
we can say that OSCD generated constellations are the most favorable for small and
medium sizes of signal constellations. The OSCD can be formulated as follows:
Step 0 (Initialization): Choose arbitrary signal constellation of size Q.
Step 1: Apply the Arimoto-Blahut algorithm to determine optimum source
distribution.
Step 2: Generate a long sequence of samples from optimum source distribution.
Group the samples from this sequence into Q clusters. The membership of the
cluster is determined based on squared Euclidean distance between sample point
and signal constellation points from previous iteration. Each sample point is
assigned to the cluster with smallest squared distance.
Step 3: Determine the signal constellation points as center of mass for each cluster.
Repeat the steps (2)–(3) until convergence.
As an illustration, we show 32-ary and 64-ary constellations obtained by
employing this algorithm in Fig. 5.39.
In the conventional data transmission schemes, each point in a given signal con-
stellation is transmitted equally likely. However, if we take the different energy
costs of various constellation points into account and transmit each point in the
constellation diagram with different probabilities, the resulting modulation tech-
nique is called either nonuniform signaling [5, 52, 53] or probability shaping-based
signaling [54]. The basic idea of the nonuniform signaling is to transmit symbols of
larger energy with lower probabilities, so that the energy efficiency of conventional
modulation schemes can be improved [52]. This improvement in energy efficiency
380 5 Advanced Modulation and Multiplexing Techniques
is commonly referred to as the shaping gain. In any data transmission scheme, the
goal is to transmit at a higher bit rate, with higher reliability and as low transmitter
power as possible. When the distribution of constellation points matches Maxwell-
Boltzmann distribution, the ultimate shaping gain of 1.53 dB can be achieved
[53]. Moreover, the nonuniform signaling scheme may be more suitable for optical
communication because the symbols with small energies, transmitted with higher
probabilities, suffer less fiber nonlinearity effects.
In this section, based on our recent invited paper [52], we introduce the
nonuniform signaling techniques suitable for use in coherent optical communica-
tion systems. There are two basic ways to map the uniform binary source bits to
nonuniform distributed symbols. The first method is to use arithmetic code
[54]. This method can be applied to existing signal constellation sets like
16-QAM, 64-QAM, and so on, to map the uniform binary source to nonuniform
symbols based on arbitrary distributions, which are based on different criteria. Even
though this scheme can easily fit to current optical systems, its complexity is high.
Moreover it is only applicable to square-QAM constellations.
The second method is to use the Huffman code, which is based on a binary tree
structure and has much lower complexity. This method can be combined with either
binary or non-binary FEC code but it cannot be applied to arbitrary constellation
sets [55]. The structure of the constellation is determined by Huffman code so that
the design of new signal constellation set is needed. One of the corresponding
constellation sets, 9-QAM, has the same spectral efficiency with traditional star-8-
QAM. On the other hand, the LDPC coded 9-QAM scheme outperforms the LDPC-
coded 8-QAM case by at least 0.8 dB [55].
The fundamental method of nonuniform signaling with arithmetic code is
introduced in [54] by B€ocherer, and then Fenhenberger and B€ocherer proposed
applying this approach to optical communication systems [56, 57]. In [57], authors
extended the work on nonuniform signaling and investigated the effect of constel-
lation shaping on nonlinearities in WDM systems [57]. The block diagram of
corresponding nonuniform scheme employing arithmetic coding is shown in
Fig. 5.40. As an illustration, the receiver constellation diagrams of the nonuniform
signaling 16-QAM and regular 16-QAM are also shown in the same figure. The key
part of the system is the distribution matcher, which is used for the nonuniform
signaling based on the arithmetic code. Note that the distribution matcher has been
added outside the FEC encoder and decoder, which is the reason why this scheme
requires minor modifications regarding current optical communication system.
Because of the flexibility of arithmetic code, the distribution matcher can be
designed based on different criteria, such as Maxwell-Boltzmann distribution and
maximizing mutual information rate. According to [57], the proposed nonuniform
signaling scheme increases the transmission distance by 8% with the help of binary
LDPC code and bit-interleaved coded modulation. However, the use of arithmetic
code increases the overall overhead of this nonuniform signaling scheme.
In this rest of this section, we investigate the method of achieving nonuniform
signaling schemes for the transmission of binary data by using the Huffman code. In
this section, we mainly focus on the 2-D 9-point constellation sets as an illustrative
5.8 Nonuniform Signaling 381
Inverse
Distribution FEC QAM FEC
Channel Demapper Distribution
Matcher Encoding Mapping Decoding
Matcher
Uniform Non-uniform
DFB Laser
SMF
Compensation Local
of linear Laser
GF(9)
Received Non binary 9-QAM Power and nonlinear Balanced
DeInterleaver Redistributer impairments Detector
bits LDPC demapper
decoder & From
CPE SMF
Fig. 5.43 The nonbinary LDPC coded modulation scheme based on Huffman code nonuniform
signaling
optical conversion and such obtained nonuniform signal will be transmitted over
fiber-optics communication system of interests. On receiver side, the homodyne
coherent optical detection is used and followed with the compensation of linear and
nonlinear impairments and carrier phase estimator (CPE). The sliding-MAP equal-
izer provides soft symbol LLRs, which are sent to the nonbinary LDPC decoder.
Once decoding is completed, we can get information bits after deinterleaving. The
results of Monte Carlo simulation can be found in [58] for binary LDPC coding and
[59] for nonbinary LDPC coding. For the experimental validation results an inter-
ested reader is referred to [60].
This chapter has been devoted to advanced modulation and multiplexing techniques
suitable for both wireless and optical communication systems. In Sect. 5.1, the
signal space theory concepts have been applied to wireless communication systems.
5.9 Concluding Remarks 383
References
1. Proakis JG (2007) Digital communications, 5th edn. McGraw Hill, New York, NY
2. Haykin S (2001) Communication systems, 4th edn. John Wiley & Sons, New York
3. Hayking S (2014) Digital communications systems. John Wiley & Sons, New York
4. Lathi BP, Ding Z (2009) Modern digital and analog communication systems, 4th ed. Oxford
University Press, New York
5. Goldsmith A (2005) Wireless communications. Cambridge University Press, Cambridge
6. Djordjevic IB, Ryan W, Vasic B (2010) Coding for optical channels. Springer, New York/
Dordrecht/Heidelberg/London
7. Cvijetic M, Djordjevic IB (2013) Advanced optical communication systems and networks.
Artech House, Norwood, MA
8. Djordjevic IB, Xu L, Wang T (2012) Statistical physics inspired energy-efficient coded-
modulation for optical communications. Opt Lett 37(8):1340–1342
9. Seimetz M (2009) High-order modulation for optical fiber transmission. Springer, Berlin,
Heidelberg
10. Batshon HG, Djordjevic IB, Schmidt T (2010) Ultra high speed optical transmission using
subcarrier-multiplexed four-dimensional LDPC-coded modulation. Opt Express
18:20546–20551
11. Djordjevic I, Batshon HG, Xu L, Wang T (2011) Four-dimensional optical multiband-OFDM
for beyond 1.4 Tb/s serial optical transmission. Opt Express 19(2):876–882
12. Zhang Y, Arabaci M, Djordjevic IB (2012) Evaluation of four-dimensional nonbinary LDPC-
coded modulation for next-generation long-haul optical transport networks. Optics Express 20
(8):9296–9301
13. Djordjevic IB, Xu L, Wang T (2008) PMD compensation in coded-modulation schemes with
coherent detection using Alamouti-type polarization-time coding. Opt Express 16
(18):14163–14172
14. Djordjevic IB, Arabaci M, Xu L, Wang T (2011) Generalized OFDM (GOFDM) for ultra-
high-speed optical transmission. Opt Express 19(7):6969–6979
15. Shieh W, Djordjevic I (2009) OFDM for optical communications. Elsevier/Academic Press
16. Djordjevic IB, Arabaci M, Xu L, Wang T (2011) Spatial-domain-based multidimensional
modulation for multi-Tb/s serial optical transmission. Opt Express 19(7):6845–6857
17. Djordjevic IB (2011) Energy-efficient spatial-domain-based hybrid multidimensional coded-
modulations enabling multi-Tb/s optical transport. Opt Express 19(17):16708–16714
18. Djordjevic IB, Jovanovic A, Peric ZH, Wang T (2014) Multidimensional optical transport
based on optimized vector-quantization-inspired signal constellation design. IEEE Trans
Commun 62(9):3262–3273
19. Djordjevic IB (2013) On the irregular nonbinary QC-LDPC-coded hybrid multidimensional
OSCD-modulation enabling beyond 100 Tb/s optical transport. IEEE/OSA J Lightwave
Technol 31(16):2969–2975
20. Djordjevic IB, Cvijetic M, Lin C (2014) Multidimensional signaling and coding enabling
multi-Tb/s optical transport and networking. IEEE Sig Proc Mag 31(2):104–117
21. Djordjevic IB (2016) On advanced FEC and coded modulation for ultra-high-speed optical
transmission. IEEE Commun Surv Tutorials 18(3):1920–1951. doi: 10.1109/COMST.2016.
2536726, third quarter 2016, August 19
22. Djordjevic IB, Arabaci M (2010) LDPC-coded orbital angular momentum (OAM) modulation
for free-space optical communication. Opt Express 18(24):24722–24728
23. Djordjevic IB, Anguita J, Vasic B (2012) Error-correction coded orbital-angular-momentum
modulation for FSO channels affected by turbulence. IEEE/OSA J Lightw Technol 30
(17):2846–2852
24. Qu Z, Djordjevic IB (2016) 500Gb/s Free-space optical transmission over strong atmospheric
turbulence channels. Opt Lett 41(14):3285–3288
References 385
25. Djordjevic IB, Qu Z (2016) Coded orbital angular momentum modulation and multiplexing
enabling ultra-high-speed free-space optical transmission. In: Uysal M, Capsoni C,
Ghassemlooy Z, Boucouvalas A, Udvary EG (eds) Optical wireless communications – an
emerging technology. Springer, pp 363–385
26. Djordjevic IB, Qu Z (2016) Coded orbital-angular-momentum-based free-space optical trans-
mission In: Wiley encyclopedia of electrical and electronics engineering. http://onlinelibrary.
wiley.com/doi/10.1002/047134608X.W8291/abstract
27. Jackson JD (1975) Classical electrodynamics, 2nd ed. John Wiley & Sons Inc, New York
28. Bouchal Z et al (2005) Selective excitation of vortex fiber modes using a spatial light
modulator. New J Phys 7:125
29. Anguita JA, Neifeld MA, Vasic BV (2008) Turbulence-induced channel crosstalk in an orbital
angular momentum-multiplexed free-space optical link. Appl Optics 47(13):2414–2429
30. Li A, Al Amin A, Chen X, Shieh W. “Reception of mode and polarization multiplexed
107-Gb/s CO-OFDM signal over a two-mode fiber,” in Proc. OFC/NFOEC, Postdeadline
Papers (OSA, 2011), Paper PDPB8
31. Gruner-Nielsen L, Sun Y, Nicholson JW, Jakobsen D, Lingle R, Palsdottir B. “Few mode
transmission fiber with low DGD, low mode coupling and low loss,” in Proc. OFC/NFOEC,
Postdeadline Papers (OSA, 2012), Paper PDP5A.1
32. Ryf R et al. “Low-loss mode coupler for mode-multiplexed transmission in few-mode fiber,” in
Proc. OFC/NFOEC, Postdeadline Papers (OSA, 2012), Paper PDP5B.5
33. Fontaine NK et al. “Space-division multiplexing and all-optical MIMO demultiplexing using a
photonic integrated circuit,” in Proc. OFC/NFOEC, Postdeadline Papers (OSA, 2012), Paper
PDP5B.1
34. Chen X, Li A, Ye J, Al Amin A, Shieh W. “Reception of dual-LP11-mode CO-OFDM signals
through few-mode compatible optical add/drop multiplexer,” in Proc. OFC/NFOEC,
Postdeadline Papers (OSA, 2012), Paper PDP5B.4
35. Randel S et al. “Mode-multiplexed 620-GBd QPSK transmission over 1200-km
DGD-compensated few-mode fiber,” in Proc. OFC/NFOEC, Postdeadline Papers (OSA,
2012), Paper PDP5C.5
36. Ryf R et al. “Space-division multiplexed transmission over 4200 km 3-core microstructured
fiber,” in Proc. OFC/NFOEC, Postdeadline Papers (Optical Society of America, 2012), Paper
PDP5C.5
37. Puttnam BJ, Klaus W, Awaji Y, Wada N, Kanno A, Kawanishi T, Imamura K, Inaba H,
Mukasa K, Sugizaki R, Kobayashi T, Watanabe M. “19-core fiber transmission of
19x100x172-Gb/s SDM-WDM-PDM-QPSK signals at 305Tb/s,” in Proc. OFC/NFOEC,
Postdeadline Papers (OSA, 2012), Paper PDP5C.1
38. Krummrich PM. “Optical amplifiers for multi mode / multi core transmission,” in Proc. OFC/
NFOEC (OSA, 2012), Paper OW1D.1
39. Essiambre R, Mecozzi A. “Capacity limits in single mode fiber and scaling for spatial
multiplexing,” in Proc. OFC/NFOEC (OSA, 2012), Paper OW3D
40. Anguita JA, Herreros J, Djordjevic IB (2014) Coherent multi-mode OAM superpositions for
multi-dimensional modulation. IEEE Photonics J 6(2), Paper 7900811, Apr. 2014
41. Peric ZH, Djordjevic IB, Bogosavljevic SM, Stefanovic MC. “Design of signal constellations
for Gaussian channel by iterative polar quantization,” in Proc. 9th Mediterranean
Electrotechnical Conference, vol. 2, pp. 866–869, 18–20 May 1998, Tel-Aviv, Israel
42. Djordjevic IB, Batshon HG, Xu L, Wang T. “Coded polarization-multiplexed iterative polar
modulation (PM-IPM) for beyond 400 Gb/s serial optical transmission,” in Proc. OFC/NFOEC
2010, Paper No. OMK2, San Diego, CA, 21–25 March 2010
43. Liu X, Chandrasekhar S, Lotz T, Winzer P, Haunstein H, Randel S, Corteselli S, Zhu
B. “Generation and FEC-decoding of a 231.5-Gb/s PDM-OFDM signal with 256-Iterative-
Polar-Modulation achieving 11.15-b/s/Hz intrachannel spectral efficiency and 800-km reach,”
in Proc. OFC/NFOEC, Postdeadline Papers (OSA, 2012), Paper PDP5B.3
386 5 Advanced Modulation and Multiplexing Techniques
44. Zhang J, Djordjevic IB. “Optimum signal constellation design for rotationally symmetric
optical channel with coherent detection,” in Proc. OFC/NFOEC 2011, Paper No. OThO3,
6–10 March 2011, LA, USA
45. Essiambre R-J, Kramer G, Winzer PJ, Foschini GJ, Goebel B (2010) Capacity limits of optical
fiber networks. J Lightwave Technol 28(4):662–701
46. Sloane NJA, Hardin RH, Duff TS, Conway JH (1995) Minimal-energy clusters of hard
spheres. Discrete Computational Geom 14:237–259
47. Wannier G (1987) Statistical physics. Dover Publications, New York
48. Cover T, Thomas J (1991) Elements of information theory. Wiley, New York
49. Blahut RE (1972) Computation of channel capacity and rate distortion functions. IEEE Trans
Inform Theory IT-18:460–473
50. Djordjevic IB, Liu T, Xu L, Wang T. “Optimum signal constellation design for high-speed
optical transmission,” in Proc. OFC/NFOEC 2012, Paper no. OW3H.2, March 6–8, 2012, Los
Angeles, CA, USA
51. Liu T, Djordjevic IB, Xu L, Wang T. “Feedback channel capacity inspired optimum signal
constellation design for high-speed optical transmission,” in Proc. CLEO 2012, Paper
no. CTh3C.2, San Jose, CA, 6–11 May 2012
52. Liu T, Qu Z, Lin C, Djordjevic IB. “Nonuniform signaling based LDPC-coded modulation for
high-speed optical transport networks,” OSA Asia Communications and Photonics Conference
(ACP) 2016, 2–5 Nov 2016, Wuhan, China. (Invited Paper)
53. Kschischang F, Pasupathy S (1993) Optimal nonuniform signaling for Gaussian channels.
IEEE Trans Inform Theory 39:913–929
54. Fehenberger T, Lavery D, Maher R, Alvarado A, Bayvel P, Hanik N (2016) Sensitivity gains
by mismatched probabilistic shaping for optical communication systems. IEEE Photo Technol
Lett 28(7):786–789
55. Liu T, Djordjevic IB. “LDPC-coded BICM-ID based nonuniform signaling for ultra-high-
speed optical transport,” in Optical Fiber Communication Conference, OSA Technical Digest
(online) (Optical Society of America, 2016), paper M3A.3
56. B€ocherer G. “Probabilistic signal shaping for bit-metric decoding,” in Proc. 2014 I.E. Inter-
national Symposium on Information Theory (ISIT 2014), (Institute of Electrical and Electron-
ics Engineers, New York, 2014), pp. 431–435
57. Fehenberger T, B€ ocherer G, Alvarado A, Hanik N. “LDPC coded modulation with probabi-
listic shaping for optical fiber systems,” in Optical Fiber Communication Conference, OSA
Technical Digest (online) (Optical Society of America, 2015), paper Th2A.23
58. Liu T, Lin C, Djordjevic IB (2016) Advanced GF(32) nonbinary LDPC coded modulation with
non-uniform 9-QAM outperforming star 8-QAM. Opt Express 24(23):13866–13874
59. Lin C, Zou D, Liu T, Djordjevic IB (2016) Capacity achieving nonbinary LDPC coded
non-uniform shaping modulation for adaptive optical communications. Opt Express 24
(16):18095–18104
60. Qu Z, Lin C, Liu T, Djordjevic I. Experimental study of nonlinearity tolerant modulation
formats based on LDPC coded non-uniform signaling, OFC 2017, Paper W1G.7, 19–23 March
2017, Los Angeles, CA, USA
Chapter 6
Advanced Detection Techniques
and Compensation of Channel Impairments
X
N
si ðtÞ ¼ sin Φn ðtÞ, 0 t < T; i ¼ 1, 2, , M ð6:1Þ
n¼1
where sin is the projection of i-th signal along n-th basis function. The received
signal r(t) can also be represented in terms of projections along the same basis
functions as follows:
X
N ðT
r ðtÞ ¼ r n Φn ðtÞ, r n ¼ r ðtÞΦn ðtÞdt ðn ¼ 1; 2; . . . ; N Þ: ð6:2Þ
j¼1
0
6.1 Detection and Estimation Theory Fundamentals 389
We can represent projection of received signal r(t) along n-th basis function as
follows:
ðT ðT
r n ¼ r ðtÞΦn ðtÞdt ¼ ½si ðtÞ þ zðtÞΦn ðtÞdt
0 0
ðT Tðs
ð6:5Þ
¼ si ðtÞΦn ðtÞdt þ nðtÞΦn ðtÞdt ¼
0 0
|fflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl}
sin zn
¼ sin þ zn ; n ¼ 1, , N:
We can also rewrite the Eq. (6.5) into a compact vector form as:
2 3 2 3 2 3
r1 si1 z1
6 r 2 7 6 si2 7 6 z2 7
r¼6 7 6 7 6 7
4 ⋮ 5 ¼ 4 ⋮ 5 þ 4 ⋮ 5 ¼ si þ z: ð6:6Þ
rN siN zN
|fflfflffl{zfflfflffl} |fflfflffl{zfflfflffl}
si z
ð
1 ð
1
Observation: r1 r2 r3 … rN
Samplers tk=kT
T T T T
∫ (⋅) dt ∫ (⋅) dt
0 0
∫ (⋅) dt
0
∫ (⋅) dt
0
Φ1 Φ2 Φ3 … Φ
Receive N
antenna
N-dim. demodulator:
Power splitter correlation detector
LNA
(a)
Observation: r1 r2 r3 … rN
Samplers tk=kT
h1 ( t ) = h2 ( t ) = h3 ( t ) = hN ( t ) =
Φ1 (T − t ) Φ 2 (T − t ) Φ 3 (T − t ) Φ N (T − t )
Receive
antenna
…
N-dim. demodulator:
matched filter-based
Power splitter detector
(b)
Fig. 6.1 Two equivalent implementations of detector (or demodulator) for wireless communica-
tions: (a) correlation detector and (b) matched filter-based detector
ð
1 ðT
r n ðT Þ ¼ r ðτÞhn ðT τÞdτ ¼ r ðτÞΦn ðτÞdτ, ð6:8Þ
1 0
which has the same form as the n-th output of the correlation receiver. Therefore,
the correlation and matched filter-based receivers are equivalent to each other.
6.1 Detection and Estimation Theory Fundamentals 391
X
N X
N
r 0 ðtÞ ¼ r ðtÞ r n Φn ðtÞ ¼ si ðtÞ þ zðtÞ ðsin þ zn ÞΦn ðtÞ
n¼1 n¼1
ð6:9Þ
X
N
0
¼ zðt Þ zn Φn ðtÞ ¼ z ðtÞ:
n¼1
We can notice that the reminder of the received signal is only noise dependent.
In all equations above, we have represented the noise in terms of the same basis
functions used to represent the transmitted signal. However, it is more appropriate
to represent the noise by using Karhunen-Loève expansion [2], by taking the
correlation properties of noise process into account. However, for additive white
Gaussian noise (AWGN), the noise projections along the basis functions of trans-
mitted signals are uncorrelated and independent, as we will show shortly. Conse-
quently, the basis used to represent noise is irrelevant in selection of the decision
strategy in the detection process.
Let R(t) denote the random process established by sampling of the received
signal r(t). The projection Rn of R(t) along the n-th basis function will be a random
variable represented by the correlator output rn, (n ¼ 1,2,. . .,N ). The corresponding
mean value of Rn is given by:
and it is dependent only on the n-th coordinate of transmitted signal sin. With Zn we
denoted the random variable at the output of the n-th correlator (matched filter)
originating from the noise component z(t) and with 〈〉 the mathematical expecta-
tion operator. In similar fashion, the variance of Rn is also only noise dependent
since it is:
D E
σ 2Rn ¼ Var½Rn ¼ ðRn sin Þ2 ¼ Z 2n : ð6:11Þ
In Eq. (6.12), RZ() presents the autocorrelation function of the noise process
Z(t), which is otherwise given as [1, 2]:
N0
RZ ðt; uÞ ¼ δðt uÞ, ð6:13Þ
2
ðT ðT ðT
N0 N0 N0
σ 2Rn ¼ Φn ðtÞΦn ðuÞδðt uÞdtdu ¼ Φ2n ðtÞdt ¼ : ð6:14Þ
2 2 2
0 0 0
|fflfflfflfflffl{zfflfflfflfflffl}
1
Therefore, all matched filter (correlator) outputs have the variance equal to the
power spectral density of noise process Z(t), which is equal to N0/2. The covariance
between n-th and k-th (n 6¼ k) outputs of the matched filters is given by:
ð6:15Þ
Y
N
f R ðrjmi Þ ¼ f Rn ðr n jmi Þ; i ¼ 1, , M: ð6:16Þ
n¼1
The components Rn’s are independent Gaussian random variables with mean
values sin and variance equal to N0/2, so that the corresponding conditional PDF of
Rn is given as:
1 1 n ¼ 1, 2, . . . , N
f Rn ðr n jmi Þ ¼ pffiffiffiffiffiffiffiffi exp ðr n sin Þ ;
2
ð6:17Þ
πN 0 N0 i ¼ 1, 2, . . . , M
By substituting the conditional PDFs into joint PDF, and after simple arrange-
ments, we obtain:
" #
N=2 1 X N
2
f R ðrjmi Þ ¼ ðπN 0 Þ exp ðr n sin Þ ; i ¼ 1, , M: ð6:18Þ
N 0 n¼1
We can conclude that the elements XN of random vector given by Eq. (6.6)
completely characterize the term r Φ ðtÞ:
n¼1 n n
What left to be characterized is the reminder z0 (t) of the received signal given by
Eq. (6.9), which is only noise dependent. It can be easily shown that the sample of
noise process Z0 (tm) is statistically independent on outputs Rj of the correlators; in
other words:
n ¼ 1, 2, . . . , N
hRn Z 0 ðtm Þi ¼ 0, : ð6:19Þ
0 tm T
The schemes from Fig. 6.1 can serve as a base of the receiver decision circuit, as
shown in Fig. 6.2. The observation vector obtained by using either correlation of
matched filter detector is used as the input vector. The observation vector is used as
394 6 Advanced Detection Techniques and Compensation of Channel Impairments
Estimate m̂
Decision circuit:
Select the largest input
Observation
r vector
input to M dot product calculators. The i-th product calculator evaluates the inner
product between the observation vector r and i-th signal vector si (corresponding to
transmitted massage mi) as follows:
ðT X
N
hrjsi i ¼ r ðtÞsi ðtÞdt¼rsiT ¼ r n sin : ð6:20Þ
n¼1
0
If it happens that different symbols have different energies after dot product
calculations, we need to remove the half of the energy of the corresponding symbol
in each of the branches. Decision circuit decides in favor of the symbol with the
largest input and provides the estimate to the N-dimensional demapper. For
nonbinary transmission, the demapper block can be omitted. The configurations
of both correlation detector and matched filter-based detector, both shown in
Fig. 6.1, and the configuration of signal transmission decoder/detector shown in
Fig. 6.2 have been derived based on Euclidean distance receiver in Chap. 5.
In the rest of this section, we will show that matched filter is optimum from the
signal-to-noise ratio (SNR) point of view. For this proof we will use the Schwarz
inequality given by Eq. (5.11). Let us observe the n-th output from matched filter
shown in Fig. 6.1b, which is the convolution of received signal and impulse
response of the matched filter evaluated at t ¼ T:
r n ðT Þ ¼ r ðtÞ∗ hn ðtÞ t¼T ¼ sn ðtÞ∗ hn ðtÞ j t¼T þ zðtÞ∗ hn ðtÞ j t¼T
|fflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflffl}
an ð T Þ zn ðT Þ
ð6:21Þ
¼ an ðT Þ þ zn ðT Þ,
6.1 Detection and Estimation Theory Fundamentals 395
where an(T ) represents the signal portion of the output from matched filter, while
with zn(T ) denotes the noise portion of the matched filter output. The SNR can be
defined as:
2
a ðT Þ
SNR ¼ 2n : ð6:22Þ
zn ðT Þ
ð
1 ð
1 ðT
N0 N0
z2n ðT Þ ¼ δðτ uÞhn ðT τÞhn ðT uÞdτdu ¼ h2n ðT uÞdu:
2 2
1 1 0
ð6:24Þ
On the other hand, the variance of the signal at the output of matched filter is
given as:
2 D
2 E
2
an ðT Þ ¼ sn ðtÞ∗hn ðtÞjt¼T ¼ sn ðtÞ∗hn ðtÞjt¼T ¼
21 32
ð ð6:25Þ
¼ 4 hn ðT τÞsn ðτÞdτ5 :
1
2T 32
ð ðT ðT
4 hn ðT τÞsn ðτÞdτ5 h2n ðT τÞdτ s2n ðτÞdτ
0 0 0
SNR ¼
ðT ðT
N0 2 N0 2 ð6:27Þ
hn ðT τÞdτ hn ðT τÞdτ
2 2
0 0
Tðs
2 2 2En
¼ s ðτÞdτ ¼ ¼ SNRn, max :
N0 n N0
0
The equality sign in Eq. (6.27) is satisfied when hn(T τ) ¼ Csn(τ), where C is an
arbitrary constant (for convenience, we can assume that C ¼ 1). Accordingly, the
impulse response of matched filter can be expressed as:
In conclusion, we can say that matched filter maximizes the SNR. It can be
straightforwardly shown that the output signal of a matched filter is proportional to
a shifted version of the autocorrelation function of the input signal, namely:
It is also important to mention that the spectrum of the output signal of a matched
filter is proportional to the spectral density of the input signal:
Therefore, we have just shown that Euclidean distance receiver, the correlation
receiver, and matched filter-based receivers are equivalent to each other for
Gaussian-like channels.
In this section we are concerned with the receivers minimizing symbol error
probability, commonly referred to as the optimum receivers. The joint conditional
PDF given by fR(r| mi) can be used in a decision-making process. It is often called
likelihood function and denoted as L(mi). For Gaussian channels, the likelihood
function contains exponential terms that can lead to numerical instabilities.
6.1 Detection and Estimation Theory Fundamentals 397
It is more convenient to work with its logarithmic version, which is known as log-
likelihood function:
1 X N
2
lðmi Þ ¼ r j sij ; i ¼ 1, 2, . . . , M: ð6:32Þ
N 0 j¼1
^ ¼ mi if
Set m
ð6:34Þ
Pðmi is sentjrÞ Pðmk is sentjrÞ, 8k 6¼ i
In other words, the i-th decision region Di is defined as the set of all observation
vectors for which the probability that mi is sent is larger than any other probability.
As an illustration, in Fig. 6.3 we show decision regions for QPSK (also known as
4-QAM), assuming equal probable transmission. Whenever the observation vector
falls within decision region Di, we can decide in favor of symbol mi.
398 6 Advanced Detection Techniques and Compensation of Channel Impairments
s2 d
s1
D2 D1
Φ1
d
D3 D4
s3 s4
The optimum decision strategy given by Eq. (6.35) is not quite suitable from
practical point of view. Let us consider an alternative practical representation for
M ¼ 2. The average error probability for M ¼ 2 is given by:
ð ð
Pe ¼ p1 f R ðrjm1 Þdr þ p2 f R ðrjm2 Þdr, ð6:36Þ
1
D 2
D
In order to minimize the average error probability given by Eq. (6.37), we can
apply the following decision rule: if p1fR(r|m1) is greater than p2fR(r|m2), then
assign r to D1 and accordingly decide in the favor of m1. Otherwise, we assign r
to D2 and decide in the favor of m2. This decision strategy can be generalized for
M > 2 as follows:
Set m^ ¼ mi if
ð6:38Þ
pk f R ðrjmk Þ is maximum for k ¼ i:
When all symbols occur with the same probability pi ¼ 1/M, then the
corresponding decision rule is known as maximum likelihood (ML) rule and can
be formulated as:
6.1 Detection and Estimation Theory Fundamentals 399
^ ¼ mi if
Set m
ð6:39Þ
lðmk Þ is maximum for k ¼ i:
In terms of the observation space, the ML rule can also be formulated as:
For AWGN channel, by using the likelihood function given by Eq. (6.32) (which
is related to Euclidean distance squared), we can formulate the ML rule as:
From Euclidean distance in signal space (see Chap. 5), we know that:
X
N X
N X
N X
N
kr s k k2 ¼ jr n skn j2 ¼ r 2n 2 r n skn þ s2kn , ð6:42Þ
n¼1 n¼1 n¼1 n¼1
|fflfflffl{zfflfflffl}
Ek
and by substituting this equation into Eq. (6.41), we obtain the final version of ML
rule as follows:
The receiver configuration shown in Fig. 6.2 is an optimum one only for AWGN
channel (such as wireless channel and optical channel dominated by ASE noise),
while it is suboptimum for Gaussian-like channels. As for non-Gaussian channels,
we need to use the ML rule given by Eq. (6.39).
As an example, for modulation schemes with M ¼ 2, we can use the decision
strategy based on the following rule:
m1
f R ðrjm1 Þ > p2
LLRðrÞ ¼ log log , ð6:44Þ
f R ðrjm2 Þ m< p1
2
where LLR() denotes the log-likelihood ratio. Equation (6.44) is also known as
Bayes’ test [2], while factor log( p2/p1) is known as a threshold of the test. The
scheme of the corresponding log-likelihood ratio receiver is shown in Fig. 6.4.
When p1 ¼ p2 ¼ 1/2, the threshold of the test is 0, while corresponding receiver is
ML one.
400 6 Advanced Detection Techniques and Compensation of Channel Impairments
Threshold log(p2/p1)
In this section, we describe how to calculate symbol error probability and provide
two illustrative examples: (i) calculation of bit error probabilities for binary signal
constellations and (ii) calculation of symbol error probability for M-ary QAM. For
large signal constellations, when it becomes quite difficult to calculate symbol error
probabilities, we describe a union bound approximation.
X
M X
M ð
Pe ¼ pi Pðr does not lie in Di jmi sentÞ ¼ pi f R ðrjmi Þdr: ð6:45Þ
i¼1 i¼1 i
D
X
M ð X
M ð
Pe ¼ pi f R ðrjmi Þdr ¼ pi f R ðrjmi Þdr
i
D DDi
i¼1
ð
i¼1
ð6:46Þ
X
M
¼1 pi f R ðrjmi Þdr:
i¼1 Di
M ð
1 X
Pe ¼ 1 f ðrjmi Þdr: ð6:47Þ
M i¼1 Di R
the probability of symbol error. Therefore, the rotation and translation of signal
constellation produces another signal constellation that has the same symbol error
probability as the one observed against minimum Euclidean distance.
Let us first observe the rotation operation and denote the original complex-
valued signal constellation by {si}. The rotation matrix U is a Hermitian matrix (UU
{
¼ I, where I is identity matrix). The corresponding constellation obtained after
application of rotation matrix is given by {Usi}. The Euclidean distance between
observation vector r and a constellation point from rotated signal constellation, say
Usi, is given as:
which means that variance does not change during rotation. The mean value of
rotated noise vector is still equal to zero, i.e.:
and does not change with translation. Accordingly, the symbol error probability, as
a function of minimum Euclidean distance, does not change either. However, the
average symbol energy changes with translation, and upon translation it becomes
X
M
Etranslate ¼ ksi ak2 pi : ð6:52Þ
i¼1
Since ksi ak2 ¼ ksik2 2a{si + kak2, we can rewrite the Eq. (6.52) as follows:
402 6 Advanced Detection Techniques and Compensation of Channel Impairments
X
M X
M X
M
Etranslate ¼ ksi k2 pi 2a{ s i pi þ kak2 pi ¼ E 2a{ hsi þ kak2 : ð6:53Þ
i¼1 i¼1 i¼1
|fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl} |fflfflffl{zfflfflffl}
E hsi
Let us now consider binary signal constellations. We know that the output of
matched filter (correlator) r is a Gaussian random variable since the input is a
Gaussian random process. In any linear filter, the Gaussian input produces the
output that is a Gaussian random process as well, but with different mean value
and variance [1–4]. The statistics of this Gaussian random variable, r, changes
depending on whether the transmitted signal was s1 (corresponding to message m1)
or s2 (corresponding to message m2). If s1 was sent, then r is a Gaussian random
variable with the mean value μ1 and variance σ 2 given by:
N0
μ1 ¼ hrjm1 i ¼ E1 ρ12 , σ 2 ¼ ðE1 þ E2 2ρ12 Þ, ð6:56Þ
2
6.1 Detection and Estimation Theory Fundamentals 403
ðT
where ρ12 is the correlation coefficient ρ12 ¼ s1 ðtÞs2 ðtÞdt.
0
If s2 was sent, then r has mean value and variance given by:
N0
μ2 ¼ hrjm2 i ¼ E2 þ ρ12 , σ 2 ¼ ðE1 þ E2 2ρ12 Þ: ð6:57Þ
2
The average bit error probability, for equal probable transmission, is obtained as:
rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1 E1 þ E2 2ρ12
Pb ¼ ðPe fD1 jm2 g þ Pe fD2 jm1 gÞ ¼ Q : ð6:58Þ
2 2N 0
ðT ðT
2
d 2E ðs1 ; s2 Þ ¼ ½s1 ðtÞ s2 ðtÞ dt ¼ s21 ðtÞ 2s1 ðtÞs2 ðtÞ þ s22 ðtÞdt
ð6:59Þ
0 0
¼ E1 þ E2 2ρ12 ,
From Chap. 5 we know that M-ary square-QAM signal pffiffiffiffiffi constellation can be
obtained as two-dimensional Cartesian product of L ¼ M -ary pulse amplitude
modulation (PAM) signals:
wherein for in-phase and quadrature channels we have two independent PAM
constellations. This assumption is correct for medium and high SNRs. The neigh-
boring constellation points in PAM are separated by 2d. In order to derive the
expression of average PAM symbol error probability Pe , PAM, we should first
determine the probability of error for the following two symbols: (i) the edge
symbol having only one neighbor and (ii) the inner symbol, which has two
neighbors. The inner symbol error probability can be expressed as:
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
Pe ð m i Þ ¼ Pð k z k > d Þ ¼ Q 2d 2 =N 0 ; i ¼ 2, 3, , L 1: ð6:63Þ
On the other hand, the outer symbol error probability is just half of the inner
symbol error probability. Accordingly, the average symbol error probability of
L-ary PAM can be expressed as:
6.1 Detection and Estimation Theory Fundamentals 405
1X L
1
Es, PAM ¼ ð2i LÞ2 d2 ¼ L2 1 d 2 : ð6:65Þ
L i¼1 3
2 2
2
Es ¼ 2Es, PAM ¼ L 1 d 2 ¼ ðM 1Þd 2 : ð6:67Þ
3 3
For sufficiently high SNRs, we can neglect erfc2{} term in previous equation so
that we can write that:
pffiffiffiffiffi sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi!
M1 3 Es
Pe ffi 2 pffiffiffiffiffi erfc : ð6:69aÞ
M 2 ð M 1 Þ N 0
[1, 4], which gives us an expression that is only function of Euclidean distances
among signal constellation points. This approximation is accurate only for suffi-
ciently high SNRs. Let Aik denote the event that the observation vector r is closer to
the signal vector sk than to si, when the symbol mi (vector si) is sent, which means
that kr skk < kr sik. The constellation point si is detected correctly if
kr sik < kr skk 8 k 6¼ i, which means that the average error probability can be
upper bounded as:
X
M
M
Pe ðmi sentÞ ¼ P [ Aik PðAik Þ: ð6:69bÞ
k¼1, k6¼i
k¼1, k6¼i
In other words, P(Aik) corresponds to the probability that the noise vector is
closer to the vector si-sk than to the origin. Given the fact that i-th noise component
is a zero-mean Gaussian random variable of variance N0/2, what matters is just a
projection n of the noise vector on line containing vector si-sk. This projection has
zero mean and variance equal to N0/2, so that P(Aik) can be expressed as:
0 1
ð
1
B C 1
pffiffiffiffiffiffiffiffieu =2 du
2
PðAik Þ ¼ P@z > ksi sk k=2A ¼
|fflfflfflfflffl{zfflfflfflfflffl} πN 0
ð6:71Þ
dik dik =2
d ik 1 d ik
¼ Q pffiffiffiffiffiffiffiffi ¼ erfc pffiffiffiffiffiffi :
2N 0 2 2 N0
The error probability related to symbol mi can be now upper bounded as:
1 X M
dik
Pe ðmi Þ erfc pffiffiffiffiffiffi ; i ¼ 1, , M ð6:72Þ
2 k¼1, k6¼i 2 N0
X
M
1X M X
M
dik
Pe ¼ p i Pe ð m i Þ p erfc pffiffiffiffiffiffi , ð6:73Þ
i¼1
2 i¼1 i k¼1, k6¼i 2 N0
and this inequality is known as union bound. For equal probable transmission of
symbols, pi ¼ 1/M, the union bound simplifies to:
1 XM X
M
dik
Pe erfc p ffiffiffiffiffi
ffi : ð6:74Þ
2M i¼1 k¼1, k6¼i 2 N0
6.1 Detection and Estimation Theory Fundamentals 407
For circularly symmetric signal constellation, we can use the following bound:
1 X M
d ik
Pe erfc pffiffiffiffiffiffi : ð6:76Þ
2 k¼1, k6¼i 2 N0
where Mdmin is the number of neighbors at distance dmin from observed constellation
point. Regarding the bit error probability Pb, when Gray-like mapping rule [1] is
used for sufficiently high SNRs, we can use the following approximation:
Pb Pe =log2 M: ð6:78Þ
If we would like to compare various signal constellation sizes, the bit energy-to-
power spectral density ratio is typically used, Eb/N0. In optical communications,
very often we use the optical SNR (OSNR), introduced by:
Ps Ps
OSNR ¼ ¼ , ð6:79Þ
PASE 2nsp hνðG 1ÞBop
instead of electrical SNR. In Eq. (6.79) Ps denotes signal power, while PASE is
amplified spontaneous emission (ASE) noise power determined by PASE ¼ 2nsphν
(G 1)Bop,where nsp is the spontaneous emission factor of an Erbium-doped fiber
amplifier (EDFA), G is EDFA gain, Bop is the bandwidth of optical passband filter
that follows EDFA, and hν is a single photon energy. To compare different
modulation schemes with different signal constellation sizes, it is convenient to
introduce OSNR per bit and per a single polarization state and define it as [11]:
OSNR Rs
OSNRb ¼ ¼ SNRb , ð6:80Þ
log2 M 2Bop
where M is signal constellation size, Rs is symbol rate, and Bop is referent optical
bandwidth (it is commonly assumed that Bop ¼ 12.5 GHz, which corresponds to a
0.1 nm spectral width around carrier wavelength of 1550 nm). Parameter
SNRb ¼ Eb/N0 denotes signal-to-noise ratio per bit of information, where Eb is
the bit energy and N0 is a power spectral density (PSD) originating from ASE noise.
408 6 Advanced Detection Techniques and Compensation of Channel Impairments
jμ2 μ1 j
Q¼ , ð6:82Þ
σ2 þ σ1
where μi and σ i denote the mean value and standard deviation of symbol si (message
mi), wherein i ¼ 1,2.
So far our focus was on detection of signal in the presence of additive noise, such
ASE or Gaussian noise. In this section, we will pay attention to the estimation of a
certain signal parameter, such as phase, frequency offset, and so on, important from
the detection point of view. Let the received signal be denoted by r(t) while and
transmitted signal is s(t,p), where p is the parameter to be estimated. The received
signal in the presence of additive noise z(t) can be written as:
where T is the observation interval (symbol duration for modulation schemes). The
operation of assigning a value p^ to unknown parameter p is known as parameter
estimation; the value assigned is called estimate, and the algorithm used to perform
this operation is called estimator.
There are different criteria used to evaluate estimator, including minimum
mean-square (MMS) estimate, maximum a posteriori probability (MAP) estimate,
and maximum likelihood (ML) estimate. We can define the cost function in MMS
estimate (MMSE) as an integral of quadratic form [2]:
ð
2
C MMSE ðεÞ ¼ p p^ f P ðpjrÞdp, ð6:84Þ
|fflfflfflfflffl{zfflfflfflfflffl}
ε2
6.1 Detection and Estimation Theory Fundamentals 409
where ε ¼ p^ p, while fP( p|r) is the a posteriori probability density function (PDF)
of random variable P. The observation vector r in Eq. (6.84) is defined by its ri
components, where i-th component is determined by:
ðT
r i ¼ r ðtÞΦi ðtÞdt; i ¼ 1, 2, , N ð6:85Þ
0
{Φi(t)} denotes the set of orthonormal basis functions. The estimate that minimizes
the average cost function given by Eq. (6.84) is known as Bayes’ MMS estimate
[2, 3]. The estimate that maximizes the a posteriori probability density function
fP( p|r) is known as MAP estimate. Finally, the estimate which maximizes the
conditional PDF fr(r|p), which is also known as likelihood function, is called ML
estimate. The MAP estimate can be obtained as a special case of Bayes estimation
by using the uniform cost function C(ε) ¼ (1/δ)[1rect(ε/δ)] as follows:
^ð
pδ=2 ð
1
Ð 1
hC ðεÞi ¼ C ðεÞf P ðpjrÞdp ¼ þ f P ðpjrÞdp
δ
2 31 ^
pþδ=2
ð6:86Þ
^ð
pþδ=2
16 7 1
¼ 41 f P ðpjrÞdp5 ffi ð1=δÞ½1 δf P ðpjrÞ ¼ f P ðpjrÞ
δ δ
^
pδ=2
where the approximation above is valid for sufficiently small δ. The quality of an
estimate is typically evaluated in terms of expected mean value hp^i and variance of
the estimation error. We can recognize several cases with respect to the expected
value. If the expected value of the estimate equals true value of the parameter,
hp^i ¼ p, we say that estimate is unbiased. If the expected value of estimate differs
from true parameter by fixed value b, i.e., if hp^i ¼ p þ b, we say that estimate has a
known bias. Finally, if the expected value of estimate is different from true
parameter by variable amount b( p), i.e., if hp^i ¼ p þ bðpÞ, we say that estimate
has a variable bias. The estimation error ε is defined as difference between true
value p and estimate p, ^ namely, ε ¼ p p: ^ A good estimate is one that simulta-
neously provides a small bias and a small variance of estimation error. The lower
bound on the variance of estimation error can be obtained from Cramér-Rao
inequality [1, 2] which is:
D
2 E 1
p p^ D 2
E, ð6:87Þ
∂ log f R ðrjpÞ
∂p2
where we assumed that second partial derivative of conditional PDF exists and that
it is absolutely integrable. Any estimate that satisfies Cramér-Rao bound defined by
the right side of Eq. (6.87) is known as an efficient estimate.
410 6 Advanced Detection Techniques and Compensation of Channel Impairments
ðT
sn ðpÞ ¼ sðt; pÞΦn ðtÞdt; n ¼ 1, 2, , N ð6:88Þ
0
Since the components zn of the noise are zero-mean Gaussian with PSD equal
N0/2, the components of observation vector will also be Gaussian with mean values
sn( p). The joint conditional PDF for a given parameter p will be:
1 Y
N
2
f R ðrjpÞ ¼ N=2
e½rn sn ðpÞ =N 0
: ð6:90Þ
ðπN 0 Þ n¼1
ðT ðT
f ðrjpÞ 2 1
L½r ðtÞ; p ¼ lim r ¼ r ðtÞsðt; pÞdt s2 ðt; pÞdt: ð6:91Þ
N!1 f r ðrÞ N0 N0
0 0
ðT
∂s t; p^
r ðtÞ s t; p^ dt ¼ 0, ð6:92Þ
∂p^
0
In a fading environment, as shown in Chap. 2, the envelope of the signal varies with
the propagation distance as the environment, and consequently multipath and
shadowing effects vary. Accordingly, the signal-to-noise ratio ρ also varies with
propagation distance, and these variations can be described with the probability
density function f(ρ). Given that SNR becomes a random variable, the symbol error
probability Ps(ρ) becomes random [5–8, 14, 15] as well, and we can define different
scenarios to characterize these variations:
(i) The outage probability, denoted as Poutage, represents the probability that SNR
falls below a given threshold value ρtsh, corresponding to the maximum
tolerable symbol error probability.
(ii) The average error probability corresponds to the symbol error probability
averaged over SNR distribution.
(iii) Combined outage and average error probability scenario, when shadowing
and multipath fading effects are simultaneously present.
The required SNR to achieve a target outage probability Poutage is given by:
ρ
ρ¼ tsh
: ð6:95Þ
log10 1 Poutage
412 6 Advanced Detection Techniques and Compensation of Channel Impairments
Form (6.95), we can determine the fade margin (FM) defined as SNR increase
required to maintain acceptable performance more than (1Poutage) 100% of the
time, as follows:
FM ¼ 10log10 log10 1 Poutage : ð6:96Þ
ð
1
where Ps(ρ) is the AWGN symbol error probability, with ρ being symbol SNR. The
generic expression applicable to many 2-D and 1-D signal constellations is given
by:
pffiffiffiffiffiffiffiffiffi
Ps ð ρÞ ’ C M Q DM ρ , ð6:98Þ
CM pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
Pb ð ρb Þ Q DM ρb log2 M : ð6:99Þ
log2 M
For Rayleigh fading, the expression for average symbol error probability can be
written as:
ð
1 " sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi#
pffiffiffiffiffiffiffiffiffi 1 C DM ρ=2
Ps ¼ hPs ðρÞi ’ DM ρ eρ=ρ dρ ’
M
CM Q 1 : ð6:100Þ
ρ 2 1 þ DM ρ=2
0
6.2 Wireless Communication Systems Performance 413
M-QAM in AWGN:
0
M= 4
10
M=16
-1 M=64
10
M-QAM in Rayleigh fading:
Average bit error probability, P b
-2 M= 4
10
M=16
-3
10 M=64
-4
10
-5
10
-6
10
-7
10
-8
10
-9
10
0 5 10 15 20 25 30 35 40 45
Average signal-to-noise ratio per bit, ρb
Fig. 6.5 Average bit error probability vs. average SNR per bit for AWGN and Rayleigh fading
channels
For very high
SNR, the following asymptotic expression can be used:
Ps ! CM = 2DM ρ .
ρ!1
As an illustration, we show in Fig. 6.5 bit error probability vs. average SNR per
bit for different constellation sizes for AWGN and Rayleigh fading channels, by
employing approximate formulas (6.98) for AWGN channel and (6.100) for Ray-
leigh fading channel. Clearly, significant degradation in Pb can be found in the
presence of Rayleigh fading.
The combined outage and average error probability scenario is applicable when the
fading environment can be represented as a superposition of both fast fading
(shadowing effects) and slow fading (such as Rayleigh fading). In this scenario,
we can define the average error probability with some probability 1 Poutage.
Therefore, when not in outage, in other words the symbol SNR averaged over fast
fading for fixed path loss and random shadowing ρ ρtsh (where ρtsh is the average
414 6 Advanced Detection Techniques and Compensation of Channel Impairments
threshold SNR), the average probability of error is obtained by averaging over the
conditional PDF of the fast fading as follows:
ð
1
Ps ¼ Ps ðρÞf ρjρ dρ: ð6:101Þ
0
The average threshold SNR ρtsh is obtained from Eq. (6.101) by setting
Ps ¼ Ps, tsh , where Ps, tsh is the maximum tolerable average symbol error probability
and solving for ρ.
ð
1
Clearly, the MGF is related to the Laplace transform (LT) of PDF by:
LT{fρ(ρ)} ¼ MGFρ(s).
As the name suggests, the MGF is related to the moments 〈ρn〉 by:
∂
n
hρ i ¼ n MGFρ ðsÞ
n
ð6:103Þ
∂s s¼0
1
MGFρ ðsÞ ¼
m : ð6:104Þ
1 sρ=m
ð
π=2
1 z2
Q ðzÞ ¼ exp dϕ ð6:106Þ
π 2sin 2 ϕ
0
pffiffiffiffiffiffiffiffiffi C ð
π=2
M DM ρ
Ps ð ρ Þ ’ C M Q DM ρ ¼ exp dϕ: ð6:107Þ
π 2sin 2 ϕ
0
ð
1
pffiffiffiffiffiffiffiffiffi ð 1
π=2 ð
CM DM ρ
Ps ffi CM Q DM ρ f ðρÞdρ ¼ exp f ð ρ Þdρ dϕ )
π 2sin 2 ϕ
0 0 0
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
DM
MGFρ
2sin 2 ϕ
ð
π=2
CM DM
¼ MGFρ dϕ:
π 2sin 2 ϕ
0
ð6:108Þ
When differential detection is used, the Doppler spread introduces an error floor
phenomenon caused by the correlation of symbols, which is a function of Doppler
frequency νD and symbol duration T. The Doppler spread is accounted by the
correlation coefficient for different Doppler power spectrum models, defined as
ρC ¼ R(T )/R(0), and for Clark-Jakes model, described in Chap. 2, we have that:
ðDPSKÞ 1 1 þ K þ ρb ð 1 ρC Þ Kρb
Pb ¼ exp : ð6:110Þ
2 1 þ K þ ρb 1 þ K þ ρb
The average probability of error for DQPSK in the presence of Doppler spread
and in Rician fading is upper bounded by:
0 vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi1 " #
u pffiffiffi
2 pffiffiffi
1@ u ρC ρ= 2 2 2 Kρ=2
ðDQPSKÞ t
Pb 1
2 pffiffiffi
2 Aexp
pffiffiffi
:
2 1 þ ρ ρC ρ= 2 1 þ ρs ρC ρ= 2
ð6:112Þ
The DPSK error floor for the Clark-Jakes (uniform scattering) model in the
presence of Doppler spread and Rayleigh fading can be obtained upon substitution
of Eq. (6.109) into Eq. (6.113) as follows:
ðDQPSKÞ 1 J 0 ð2πνD T Þ
Pb, floor ¼ , ð6:114Þ
2
-1 νDT=0.2:
10
K= 0
10
-2 Rayleigh fading
K= 9
Average bit error probability, P b
-3 K=18
10
νDT=0.02:
10
-4 Rician
K= 0
fading
10
-5 K= 9
K=18
-6
10
-7
10
-8
10
-9
10
-10
10
-11
10
0 8 16 24 32 40 48
Average bit SNR, ρ b [dB]
Fig. 6.6 Average bit error probability vs. average bit SNR in DPSK for different Rician param-
eters and different Doppler frequencies under Clark-Jakes (uniform scattering) model
We will start with the equivalent wireless/optical channel model by observing only
one polarization state (either x- or y-polarization state), which is shown in Fig. 6.7.
The function hTx(t) denotes equivalent impulse response of transmitter, which is in
wireless communications the convolution of pulse shaper and power amplifier. In
optical communications, hTx(t) is obtained as the convolution of pulse shaper
impulse response, driver amplifier, and Mach-Zehnder modulator (MZM) impulse
responses. In the same figure, the hc(t) denotes the impulse response of wireless/
optical channel. The hRx(t) denotes the equivalent impulse response of the receiver,
which is in wireless communications obtained as the convolution of receive antenna
impulse response and low-noise amplifier impulse response. In optical communi-
cations with coherent optical detection, hRx(t) is obtained as the convolution of
impulse responses of photodetector impulse response, front end with
418 6 Advanced Detection Techniques and Compensation of Channel Impairments
z(t)
Fig. 6.7 Equivalent low-pass wireless/optical channel model (only single polarization is observed
to facilitate explanations)
where the term bmh(0) corresponds to the transmitted symbol, while the second
term represents the intersymbol interference (ISI) term. The second term can
disappear if ISI-free optical transmission is achieved, which is possible when the
transmitter and receiver are properly designed such that the equivalent impulse
response satisfies the following condition:
h0 ¼ 1, k ¼ 0
hðkT Þ ¼ ð6:117Þ
0, k 6¼ 0
X
1
k
H fþ ¼ T, ð6:118Þ
k¼1
T
6.3 Channel Equalization Techniques 419
then there will not be ISI at sampling time instances. This claim is known as
Nyquist’s criterion for zero-ISI and can be used in design of all channel equalizers.
Above claim is quite straightforward to prove. Let us start with inverse Fourier
transform definition, and let us split the integration interval into frequency bands of
bandwidth 1/T, so we have that:
ð =2T
ð2kþ1Þ
ð
1
X
1
hðtÞ ¼ FT 1 fH ðf Þg ¼ Hðf Þej2πft df ¼ Hðf Þej2πft df : ð6:119Þ
k¼1
1 =2T
ð2k1Þ
ð =2T
ð2kþ1Þ
X
1
hðmT Þ ¼ H ðf Þej2πfmT df : ð6:120Þ
k¼1
=2T
ð2k1Þ
T
=ð2T 1
=ð2T zfflfflfflfflfflfflfflfflfflfflfflfflffl}|fflfflfflfflfflfflfflfflfflfflfflfflffl{
1
X
1 X1
0 j2πf 0 mT 0 0
hðmT Þ ¼ H ðf þ k=T Þe df ¼ H ðf 0 þ k=T Þ ej2πf mT df 0
k¼1 k¼1
1=2T 1=2T
=ð2T
1
0 sin ðmπ Þ 1 m¼0
¼ Tej2πf mT df 0 ¼ ¼
mπ 0 m¼
6 0
1=2T
ð6:121Þ
We can see from Eq. (6.121) that ISI term disappeared, which proves that the
Nyquist’s criterion indeed yields to zero-ISI among symbols. The channel with
frequency response satisfying Eq. (6.118) with a single term is known as the ideal
Nyquist channel. The transfer function of the ideal Nyquist channel has rectangular
form given as H( f ) ¼ (1/Rs)rect( f/Rs) (Rs, the symbol rate, defined as Rs ¼ 1/T ),
while corresponding impulse response is given as:
sin ðπt=T Þ
hð t Þ ¼ ¼ sincðt=T Þ, ð6:122Þ
πt=T
8
< T 0 jf j ð1 βÞ=2T
H RC ðf Þ ¼ T 1
: 1 sin πT jf j =β ð1 βÞ=2T jf j ð1 þ βÞ=2T
2 2T
ð6:123Þ
The parameter β from Eqs. (6.123) and (6.124) is known as rolloff factor and
determines the bandwidth required to accommodate the raised cosine spectrum,
which is given by BW ¼ (1 + β)/(2 T). The raised cosine spectrum reduces to the
ideal Nyquist channel if β ¼ 0. It is evident from raised cosine filter impulse
response that in addition to zero-crossings at
T,
2 T, . . ., there are additional
zero-crossings at points
3 T/2,
5 T/2, . . .. The RC impulse responses and spectra
for several rolloff factors are illustrated in Fig. 6.8.
0.8
0.6
0.4
β=0
h(t)
0.2 β=0.5
β=1
-0.2
-0.4 t / Ts
-4 -3 -2 -1 0 1 2 3 4
(a)
1
0.9
β=0.5
0.8
0.7 β=0
β=1
0.6
H ( f ) 0.5
0.4
0.3
0.2
0.1
0 f Ts
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
(b)
Fig. 6.8 Raised-cosine function: (a) impulse response and (b) frequency response
6.3 Channel Equalization Techniques 421
or in frequency domain:
jH RC j ¼ jH Tx H c H Rx j: ð6:126Þ
When these two criteria are combined, we obtain that the following is valid:
pffiffiffiffiffiffiffiffiffi
H RC pffiffiffiffiffiffiffiffiffi
jH Tx j ¼ , jHRx j ¼ H RC : ð6:128Þ
jH c j
Notice that this still represents an approximate solution, as two problems get
solved independently and then get combined.
In our discussion above, we considered the ISI as detrimental effect. However,
by inserting the ISI in controllable manner, it is possible to transmit signal at
Nyquist rate of 2BW, where BW is the bandwidth of the channel. The systems
using this strategy are known as partial-response (PR) signaling schemes, and they
are widely used in magnetic recording and various digital communications [1, 32,
33]. The impulse response of PR systems is given as:
X
N 1
hð t Þ ¼ wn sincðt=T nÞ: ð6:129Þ
n¼0
The common PR signaling schemes are listed in Table 6.1. For instance, the
scheme with N ¼ 2 is known as a duobinary scheme, while the scheme with N ¼ 3
and weight coefficients 1, 0, 1 is known as modified duobinary scheme.
422 6 Advanced Detection Techniques and Compensation of Channel Impairments
Hc(ω) Heq(ω)
Dispersive
channel Equalizer
Distortionless transmission
system
(a)
x[n]
z-1 z-1 z-1
h[1] h[N]
h[0] h[2]
y[n]
(b)
Fig. 6.9 (a) Equalization principle, (b) tapped-delay-line equalizer (FIR filter)
ejωt0
H eq ðωÞ ¼ : ð6:131Þ
H c ð ωÞ
h½n ¼
h½N 1 n; n ¼ 0, 1, , N 1
ð6:132Þ
H ðzÞ ¼ Zfh½ng ¼
zðN1Þ H ðz1 Þ,
where with Z{} presents the z-transform of impulse response h[n], as defined in
Chap. 3. From symmetry property (6.132), we conclude that the roots of H(z) must
be the same as roots of H(z1), which indicates that the roots of H(z) must occur in
reciprocal pairs: zk, zk1. Moreover, for filter coefficients to be real-valued, the roots
must appear in complex-conjugate pairs: zk, zk1, z*k, z*k1.
The windowing method starts with a specified filter order N (N is typically an
even integer), and for a given sampling interval Ts, the following steps are taken:
(i) set the constant time delay t0 ¼ (N/2)/Ts; (ii) take the inverse Fourier transform
of Heq(ω) to obtain a desired impulse response heq(t); and (iii) set h[n] ¼ w[n]
heq[nTs], where w[n] is a window of length (N + 1). The simplest windowing
function is a “rectangular window” given by:
1, n ¼ 0, 1, . . . , N 1
w ð nÞ ¼ : ð6:133Þ
0, otherwise
Tapered windows reduce the Gibbs ringing, but increase the transition band-
width (they provide better smoothing, but less sharp transition).
In fiber-optics communications, the first-order polarization-mode dispersion
(PMD) can be compensated by using four FIR filters. The output symbols in
x-polarization can be determined by [21]:
X
N 1
T 0 T 0
x½k ¼ hxx x þ hxy y ¼ hxx ½nx0 ½k n þ hxy ½ny0 ½k n ð6:135Þ
n¼0
where hij (i,j2{x,y}) are responses of FIR filters, each with N taps. The
corresponding equation to determine the symbols in y-polarization can be written
in a similar fashion, and the PDM compensation procedure can be summarized as
shown in Fig. 6.10.
The design of an FIR equalizer to compensate for chromatic dispersion in fiber-
optics communications is a straightforward procedure when the windowing method
is used. As shown in Chap. 2, the impact of chromatic dispersion can be described
by the following transfer function:
Hc ðωÞ ¼ exp j β2 ω2 =2 þ β3 ω3 =6 L , ð6:136Þ
X
N 1
H ðΩÞ ¼ h½nejΩn , ð6:139Þ
n¼0
1 zN X N 1
H ðk Þ
H ðzÞ ¼ ¼ Hcomb ðzÞH bank ðzÞ, ð6:140Þ
N ffl} k¼0 1 ej2πk=N z1
|fflfflfflffl{zfflfflffl
|fflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
H comb ðzÞ
H bank ðzÞ
where Hcomb(z) represents the all-zero system or a comb filter, with equally spaced
zeros located at the unit circle (zk ¼ ej2π(k+α)/N, with α ¼ 0 or 0.5), while Hbank(z)
consists of a parallel bank of single-pole filters with resonant frequencies equal to
pk ¼ ej2π(k+α)/N. The unit-sample impulse response h[n] needs now to be determined
from H(z). The main drawback of this method is nonexistence of control of H(Ω) at
frequencies in between points Ωk.
In practice, the optimum Equiripple method is used to control H(Ω). Namely, the
frequency response H(Ω) of actual equalizer is different from desired function
Hd(Ω). Consequently, the error function E(Ω) can be found as difference between
the desired and actual frequency responses:
where W(Ω) is known as a weighting function. The key idea behind this method is
to determine the h[k] by minimizing the maximum absolute error (the minimax
criterion), which can be expressed as:
h^½n ¼ arg min max jEðΩÞj , ð6:142Þ
over hðnÞ Ω2S
where S denotes the disjoint union of frequency bands over which the optimization
is performed. For linear-phase FIR filter design, it is possible to use Remez
algorithm [26]. On the other side, for problems involving both quadratic and
cubic phase terms, the Chebyshev approximation method can be used instead.
We can conclude from Eq. (6.137) that chromatic dispersion compensator is
essentially an all-pass filter with constant magnitude of the response, jH(Ω)j ¼ 1,
426 6 Advanced Detection Techniques and Compensation of Channel Impairments
Aðz1 Þ XN
H ðzÞ ¼ zN , AðzÞ ¼ 1 þ a½nzn ð6:143Þ
AðzÞ n¼1
with response magnitudes jH ðωÞj2 ¼ H ðzÞH ðz1 Þ z¼ejΩ ¼ 1. Upon factorization, the
system function of an all-pass filter is given by [26]:
YNr
z1 αk Y Nc
ðz1 βk Þ z1 β∗
H ðzÞ ¼ k
; jαk j < 1, jβk j < 1, ð6:144Þ
k¼1
1 αk z1 k¼1 ð1 βk z1 Þ 1 β∗
k z
1
where Nr is the number of sections with simple poles, while Nc is the number of
sections with complex-conjugate poles. By interpreting the chromatic dispersion
compensator design as the all-pass filter design, it is expected that the number of
taps will be smaller than that needed in FIR filter design (for which the number of
taps is a linear function of fiber length). It is evident from Eq. (6.144) that the
all-pass filter is essentially infinite impulse response (IIR) filter. Additional details
on IIR all-pass filter design can be found in [27, 28].
The function of FIR/IIR equalizers described above is to ensure the zero-ISI at
all instances t ¼ nT, except for n ¼ 0. Because of that, they are also known as the
zero-forcing equalizers. However, the problem in their employment is that the
Gaussian noise, chromatic dispersion, and PMD in fiber-optics communications
all act together, similarly to multipath fading and Gaussian noise in wireless
communication, affecting the behavior of a transmission system in a combined
manner, while transversal equalizers ignore the effect of channel noise. This leads
to the noise enhancement phenomenon, which can be explained as follows. Let us
again consider the model shown in Fig. 6.9, but now with the impulse response of
receive filter being decomposed into matched filter impulse response and equalizer
impulse response:
N 0 j H T ðf Þj 2
PSDN0 ðf Þ ¼ , ð6:147Þ
2 jH c ðf Þj2
We can see that the ISI is compensated for, but the noise is enhanced unless we
have that |HTx( f )| ¼ |Hc( f )|.
The better approach for receiver design, which avoids the noise enhancement
phenomenon, would be to use the minimum mean-square error (MMSE) criterion
to determine the equalizer coefficients, which provides a balanced solution to the
problem by taking the effects of both channel noise and ISI into account. Let hRx(t)
be the receiver filter impulse response and x(t) be the channel output determined by:
X
x ðt Þ ¼ sk qðt kT Þ þ zðtÞ, qðtÞ ¼ hTx ðtÞ∗hc ðtÞ: ð6:148Þ
k
where hTx(t) is the transmit filter impulse response, hc(t) is the channel impulse
response, sk is the transmitted symbol at k-th time instance, and z(t) is the additive
channel noise. (As before, T denotes the symbol duration.) The receive filter output
can be determined by convolution of receive filter impulse response and
corresponding input as:
ð
1
X ð
1
The signal error can be defined as a difference between receive sample and
transmitted symbol, as follows:
en ¼ yðnT Þ sn ¼ ζ n þ zn sn : ð6:151Þ
1 2 1 2 1 2 1 2
MSE ¼ e ¼ ζ n þ zn þ sn þ hζ n zn i hζ n sn i hzn sn i
2 n 2 2 2 |{z} |fflffl{zfflffl} Ð |fflffl{zfflffl} |fflffl{zfflffl}
¼0 1 ¼0
¼1 hRx ðτÞqðτÞdτ
1
ð6:152Þ
Assuming the stationary environment, the equation above can be rewritten as:
ð 1
1 ð
1 1 N0
MSE ¼ þ Rq ðt τÞ þ δðt τÞ hRx ðtÞhRx ðτÞdtdτ
2 2 2
1 1
ð
1 ð6:153Þ
hRx ðtÞqðtÞdt,
1
where Rq(τ) is the autocorrelation function of q(t) and N0 is the power spectral
density of Gaussian noise. In order to determine the optimum filter in the MMSE
sense, we have to find the derivative of MSE with respect to hRz(t) and set it to zero,
which yields to:
ð
1
N0
Rq ðt τÞ þ δðt τÞ hRx ðτÞdτ ¼ qðtÞ: ð6:154Þ
2
1
By applying the Fourier transform (FT) of the equation above and solving it for
receive filter transfer function HRx( f ) ¼ FT[hRx(t)], we obtain the following:
Q ∗ ðf Þ 1
H Rx ðf Þ ¼ ¼ Q ∗ ðf Þ , ð6:155Þ
Sq ðf Þ þ N20 Sq ðf Þ þ N20
|fflfflfflfflfflffl{zfflfflfflfflfflffl}
H eq ðf Þ
Transversal equalizer
x(t)
q(-t) z-1 z-1 z-1 z-1
c-N c-N+1 cn cN-1 cN
Matched
filter
y(t) y(nT)
We have already discussed in Sect. 6.1.5 how to estimate a certain signal param-
eters in the presence of additive noise. In this section, we extend that study to
estimation of random vector s (of length N ) from the received vector r. We are
specifically interested in linear (unbiased) minimum error variance estimation
[2]. Namely, we would like our estimate to be a linear function of a received vector,
which can be expressed as:
s^ ¼ Ar þ b, ð6:156Þ
where A and b are matrix and vector, respectively, that need to be determined. The
vector b can be determined from the requirement for estimate to be unbiased as
follows:
b ¼ ms Amr : ð6:158Þ
The matrix A can be determined from condition that trace of covariance matrix,
defined as:
CovðεÞ ¼ εεT , ð6:160Þ
430 6 Advanced Detection Techniques and Compensation of Channel Impairments
The orthogonality principle indicates that error vector is independent of the data.
By substituting Eq. (6.159) into Eq. (6.161), and by solving for A, we obtain:
n o
A ¼ CrsT C1
r ; Crs ¼ E ðr mr Þðx ms Þ
T
, Cr
n o
¼ E ðr m r Þðr m r ÞT , ð6:162Þ
x^ ¼ CrsT C1
r ðr m r Þ þ m s , ð6:163Þ
which represents the most general form of the Wiener filter. The minimum error
variance of this estimator is given by:
εεT ¼ Cs Csr C1
r Csr :
T
ð6:164Þ
… Variable
w0 w1 wN-1 wN weights
…
y[n]
e[n]
Error signal
d[n]
Desired response
1
wk ½n þ 1 ¼ wk ½n þ μf∇k ½ng; k ¼ 0, 1, . . . , N ð6:165Þ
2
X
N
e ½ n ¼ d ½ n wk ½nx½n k: ð6:166Þ
k¼0
∂ 2
∇ k ½ n ¼ e ½n ¼ 2he½nx½n ki ¼ 2REX ½k; k ¼ 0, 1, . . . , N
∂wk ½n
ð6:167Þ
where REX[k] is the crosscorrelation function between the error signal and adaptive
filter input. By substituting Eq. (6.167) into Eq. (6.165), we obtain the following
form of steepest descent algorithm:
It can be shown that for this algorithm to converge, the following condition for
the parameter μ should be satisfied:
432 6 Advanced Detection Techniques and Compensation of Channel Impairments
where μmax is the largest eigenvalue of the correlation matrix of the filter input RX:
2 3
R X ð 0Þ RX ð 1Þ ... R X ðN Þ
6 R X ð 1Þ RX ð 0Þ . . . R X ð N 1Þ 7
RX ¼ 6
4 ...
7, RX ðlÞ ¼ hx½nx½n li: ð6:170Þ
5
... ... ...
RX ð N Þ RX ð N 1Þ ... RX ð0Þ
The main drawback of the steepest descent algorithm is that it requires the
knowledge of gradient ∇k in each iteration. On the other side, the key idea in
LMS algorithm is to approximate the operator of averaging 〈.〉 in Eq. (6.167) by its
instantaneous value e[n]x[nk], so that the LMS weight update rule is simply:
ðLMSÞ ðLMSÞ
wk ½n þ 1 ¼ wk ½n þ μe½nx½n k; k ¼ 0, 1, . . . , N ð6:171Þ
The first term on the right side h[0]x[n] represents the desired data symbol; the
second term is a function of previous samples only (where the channel coefficients
Transmitted symbol
estimate
Input sequence r[n]
Feedforward + Decision
x[n] section device
− b̂ [ n ]
Feedback
section
x[n]
z−1 z−1 z−1
g[3]
Σ g[2]
Σ g[1]
Σ
are known as precursors), while the third term is a function of incoming samples,
with channel coefficients being known as post-cursors. The DFE is composed of a
feedforward equalizer (FFE) section, a feedback equalizer (FBE) section, and a
decision device, as shown in Fig. 6.13.
The feedforward and feedback sections can be implemented as FIR filters
(transversal equalizers) and can also be adaptive. The input to the detector can be
written as:
X
N FFE X
N FBE
where f[n] and g[n] are values of adjustable taps in feedforward and feedback
sections, respectively. The NFFE (NFBE) denotes the number of taps in feedforward
(feedback) section.
We can see that the feedforward section is a fractionally spaced equalizer, which
operates with rate equal to an integer multiple of the symbol rate (1/Td ¼ m/T, m is
an integer). The taps in feedforward and feedback sections are typically chosen
based on MSE criterion, by employing the LMS algorithm. An example of the
adaptive decision-feedback equalizer is shown in Fig. 6.14. Since the transmitted
symbol estimate is dependent on previous decisions, this equalizer is a nonlinear
functional element. If previous decisions are in error, the error propagation effect
will occur. However, the errors do not persist indefinitely, but rather occur in bursts.
z(t)
Combined channel h(t)=hTx(t)∗hc(t)
d(t) c(t) Estimated data
Transmitter filter Optical/wireless Matched filter MLSD
hTx(t) channel hc(t) h(-t) (MLSE) sequence sL
r(t)
d ( t ) = ∑ sk δ ( t − kTs )
k
Fig. 6.15 Equivalent system model to study MLSD (to facilitate explanations only single
polarization case is studied)
symbols {sk} in a way to maximize the likelihood function of received signal r(t).
The equivalent system model that illustrates MLSD is shown in Fig. 6.15.
The received signal r(t) can be expressed in terms of a complete set of ortho-
normal basis functions {Φn(t)} as follows:
X
N
r ðt Þ ¼ r n Φn ðtÞ, ð6:174Þ
n¼1
where
X
1 X
L
rn ¼ sk hnk þ zn ¼ sk hnk þ zn ;
k¼1 k¼0
ð
LT ð
LT ð6:175Þ
hnk ¼ hð t kT ÞΦ∗
n ðtÞdt; zn ¼ zðtÞΦ∗
n ðtÞdt; hðtÞ ¼ hTx ðtÞ∗hc ðtÞ:
0 0
The impulse responses hTx(t) and hc(t) used in the equation above denote
(as before) impulse responses of transmitter and channel, respectively. The
N denotes the cardinality of the basis set, L is the channel memory expressed in
number of symbols, and h(t) is the combined channel impulse response (the
convolution of transmit and channel impulse responses). Since zn are Gaussian
random variables, the distribution of r[1,N] ¼ [r1 r2 . . . rN]T is a multivariate
Gaussian:
8 2 2 3 9
YN < XL =
1 1
f ðr½1; N js½0; L; hðtÞÞ ¼ exp4 r n sk hnk 5 : ð6:176Þ
n¼1
: πN 0 N 0 k¼0
;
where N0 is the power spectral density of the Gaussian noise. The MLSD decides in
favor of the symbol sequence s[0,L] ¼ [s0 s1 . . . sL] that maximizes the likelihood
function given by Eq. (6.176), so that we can write:
6.3 Channel Equalization Techniques 435
2
2 3
X N X L
s^½0; L ¼ argmax f ðy½1; N js½0; L; hðtÞÞ ¼ argmax 4 r n sk hnk 5
s½0;L s½0;L n¼1
k¼0
( " # )
X X N XX X N
¼ argmax 2Re s∗
k r n h∗
nk sk s∗
m hnk h∗
nm :
s½0;L k n¼1 k m n¼1
ð6:177Þ
By using substitution u(t) ¼ h(t) ∗ h∗(t) and noticing that the following is
valid:
X
N ð
1
∗
r n hnk ¼ r ðτÞh∗ ðτ kT Þdτ ¼ c½k,
n¼1
1
ð
1 ð6:178Þ
X
N
∗
hnk hnm ¼ hðτ kT Þh∗ ðτ mT Þdτ ¼ uðmT kT Þ ¼ u½m k
n¼1
1
Equation (6.179) can efficiently be calculated by Viterbi algorithm [1]; see also
Chap. 9. However, Viterbi algorithm provides the hard decisions and as such is not
suitable for use with soft-decision decoding/detection schemes. To fully exploit the
advantages of soft decoding, the soft reliabilities are needed. These reliabilities can
be obtained by soft-output Viterbi algorithm (SOVA) [37], BCJR algorithm [38], or
by Monte Carlo-based equalization [39]. To further improve the BER performance,
we can perform the iteration of extrinsic information between soft equalizer and
soft decoder, the procedure known as turbo equalization [40–42], which will be
described in Chap. 9. The turbo equalization scheme can be used in fiber-optics
communications to simultaneously compensate for chromatic dispersion, PMD,
PDL, and fiber nonlinearities, as shown in [43].
If Gaussian-like approximation is not valid, which is the case with the presence
of strong fiber nonlinearities in fiber-optics communications or in satellite commu-
nications, the conditional PDF f(r[1, N]| s[0, L], h(t)) should be estimated from
histograms, by propagating the sufficiently long training sequence.
436 6 Advanced Detection Techniques and Compensation of Channel Impairments
In MMSE equalizer, the use of training sequences is needed for initial adjustment of
equalizer coefficients. However, the adjustment of equalizer coefficients can be
done without using the training sequences, and this approach is known as blind
equalization (or self-recovery equalization) [44–50]. All blind equalizers can be
classified into three broad categories [1]: (i) steepest descent algorithm based,
(ii) high-order statistics based, and (ii) maximum likelihood approach based.
To facilitate explanation of blind equalization, let us observe a signal polariza-
tion state. The output of optical fiber channel upon balanced coherent detection,
assuming only either x- or y-polarization can be expressed as:
X
K
r ½ n ¼ h½ka½n k þ z½n, ð6:180Þ
k¼0
where h[n] represents the optical channel impulse response (in either x- or
y-polarization), a[n] is transmitted sequence of symbols, and z[n] are samples of
additive Gaussian noise. The joint PDF of received sequence r[1,L] ¼ [r1 r2 . . . rL]T,
under Gaussian noise assumption and for given impulse response vector h[0,
K] ¼ [h0 h1 . . . hK]T and transmitted sequence a[1,L] ¼ [a1 . . . aL], can be written as:
1
f R ðrjh; aÞ ¼ ðπN 0 ÞL exp kr Ahk2 ,
N0
2 3
a1 0 0 0
6 7
6 a2 a1 0 0 7 ð6:181Þ
6 7
A¼6 a
6 3 a 2 a 1 0 7:
7
6 7
4⋮ ⋮ ⋮ ⋱ ⋮ 5
aL aL1 aL2 aLK
When training sequence is used and data vector a is known, the ML estimate of
channel impulse response can be obtained by maximizing the likelihood function
(6.181) to obtain:
1
hML ðaÞ ¼ A{ A AT r: ð6:182Þ
On the other hand, when the channel impulse response is known, we can use the
Viterbi equalizer, described in the section above, to detect the most likely trans-
mitted sequence a. However, when neither a or h are known, we will need to
determine them in such a way that the likelihood function from Eq. (6.181) is
maximized. As an alternative solution, we can estimate h from fR(r|h), which is
obtained by averaging overall possible data sequences (MK in total, where M is the
signal constellation size). In other words, the conditional PDF can be determined as:
6.3 Channel Equalization Techniques 437
X
MK
f R ðrjhÞ ¼ f R ðrjh; aÞP aðkÞ : ð6:183Þ
k¼1
The estimate of h that maximizes this new likelihood function from Eq. (6.183)
can be obtained from the first derivative of fR(r|h) with respect to h, which is set to
zero, to obtain:
" #1
X X
ðkÞ krAðkÞ hðiÞ k =N 0
AðkÞ{ rekrA k
2 ðk Þ ði Þ 2
ðiþ1Þ ðkÞ{
h ¼ A A e P aðkÞ h =N 0
P aðkÞ :
k k
ð6:184Þ
In the second stage, we select the data sequence that minimizes Euclidean
distance for all channel estimates:
2
a^ ¼ argmin r AðkÞ hML aðkÞ : ð6:187Þ
aðkÞ
where c1 and c2 are properly chosen positive constants while a~½n is decision circuit
output as shown in Fig. 6.16. In the same figure, we also provide the update rule for
adaptive equalizer tap coefficients, which is applicable to all three nonlinear
functions described above.
The Godard’s algorithm belongs to the class of steepest descent algorithms, and
it is widely used when the training sequence is not available. The Godard’s scheme
is suitable for simultaneous blind adaptive equalization and carrier-phase tracking,
as shown in Fig. 6.17. With rI[n] and rQ[n] we denoted the in-phase and quadrature
components of the received signal, after either wireless coherent detection or
optical coherent detection. The equalizer output is represented by discrete-time
6.3 Channel Equalization Techniques 439
e − jφk
ˆ
Carrier
tracking
Fig. 6.17 The Godard’s scheme for simultaneous blind equalization and carrier-phase tracking
convolution of input complex sequence r[n] ¼ (rI[n], rQ[n]) and the equalizer tap
coefficients w[n] given by:
X
K
a^½k ¼ w½nr ½k n: ð6:192Þ
n¼K
This output is multiplied with exp jϕ b k is the carrier-phase estimate
b k , where ϕ
at k-th time instance (symbol interval). The error signal can be defined as:
b k a^½k,
e½k ¼ a½k exp jϕ ð6:193Þ
which assumes that a[k] were known. The MSE can be minimized with respect to
equalizer tap coefficients and carrier-phase estimate to become:
2
b k ; w ¼ argmin E a½k exp jϕ
ϕ b k a^½k : ð6:194Þ
bϕk, w
The LMS-like algorithm can be used to determine the carrier-phase estimate and
equalizer tap coefficients, respectively, as:
n
o
bk ¼ ϕ
ϕ b k þ μϕ Im a½ka^∗ ½kexp jϕ
bk ,
ð6:195Þ
w^kþ1 ¼ w^k þ μw a½k a^½kexp jϕbk :
440 6 Advanced Detection Techniques and Compensation of Channel Impairments
However, since desired sequence a[n] is not known, the algorithm above will not
converge. To solve this problem, we can use the cost function that is independent of
the carrier phase, defined as:
D E
2
C ðpÞ ¼ ½ja^½kjp ja½kjp : ð6:196Þ
where p is a positive integer ( p ¼ 2 is the most used value). However, only signal
amplitude will be equalized in this case. Another more general cost function was
introduced for Godard’s algorithm, defined as [48]:
D
2 E
D ð pÞ ¼ ja^½kjp Rp , ð6:197Þ
dD ðpÞ
wiþ1 ¼ wi μp : ð6:198Þ
dwi
where hmax is the channel impulse response sample with largest amplitude. The
inequality from Eq. (6.200) represents the necessary, but not the sufficient, condi-
tion for the convergence.
6.4 Synchronization Techniques 441
There are two basic forms of synchronization employed in digital optical receivers:
(i) carrier synchronization, in which the frequency and phase of optical carrier are
estimated, and (ii) symbol synchronization, in which instants of time at which
modulation changes its state are estimated. The synchronization problem can be
interpreted as an estimation problem with respect to statistical parameter. For
instance, maximum likelihood (ML) estimation can be straightforwardly applied
here. We can classify the various synchronization methods as data-aided and
nondata-aided ones, depending on whether a preamble is used for synchronization.
In this section, we will describe nondata-aided synchronization methods. These
methods can further be classified as: (i) conventional, phase-locked loop (PLL)-
based approaches and (ii) algorithmic approaches.
As for M-ary PSK format, we can use a variant of Costas loop of the M-th power
loop, as illustrated in Fig. 6.18. This method can easily be generalized and extended
to star-QAM constellations. However, it suffers from phase ambiguities within
[0,2π] interval, as well as the cyclic slips. Both of these problems can be solved
by differential encoding, but at the expense of SNR degradation.
The algorithmic approaches are based on specially developed DSP algorithms.
The M-ary PSK signal after wireless coherent detector or balanced coherent optical
detection can be represented as:
r ðtÞ ¼ A cos ð2πf IF t þ θ þ ϕk Þp t tg þ zðtÞ;
ð6:201Þ
ϕk ¼ k2π=M ðk ¼ 0; ; M 1Þ:
where A is an amplitude, θ is the random phase due to either laser phase noise in
optical communications or multipath delay in wireless communications, tg is the
Voltage-controlled
Oscillator (VCO) PLL
Frequency
divider (by M)
Phase-shift network
Fig. 6.18 The M-th power loop for phase recovery (in M-ary PSK systems)
442 6 Advanced Detection Techniques and Compensation of Channel Impairments
group delay, p(t) is the pulse shape used on transmitter side, z(t) is the equivalent
Gaussian noise, and fIF denotes the intermediate frequency, which is difference in
carrier frequencies of received signal and local oscillator. The basis functions to be
used at the receiver side are given by:
rffiffiffi
2
Φ1 ðtÞ ¼ cos ð2πf IF tÞ, tg t tg þ T
T
rffiffiffi ð6:202Þ
2
Φ2 ðtÞ ¼ sin ð2πf IF tÞ, tg t tg þ T
T
In similar fashion, the transmitted signal portion of r(tg) can be represented as:
s a ; θ; tg
s ak ; θ; tg ¼ 1 k ,
s2 ak ; θ; tg ð6:204Þ
Ð tg þT
s1, 2 ak ; θ; tg ¼ tg A cos ð2πf IF t þ θ þ ϕk ÞΦ1, 2 ðtÞdt
where ak is a transmitted symbol, which is equal to exp( jϕk) for M-ary PSK. By
choosing the frequencies of transmit laser and local laser oscillator so that fIF is an
integer multiple of symbol rate (1/T ), Eq. (6.204) can be simplified to:
pffiffiffi
s ak ; θ; tg pEffiffifficos ðθ þ ϕk Þ : ð6:205Þ
E sin ðθ þ ϕk Þ
The noise signal z(t) can also be represented in a vector form as:
ð tg þT
z1
z¼ , z1, 2 ¼ zðtÞΦ1, 2 ðtÞdt ð6:206Þ
z2 tg
In M-ary PSK the term ks(ak, θ, tg)k2 is constant and can be ignored, so that the
previous equation becomes:
2 T
L ak ; θ; tg ¼ exp rk tg s ak ; θ; tg : ð6:210Þ
N0
XL1
2 T
l a; θ; tg ¼ logL a; θ; tg ¼ rl tg s al ; θ; tg : ð6:212Þ
N
l¼0 0
(
implementation of the Detector
Costas loop
Error
exp(⋅) estimation
e[n]
θˆ [ n ] μ
Loop-filter
θˆ [ n + 1]
z-1
where bθ ½n is the previous estimate of a random phase, while an updated estimate
can be obtained as:
b
θ ½ n þ 1 ¼ b
θ ½n þ μe½n, ð6:215Þ
σ θ 2π
ð
2 T
1
pffiffiffiffiffieθ =2σ θ dθ,
2 2
¼ exp r tg s ak ; θ; tg ð6:216Þ
N0 k σ θ 2π
where the variance of the phase noise is given by σ 2θ ¼ 2πΔfT, with Δf being the
frequency offset. For laser phase noise, we can set Δf ¼ Δν, where Δν is the sum of
linewidths of transmit laser and local laser oscillator. The integral above can be
solved numerically or by Monte Carlo integration. The further procedure is similar
as for carrier synchronization since we have to first create the likelihood function
for the sequence of L statistically independent symbols, a ¼ [a0 . . . aL-1]T, given by
6.5 Adaptive Modulation Techniques 445
LY
1
L a; tg ¼ L ak ; tg : ð6:217Þ
l¼0
The next step is to create the log-likelihood function by l a; tg ¼ logL a; tg :
Finally, we can properly choose the error signal and create an LMS-like algorithm
for timing synchronization from the derivative
of log-likelihood function with
respect to group delay, namely, from ∂l a; tg =∂tg :
Adaptive modulation techniques [5, 11, 14, 51–56] enable spectrally efficient and
reliable transmission over time-varying wireless and optical channels. As illustrated
in Fig. 6.20, the basic premise is to estimate the channel state information (CSI) at
the receiver side and feedback this CSI estimate to the transmitter, which can be
adapted relative to the time-varying channel conditions. The nonadaptive modula-
tion techniques are designed for the worst-case scenario and require a fixed system
margin to maintain acceptable performance when the channel quality is poor.
There are many parameters that can be varied at the transmitter side depending
on the channel SNR. The most common parameters to adapt include: data rate,
launch power, error-correction strength (code rate), error probability, as well as
combinations of various adaptive techniques. In this section, we describe the
adaptive modulation techniques in the context of wireless communication systems.
However, these concepts can easily be modified for optical communication appli-
cations [53–56]. For this purpose, for discrete-time interval i, the SNR can be
defined as ρ[i] ¼ Pg[i]/N0BW, where P is the average power, g[i] ¼ |h[i]|2 is the
channel gain, N0 is the additive noise power spectral density, and BW is the channel
bandwidth. The data rate and spectral efficiency of M-ary modulation scheme are
defined respectively as R[i] ¼ log2 M[i]/T ¼ BW log2 M [i] [bits/s] and R[i]/
BW ¼ log2M[i] [bits/s/Hz], where we assumed that the channel bandwidth is
equal to the symbol rate, namely, BW ¼ 1/T.
Transmit
antenna Receive
h[i] antenna
Power
amplifier LNA
Sequence y[i] Est.
Mapper + Power I/Q
Encoder Decoder
I/Q modulator control, P[i] demodulator seq.
x[i]
ĝ [i ]
y[i]
Channel
2
ĝ [i ] = hˆ [i ] estimator
Feedback
channel delay
In variable-rate modulation technique, the data rate R[ρ] is varied relative to the
channel SNR ρ, which can be done by: (1) fixing the symbol rate to Rs ¼ 1/T and
vary signal constellation sizes for the same modulation format or employing
multiple modulation formats and (2) fixing the modulation format while varying
the symbol rate. Symbol rate variation is difficult to implement in wireless com-
munications because of the bandwidth sharing problem. However, this is typically
not a problem in optical communication systems.
The variable-power modulation technique is used to compensate for SNR
variation due to fading effects, to enable constant SNR at receiver side, which is
equivalent to the constant receiver side bit error probability. Therefore, with
variable-power adaptation technique, we effectively invert the channel fading
effects so that the channel appears as an AWGN channel at the receiver side, as
described in Chap. 4. The power adaptation policy for channel inversion is given
by:
Pð ρ Þ ρ 0
¼ , ð6:218Þ
P ρ
ρ0 ¼ 1=h1=ρi: ð6:220Þ
For Rayleigh fading, when 〈1/ρ〉 ! 1 the target bit error probability cannot be
achieved by the channel inversion technique. To solve for this problem, we can
invert the fading effects only when SNR is larger than a given threshold (cutoff)
SNR value ρtsh, and corresponding variable-power adaptation techniques are known
as the truncated channel inversion policy, which can be formulated as:
Pð ρ Þ ρ 0
¼ , ρ>ρtsh ð6:221Þ
P ρ
ð
1
1
ρ0 ¼ 1=h1=ρiρtsh , h1=ρiρtsh ¼ f ðρÞdρ: ð6:222Þ
ρ
ρtsh
ð
Pb ¼ Pb ðρÞf ðρÞdρ, is smaller than target Pb.
In adaptive coding, a stronger channel code is used when channel conditions
(or SNR) are (is) bad, while a weaker channel code is used when channel conditions
are favorable (or SNR is high).Various adaptive coding approaches include:
(i) code multiplexing, in which different channel codes are used for different
SNR ranges; (ii) rate-compatible punctured convolutional (RCPC) codes or rate-
compatible punctured LDPC codes in which error-correction strength is reduced by
puncturing a certain number of parity bits, (iii) shortening approach in which the
smaller number of information bits is transmitted for the same number of parity bits
to improve error-correction strength, (iv) re-encoding approach, in which a certain
number of bits/symbols that form the previous codeword are re-encoded with
incoming information bits to enable almost a continuous tuning of error-correction
strength (code rate) [11]; and (v) fountain codes [57], in particular Raptor codes
[58], in which error-correction strength is improved by increasing the codeword
length.
In hybrid adaptive modulation techniques, we adapt multiple parameters of the
wireless/optical communication transmission system including code rate, power,
data rate, and bit error probability. To satisfy a given performance metric, the joint
optimization of the different modulation techniques is employed. For instance, the
data rate adaptation and power adaptation can be simultaneously performed to
maximize the spectral efficiency. In adaptive modulation and coding (AMC), the
modulation format/constellation size is combined with code rate adaptation.
In incoming sections, we describe variable-power variable-rate modulation
techniques and adaptive coded modulation with more details.
Es PT
¼ ¼ ρ: ð6:223Þ
N0 N0
We use the following bit error probability bound, which is accurate within 1 dB
penalty for M 4 [5]:
448 6 Advanced Detection Techniques and Compensation of Channel Impairments
Let us now adapt the transmit power P(ρ) depending on symbol SNR ρ, subject
to the average power constraint P and an instantaneous probability of error con-
straint Pb(ρ) ¼ Pb. Given that transmitted power is adapted, the received SNR will
be ρ P(ρ)/P, while the corresponding Pb-bound can be written as:
1:5ρ PðρÞ
Pb 0:2exp , 0 ρ 30 dB, M 4: ð6:225Þ
MðρÞ 1 P
1:5 P ð ρÞ Pð ρ Þ
MðρÞ ¼ 1 þ ρ ¼ 1 þ Cf ρ , 0 ρ 30 dB, M 4, ð6:226Þ
logð5Pb Þ P P
|fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl}
Cf
where Cf ¼ 1.5/(log(5Pb)) is the correction factor, which is used to account for the
fact that non-optimized signal constellation is used. The spectral efficiency is
maximized by optimizing the 〈log2M〉 [bits/symbol], subject to (s.t.) the
corresponding power constraint as follows:
ð
þ1
P ð ρÞ
hlog2 Mi ¼ max log2 1 þ Cf ρ f ðρÞdρ,
P
0
ð6:227Þ
ð
þ1
ð
þ1 !
1 1
f ðρÞdρ ¼ Cf , ð6:229Þ
ρ Cf ρ
ρCf
6.5 Adaptive Modulation Techniques 449
which can be used to determine ρCf. On the other hand, after substituting Eq. (6.228)
into (6.227), we obtain the following expression for instantaneous data rate
[bits/symbol]:
!
ρ
log2 MðρÞ ¼ log2 : ð6:230Þ
ρ Cf
To avoid the problem associated with small SNRs tending to zero, the truncated
channel inversion-based power adaptation can be used in which we do not transmit
when SNR falls below the threshold ρtsh, which is determined to maximize the
spectral efficiency below:
" #
R 1
¼ max log2 1 þ Cf Pðρ > ρtsh Þ: ð6:233Þ
BW ρtsh h1=ρiρtsh
450 6 Advanced Detection Techniques and Compensation of Channel Impairments
Rayleigh fading:
10 Shanon capacity
-3
M-QAM, Pb=10
-6
M-QAM, Pb=10
Spectral efficiency, R/BW
8
Nakagami-2 fading:
Shanon capacity
-3
6
M-QAM, Pb=10
-6
M-QAM, Pb=10
0
0 5 10 15 20 25 30
Average signal-to-noise ratio, ρ [dB]
Fig. 6.21 Average spectral efficiencies for adaptive M-QAM in Rayleigh fading and Nakagami-2
fading
Rayleigh fading:
Water-filling capacity
Truncated channel inversion capacity
10
Zero-outage capacity
Adaptive M-QAM in Rayleigh fading by:
-3
Water-filling, Pb=10
Spectral efficiency, R/BW
-3
8 Truncated channel inversion, Pb=10
-3
Channel inversion, Pb=10
6
0
0 4 8 12 16 20 24
Average signal-to-noise ratio, ρ [dB]
Fig. 6.22 Average spectral efficiencies for various power adaptation strategies related to M-QAM
in Rayleigh fading
Nakagami-2 fading:
Water-filling capacity
Truncated channel inversion capacity
Zero-outage capacity
10 Adaptive M-QAM in Nakagami-2 fading by:
-3
Water-filling, Pb=10
Spectral efficiency, R/BW
-3
Truncated channel inversion, Pb=10
8
-3
Channel inversion, Pb=10
0
0 4 8 12 16 20 24
Average signal-to-noise ratio, ρ [dB]
Fig. 6.23 Average spectral efficiencies for various power adaptation strategies related to M-QAM
in Nakagami-2 fading
452 6 Advanced Detection Techniques and Compensation of Channel Impairments
constellation from the set of possible constellations {Mm | m ¼ 0,. ..,N} that is
smaller than M(ρ), namely, Mm M(ρ) < Mm+1. The corresponding SNR bound-
aries are defined by {ρm ¼ ρ* Mm+1 | m ¼ 0,. ..,N2}. The optimum power
adaptation policy is again water-filling, but with slightly modified expression
(6.228):
8
M ð ρÞ 1
Cf PðρÞ < , Mm < ρ=ρ∗ Mmþ1
¼ ρ ρ
P :
0, otherwise
ðMm 1Þð1=ρÞ, Mm < ρ=ρ∗ Mmþ1
¼ ð6:234Þ
0, otherwise
After substituting Eq. (6.234) into Eq. (6.227), we obtain the following expres-
sion for the spectral efficiency for discrete-rate adaptation:
X
N 1
R ρ
¼ log2 ðMm ÞP Mm ∗ < Mmþ1 : ð6:235Þ
BW m¼1 ρ
ρ∗ M
ðmþ1
X
N 1
Pm ð ρÞ
f ðρÞdρ ¼ 1: ð6:236Þ
m¼1
P
ρ∗ M m
where we used the notation bcMm to denote the largest signal constellation in the set
{Mm}smaller than or equal to the enclosed quantity. The corresponding truncated
channel inversion-based discrete-rate adaptation policy will have the following
spectral efficiency:
$ %
R 1
¼ max log2 1 þ Cf Pðρ > ρtsh Þ: ð6:238Þ
BW ρtsh h1=ρiρtsh
fMm jm¼0;1;;N1g
6.5 Adaptive Modulation Techniques 453
Lmþ1 T Lm T
pm, mþ1 ¼ , pm, m1 ¼ , pm, m ¼ 1 pm, mþ1 pm, m1 , ð6:239Þ
πm πm
where K is the Rician parameter and νD is the Doppler frequency. For Rayleigh
fading, by setting K ¼ 0, the previous equation simplifies to:
1=2
pffiffiffiffiffi ρ ρ
LðmRayleighÞ ¼ 2π νD m exp m : ð6:241Þ
ρ ρ
The average fade duration for the m-th SNR region can be determined as:
T πm
Tm ¼ ¼ : ð6:242Þ
pm, mþ1 þ pm, m1 Lmþ1 þ Lm
When compared to adaptive modulation alone, the additional coding gain can be
achieved by superimposing either trellis codes or coset codes on top of the adaptive
454 6 Advanced Detection Techniques and Compensation of Channel Impairments
modulation scheme. The key idea behind this adaptive coded modulation is to
exploit the separability of coding stage and constellation design inherent to the
coset codes [61, 62], which are described in Chap. 9. The instantaneous SNR varies
with time, which will change the distance in the received signal constellation d0(t),
and, therefore, the corresponding minimum distance between coset sequences ds
and the minimum distance between coset points dc will be time varying as well. By
using adaptive modulation in a tandem with the coset codes, we can ensure that
distances ds and dc do not vary as channel conditions change by adapting the signal
constellation size M(ρ), transmit power P(ρ), and/or symbol rate Rs(ρ) of the
transmitted signal constellation relative to the SNR, subject to an average transmit
power P constraint on SNR-dependent transmit power P(ρ). As minimum distance
does not vary as channel conditions change dmin(t) ¼ min{ds(t), dc(t)} ¼ dmin, the
adaptive coded modulation will exhibit the same coding gain as coded modulation
developed for a Gaussian-like channel with corresponding minimum codeword
distance dmin. Therefore, this adaptive coded modulation scheme requires small
changes in generic coded modulation scheme described above, as shown in
Fig. 6.24. Clearly, the coding stage does not change at all. The number of cosets
does not change as well. On the other hand, the number of points within the coset is
channel SNR dependent. When channel condition improved, we enlarge the coset
size. In such a way we transmit more uncoded bits while not affecting the distance
of the channel code. Additionally, this approach is hardware friendly.
The following approximation for bit error probability for M-ary QAM systems
can be used:
1:5ρ Gc PðρÞ
Pb 0:2exp , M 4, 0 ρ ½dB 30 dB, ð6:243Þ
MðρÞ 1 P
where Gc is the coding gain. We adjust the signal constellation size M(ρ) depending
on channel SNR and target BER as follows:
One point
One point selected out of
Additional selected out of 2[n(ρ)+r] / (N/2)
n(ρ)-k info 2n(ρ)+r possible possible Adaptive two- To
bits Signal point Constellation dimensional channel
selection mapper modulator
from coset M(ρ), P(ρ)
One coset selected Modulation stage
out of 2k+r possible
1:5 Pð ρ Þ Pð ρ Þ
M ð ρÞ ¼ 1 þ ρ Gc ¼ 1 þ Cf ρ Gc , ð6:244Þ
logð5Pb Þ P P
|fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl}
Cf
0, ρ < ρ0 =Cc
where SNR0 is the signal-to-noise ratio for AWGN channel. After substituting
Eq. (6.246) into Eq. (6.244), we obtain the following equation for adaptive signal
constellation size:
ð
1
R ρ
¼ hlog2 MðρÞi ¼ log2 f ðρÞdρ: ð6:248Þ
BW ρc
ρc
X
1
yðtÞ ¼ yn ðtÞ,
n¼0
ð
1 ð
1
where x(t) is the input to the nonlinear system, while the n-th term yn(t) represents
the n-fold convolution of the input and the n-fold impulse response hn(τ1, τn).
The set {h0, h1(τ1), h2(τ1, τ2), , hn(τ1, τ2, τn), } of impulse responses is
known as the Volterra kernel of the system. The 0-th order corresponds to
DC. component, which is not represented here, while the first-order term
corresponds to impulse response of the linear system. The first-order impulse
response can be expressed in analytical form, where the second-order GVD can
be neglected. The frequency-domain representation of Volterra series is given by
[67]:
X
1 ð
1 ð
1
Sxxxy ðf ; g; hÞ
H3 ðf ; g; hÞ ¼ ,
6Sxx ðf ÞSxx ðgÞSxx ðhÞ
1 n o
Sxx ðf Þ ¼ E jXi ðf Þj2 , Sxxxy ðf ; g; hÞ ¼ E X∗ ∗ ∗
i ðf ÞX i ðgÞX i ðhÞY i ðf þ g þ hÞ :
T
ð6:251Þ
∂Eðz; tÞ ^ ^
α β ∂
2
β ∂
3
¼ D N Eðz; tÞ, D^ ¼ j 2 2 þ 3 3 , N^ ¼ jγ E2 ð6:252Þ
∂z 2 2 ∂t 6 ∂t
where E is signal electric field, D^ and N^ denote the linear and nonlinear operators,
and α, β2, β3, and γ represent attenuation coefficient, GVD, second-order GVD, and
nonlinear coefficient, respectively. By setting that X(ω) ¼ E(ω,z) ¼ FT{E(z,t)}, the
electric field from Eq. (2.252) can be presented as [69]:
Eðω; 0ÞÐ
Ð H 1 ðω; zÞEðω; zÞþ
H 3 ðω1 ; ω2 ; ω ω1 þ ω2 ; zÞEðω1 ; zÞE∗ ðω2 ; zÞEðω ω1 þ ω2 ; zÞdω1 ω2 ,
ð6:253Þ
As we see, Eq. (6.255), fiber parameters of opposite sign are used in the design of
nonlinear equalizer based on Volterra series. For ultra-long-haul transmission
systems’ studies, the second-order GVD must be included. Also, the fifth-order
kernel term should be calculated as well. Regarding the complexity of this method,
the following rule of thumb can be used. The number of operations related for the n-
th kernel is approximately equal to the n-th power of the number of operations
needed for the first-order kernel.
Optical Optical
Tx Rx
−α , − β 2 , − β3 , − γ α , β 2 , β3 , γ
Dˆ + Nˆ
(b)
transmitter side or receiver side, as illustrated in Fig. 6.25. In the absence of noise,
those two approaches are equivalent to each other.
The backpropagation is governed by inverse NLSE, given by Eq. (6.252). The
backpropagation method operates on the signal electric field, and it is, therefore,
universal and independent on modulation format. It uses a split-step Fourier method
of reasonable high complexity to solve it. Both asymmetric and symmetric split-
step Fourier methods [74] can be used. As an illustration, we briefly describe the
iterative symmetric split-step Fourier method. Additional details can be found in
Chap. 2. The key idea of this method is to apply the linear and nonlinear operators
in an iterative fashion.
The linear operator, which corresponds to multiplication in frequency domain, is
expressed as:
exp ΔzD^ Eðz þΔz;tÞ
α β β ð6:256Þ
¼ FT 1 exp þ j 2 ω2 þ j 3 ω3 Δz FT ½Eðz þ Δz; tÞ :
2 2 6
where Δz is the step size while FT (FT1) denotes Fourier transform (inverse
Fourier transform). On the other hand, the nonlinear operator, which performs the
nonlinear phase “rotation” in time domain, is expressed as:
exp ΔzξN^ Eðz þ Δz; tÞ ¼ exp jξγΔzjEðz þ Δz; tÞj2 Eðz þ Δz; tÞ, ð6:257Þ
where 0 ξ 1 is the correction factor, which is needed to account for ASE noise-
signal nonlinear interaction during propagation.
6.7 Digital Backpropagation in Fiber-Optics Communications 459
Since the operator N^ ðzÞ ¼ jγ jEðz; tÞj2 is dependent on the output, Eq. (6.258) can
be solved in an iterative fashion, as illustrated by a flow chart in Fig. 6.26.
The operating frequency range of interest in BP method must be smaller than the
sampling rate, and therefore, the oversampling is needed. Regarding the complexity
issues, FFT complexity scales with the factor NlogN, while the filtering and
nonlinear phase rotation operations have complexity proportional to N.
Eprev(z, t)
No
|E-Eprev| / |E|<e
Yes
E(z, t)
460 6 Advanced Detection Techniques and Compensation of Channel Impairments
As for the multichannel BP, there are two options that can be applied. The first
one is to combine different WDM channels together so that electric field can be
written as:
X
Eðz; tÞ ¼ E ðz; tÞejn2πΔf ,
n n
ð6:259Þ
where Δf is the channel spacing. This approach can be called the “total-field BP”
[73]. The second approach is to consider individual WDM separately and then solve
the set of coupled inverse NLSE [74]:
∂Ei ðz; tÞ ^
¼ D i ξN^ i Ei ðz; tÞ,
∂z !
α ∂ β2 ∂
2 3
β3 ∂ ^ X 2 ð6:260Þ
^
D i ¼ β 1, i j þ , N i ¼ jγ jEi j þ
2 Ej :
2 ∂t 2 ∂t2 6 ∂t3 j6¼i
∂Eðz; tÞ ^
^ Eðz; tÞ,
¼ D ξN
∂z ð6:261Þ
2 1 {
2 3
^ α ∂ β2 ∂ β3 ∂ ^
D ¼ β1 j þ , N ¼ jγ jEj I- E YE Y ,
2 ∂t 2 ∂t2 6 ∂t3 3
where E ¼ [Ex Ey]T denotes the Jones vector of electric field, α denotes the
attenuation coefficients in x- and y-polarizations, while β1, β2, and β3 denote the
group velocity, GVD, and second-order GVD parameters in x- and y-polarizations,
respectively. Finally, with Y we denoted the Pauli-Y matrix in quantum mechanics
notation [75]. Namely, the Pauli matrices are different in quantum mechanics than
in representation used in papers and books related to optics [73, 74]. In our case
Pauli matrices are defined as
6.8 Optical Communication Systems with Coherent Optical Detection 461
0 1 0 j 1 0
X¼ ,Y ¼ , Z¼ : ð6:262Þ
1 0 j 0 0 1
If there is no possibility to track the Jones vector of each section, then the β1
should be set to zero. Otherwise, β1 is related to the polarization rotation matrix R
as follows:
δk
β1 ðθk ; εk Þ ¼ Rðθk ; εk Þ Z R{ ðθk ; εk Þ,
2
cos θk cos εk j sin θk sin εk sin θk cos εk þ j cos θk sin εk
Rðθk ; εk Þ ¼ ,
sin θk cos εk þ j cos θk sin εk cos θk cos εk j sin θk sin εk
ð6:263Þ
where 2θk and 2εk are azimuth and ellipticity angles of k-th fiber section and δk
corresponds to differential group delay (DGD) of the section. The solution of
Eq. (6.236) should be obtained by split-step Fourier method
h
i
Eðz; tÞ ¼ exp Δz D ^ Eðz þ Δz; tÞ,
^ þ ξN ð6:264Þ
where the complexity of the iteration process is higher than in the single-
polarization case.
Sn
Control
voltage (φ1)
1−κ Phase
trimmer Eo,1
κ
Eo,2
κ 1−κ
Control
voltage (φ2)
where κ is the power splitting ratio and ϕ1 is the phase shift introduced by the
control voltage 1 (phase trimmer 1). On the other hand, the output port 2 electric
field denoted as Eo,2 is related to the input port fields Sn and L by:
pffiffiffi
Eo, 2 ¼ Sn þ ejϕ2 L κ , ð6:266Þ
where ϕ2 is the phase shift introduced by the control voltage 2 (phase trimmer 2).
Previous two equations can be represented in the matrix form by:
pffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffi
ejϕ1 p1ffiffiffi κ 1 Sn
pffiffiκffi
Eo , 1
¼
Eo , 2 κ ejϕ1 κ L
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
H
pffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffi
Sn ejϕ1 p1ffiffiffi κ 1
¼H , H¼ pffiffiκffi , ð6:267Þ
L κ ejϕ1 κ
where H is the scattering matrix. For power splitting ratio κ ¼ 1/2, the scattering
matrix simplifies to:
1 ejϕ1 1
Hjκ¼1=2 ¼pffiffiffi : ð6:268Þ
2 1 ejϕ2
Let us now observe the balanced coherent optical detector shown in Fig. 6.28,
which is based on 2 2 optical hybrid shown in Fig. 6.27, characterized by power
splitting ration κ and phase shifts ϕ1 and ϕ2. Assuming that both photodetectors
have the same responsivity R and the power splitting ratio is κ ¼ 1/2, the resulting
photocurrent i ¼ i1-i2 can be written as:
i ¼ i1 i2 ¼ RjEo, 1 j2 RjEo, 2 j2
R
ð6:269Þ
¼ Sn ejϕ1 L∗ þ S∗ ne
jϕ1
L Sn L∗ ejϕ2 S∗
n Le
jϕ2
,
2
where we ignored the photodiode shot noise to facilitate the explanations. Now by
setting ϕ1 ¼ 0 and ϕ2 ¼ π, we obtain:
R ∗
∗
iðϕ1 ¼ 0;ϕ2 ¼ π Þ ¼ iI ¼ Sn L þ S∗ ∗ ∗ ∗
n L þ Sn L þ Sn L ¼ R Sn L þ Sn L
2
2 3
6 7
¼ 2RRefSn L∗ g ¼ 2RjSn jjLjcos 4ðωT ωLO Þt þ ϕT , PN ϕLO, PN þθn 5,
|fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl}
ϕPN
ð6:270Þ
which is clearly the in-phase component iI of the 2-D modulated signal. On the
other hand, by ϕ1 ¼ ϕ2 ¼ π/2, we clearly detect the quadrature component iQ of 2-D
modulated signal:
iðϕ1 ¼ π=2; ϕ2 ¼ π=2Þ ¼ iQ ¼ R jSn L∗ jS∗
nL
ð6:271Þ
¼ 2RImfSn L∗ g ¼ 2RjSn jjLj sin ½ðωT ωLO Þt þ ϕPN þ θn :
1
iI ¼ R Sn L∗ þ S∗
n L ¼ RjSn jjLj cos ½ðωT ωLO Þt þ ϕPN þ θ n ,
2
ð6:272Þ
1
iQ ¼ R jSn L∗ jS∗
n L ¼ RjSn jjLj sin ½ðωT ωLO Þt þ ϕPN þ θ n :
2
Fig. 6.29 The coherent balanced optical detector for demodulation of 2-D signals based on 2 4
optical hybrid
6.8 Optical Communication Systems with Coherent Optical Detection 465
3 dB directional couplers
based 2×4 optical hybrid
Eo,1 i1
Sn 3 dB π/2 3 dB iI=i1–i2
coupler coupler
i2
E0,2
Eo,3 i3
L 3 dB 3 dB iQ=i3–i4
coupler coupler
i4
E0,4
Fig. 6.30 The coherent balanced optical detector for demodulation of 2-D signals based on 2 4
optical hybrid implemented with the help of four3 dB directional
coupler. The scattering matrix of
1 j
3 dB directional coupler is given by H3 dB ¼pffiffi2
1
j 1
1 1 1 1
Eo, 1 ¼ ðjSn þ jLÞ, Eo, 2 ¼ ðSn þ LÞ, Eo, 3 ¼ ðjSn LÞ, Eo, 4 ¼ ðSn þ jLÞ:
2 2 2 2
ð6:273Þ
1
iI ¼ R Sn L∗ þ S∗
n L ¼ RjSn jjLj cos ½ðωT ωLO Þt þ ϕPN þ θ n ,
2 ð6:274Þ
1
iQ ¼ R jSn L∗ jS∗
n L ¼ RjSn jjLj sin ½ðωT ωLO Þt þ ϕPN þ θ n ,
2
and are identical to the corresponding equations given by (6.272), except for the
sign of quadrature component.
The 3 3 coupler, implemented in either integrated optics or fiber-optics, with
the following scattering matrix [76]:
2 3
1 1 1
1 4 2π 2π
5,
H33 ¼ pffiffiffi 1 ej 3 ej 3 ð6:275Þ
3 2π 2π
1 ej 3 ej 3
466 6 Advanced Detection Techniques and Compensation of Channel Impairments
can also be used in coherent optical detection by using Sn and L as the first two
inputs. Corresponding output port electric fields are:
2 3 2 32 3 2 3
Eo , 1 1 1 1 S n
S n þ L
1
4 Eo, 2 5 ¼ pffiffiffi 4 1
2π 2π 1 6 2π 7
ej 3 ej 3 54 L 5 ¼ pffiffiffi 4 Sn þ ej 3 L 5: ð6:276Þ
3 2π 2π 3 2π
Eo , 3 1 ej 3 ej 3 0 Sn þ ej 3 L
R R
io, 1 ¼ RjEo, 1 j2 ¼ jSn þ Lj2 ¼ jSn j2 þ jLj2 þ Sn L∗ þ S∗ n L ,
3 23
R 2π R 2π 2π
io, 2 ¼ RjEo, 2 j2 ¼ Sn þ ej 3 L ¼ jSn j2 þ jLj2 þ Sn ej 3 L∗ þ S∗n e j 3
L ,
3 3
2
R 2π R 2π 2π
io, 3 ¼ RjEo, 3 j2 ¼ Sn þ ej 3 L ¼ jSn j2 þ jLj2 þ Sn ej 3 L∗ þ S∗
ne
j 3
L :
3 3
ð6:277Þ
and this expression represents the quadrature component. On the other hand, the
in-phase component can be obtained as follows:
2R :
io, 1 þ io, 2 2io, 3 ¼ pffiffiffi jSn jjLj cos ½ðωT ωLO Þt þ ϕPN þ θn þ π=6 ¼ iI : ð6:279Þ
3
The 3 dB directional coupler together with two PBS can also be used to
implement 2 4 optical hybrid required in 2-D modulation schemes, as illustrated
in Fig. 6.31. We use |%〉 and |R〉 to denote the +π/4 and right-circular polarization
states, defined respectively as:
1 1 1 1 1 1
j%i ¼ pffiffiffi ¼ pffiffiffi ðjxi þ jyiÞ, jRi ¼ pffiffiffi ¼ pffiffiffi ðjxi þ jjyiÞ, ð6:280Þ
2 1 2 2 j 2
E0,4
Sn L
Ei, 1 ¼ Sn j%i ¼ pffiffiffi ðjxi þ jyiÞ, Ei, 2 ¼ LjRi ¼ pffiffiffi ðjxi þ jjyiÞ: ð6:281Þ
2 2
The corresponding output port electric fields are given respectively by:
1 1
Eo, 1 ¼ ðSn þ jLÞjxi, Eo, 2 ¼ ðSn LÞjyi,
2 2 ð6:282Þ
1 1
Eo, 3 ¼ ðjSn þ LÞjxi, Eo, 4 ¼ ðjSn þ jLÞjyi:
2 2
R
io, 2 io, 4 ¼ jSn Lj2 jSn þ Lj2
4
R
:
¼ Sn L∗ þ S∗ n L ¼ RjSn jjLj cos ½ðωT ωLO Þt þ ϕPN þ θ n ¼iI :
2
ð6:283Þ
R
io, 1 io, 3 ¼ jSn þ jLj2 jjSn þ Lj2
4
R
:
¼ jSn L∗ þ jS∗ n L ¼ RjSn jjLj sin ½ðωT ωLO Þt þ ϕPN þ θ n ¼iQ :
2
ð6:284Þ
SMF link
Data detected
Coherent optical Polarization Coherent
transmitter transformer
optical
Local oscillator Polarization receiver Controller
laser transformer
Photodetector
Received Decision
PBS
circuit
optical signal Photodetector
3 dB
directional
coupler
Fig. 6.33 The configuration of polarization diversity receiver. PBS: polarization beam splitter
The coherent optical receivers require matching the state of polarization (SOP) of
the local laser with that of the received optical signal. In practice, only the SOP of
local laser can be controlled; one possible configuration of the polarization control
receiver is shown in Fig. 6.32. Polarization controller from Fig. 6.32 is commonly
implemented by using four squeezers as described in [20]. Therefore, by polariza-
tion transformer, the SOP of local laser signal is changed until it matches the SOP of
received optical signal.
Receiver resilience with respect to polarization fluctuations can be improved if
the receiver derives two demodulated signals from two orthogonal polarizations of
the received signal, as illustrated in Fig. 6.33. This scheme is known as a polari-
zation diversity receiver, and it has been derived from Fig. 6.31. In polarization
diversity schemes, however, the same data sequence is transmitted over both
polarization states, which means that spectral efficiency is the same as in receivers
without polarization diversity. To double the spectral efficiency of polarization
diversity schemes, the polarization-division multiplexing can be applied [22, 23].
In polarization-division multiplexing (PDM) [22, 23], both polarizations carry
independent multilevel modulated streams, as described in Chap. 5, Sec. 5.5, which
doubles the spectral efficiency. As indicated in Chap. 5, the M-ary PSK, M-ary QAM,
and M-ary 2-D modulation schemes, in general, achieve the transmission of log2M ¼ m
bits per symbol. In M-ary PSK, the data phasor θn2{0,2π/M,..,2π(M1)/M} is sent
6.8 Optical Communication Systems with Coherent Optical Detection 469
iI(x) x-polarization
Detected sequence
2×4 state
(x-pol. state)
optical demodulator
SMF iQ(x) Compensation of
x hybrid
chromatic
PBS
dispersion,
y iI(y) y-polarization
PMD, and Detected sequence
x 2×4 state
PDL effects (y-pol. state)
Local PBS optical demodulator
laser iQ(y)
y hybrid
at each n-th transmission interval. In M-ary QAM, the mapper is typically used that
takes m bits at time instance n to determine the corresponding M-ary (M ¼ 2m)
constellation point sn ¼ (In,Qn) ¼ |sn|exp.(jθn), and corresponding coordinates after
DAC are used in RF inputs of electro-optical I/Q modulator. In PDM, two I/Q
modulators (with configuration provided in Chap. 3) and two 2-D mappers are
needed, one for each polarization. The outputs of I/Q modulators are combined
using the polarization beam combiner (PBC). The same transmit DFB laser is used
as CW source, with x- and y-polarization being separated by a polarization beam
splitter (PBS).
The corresponding coherent optical detector receiver architecture is shown in
Fig. 6.34, while the balanced coherent optical detector architecture is described
already above. The balanced output photocurrents of I- and Q-channel branches for
x-polarization at the time instance n can be written as:
0 1
B C
iI, n ’ R SðnxÞ LðxÞ cos B
ð xÞ ð xÞ ð xÞ ð xÞ C
@ωIF t þ θn þ ϕ T , PN ϕLO, PN A,
|fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl}
ðx Þ
ð6:285Þ
ϕPN
iQ, n ’ R SðnxÞ LðxÞ sin ωIF t þ θðnxÞ þ ϕPN , ϕPN ¼ ϕT , PN ϕLO, PN ,
ð xÞ ðxÞ ðxÞ ðxÞ ðxÞ
where R is photodiode responsivity while ϕT,PN and ϕLO,PN represent the laser phase
noise of transmitting and local laser oscillator, respectively. The ωIF ¼ |ωT ωLO|
denotes the intermediate frequency, while Sn(x) and L(x) represent the incoming
signal (at n-th symbol interval) in x-polarization and x-polarization output from
local laser oscillator, respectively. Similar expressions hold for y-polarization state:
iI, n ’ R SðnyÞ LðyÞ cos ωIF t þ θðnyÞ þ ϕPN ,
ðyÞ ð yÞ
ð6:286Þ
iQ, n ’ R SðnyÞ LðyÞ sin ωIF t þ θðnyÞ þ ϕPN :
ðyÞ ðyÞ
The heterodyne receiver can also be implemented based only on single balanced
detector as described in Chap. 3. For ASE noise-dominated scenario, both
470 6 Advanced Detection Techniques and Compensation of Channel Impairments
Received
optical signal
PD 1 + Data
π Data
LPF
hybrid PD 2 - detector output
PD: photodetector
Local Loop
laser filter LPF: lowpass filter
Received
optical signal
Data output
Data
PD 1 LPF
detector
π/2
hybrid
PD 2 Delay line
PD: photodetector
LPF: low-pass filter
Local Loop
laser filter
(a)
Received
optical signal
PD 1 + Data
Data
LPF
PD 2 - detector output
Optical
hybrid
PD 3 +
LPF
PD 4 -
PD: photodetector
LPF: low-pass filter
Local Loop
laser filter
(b)
Fig. 6.36 BPSK coherent optical detection receivers with: (a) decision-driven (decision-directed)
loop and (b) Costas loop. PD photodetector, LPF low-pass filter
which replaces the loop filter and local laser from Fig. 6.37. In OVCO, external
modulator, such as the Mach-Zehnder modulator, is used to change the OVCO
output frequency by ωCW
ωVCO, where ωCW is the angular frequency of contin-
uous wave (CW) laser and ωVCO is the angular frequency of the electrical VCO.
To avoid the problems associated with OPLL-based receivers, the phase diversity
receivers can be used. The general architecture of a multiport homodyne receiver is
shown in Fig. 6.39a [9, 20].
472 6 Advanced Detection Techniques and Compensation of Channel Impairments
Received
optical signal
Data Data
BD 1 LPF
detector I output I
2x4
hybrid Data
Data
BD 2 LPF
- detector Q output Q
Fig. 6.37 Decision-directed OPLL for QPSK. The configuration of balanced detector (BD) is
shown in Fig. 6.28
Mach- I(t)
Local CW Loop
Zehnder
laser filter
modulator
The incoming optical signal and local laser output signal can be written as:
SðtÞ ¼ aEs ej½ωc tþϕS ðtÞ , LðtÞ ¼ ELO ej½ωc tþϕLO ðtÞ ð6:287Þ
where the information is imposed either in amplitude a or phase ϕs. Both incoming
optical signal S and local laser output signal L are used as inputs to N output ports of
an optical hybrid, which introduces fixed phase difference k(2π/N ) (k ¼ 0,1,. . .,
N1) between the ports, so that the output electric fields can be written as:
1 h 2π
i
Ek ðtÞ ¼ pffiffiffiffi SðtÞejk N þ LðtÞ : ð6:288Þ
N
Ek ðtÞj2 þ I nk
ik ðtÞ ¼ Rj
R 2π
¼ jELO j þ ajES j þ 2ajES jjELO j cos ϕS ðtÞ ϕLO ðtÞ þ k
2 2
þ I sn, k
N N
ð6:289Þ
6.8 Optical Communication Systems with Coherent Optical Detection 473
E1
S . PD LPF Demodulator
.
Optical . Ek
. PD LPF Demodulator LPF
N-port hybrid .
L . EN
PD LPF Demodulator
(a)
ASK
Squarer
DPSK
Squarer
Demodulator
Delay, T
CPFSK
Squarer
Delay, τ
(b)
Fig. 6.39 Phase diversity receivers (a) and demodulator configurations (b)
where Isn,k is the k-th photodetector shot noise sample. Different versions of
demodulators for ASK, DPSK, and DPFSK are shown in Fig. 6.39b. For ASK we
have simply to square photodetector outputs and add them together to get:
X
N
y¼ i2k : ð6:290Þ
k¼1
In this section we will outline the noise processes due to phase, polarization, and
intensity variations in coherent optical detector; more detailed description of other
optical relevant channel impairments has been already provided in Chap. 2.
Ps /πΔν
Δν
ν0 ν
where ϕn(t) is the laser phase noise process. We can also assume that corresponding
PSD of x(t) can be expressed as Lorentzian curve. For this purpose, we can express
the PSD of Eq. (6.292) in a simplified form as:
ν ν 2 1
2PS 0
PSDx ðνÞ ¼ 1þ 2 ð6:292Þ
π Δν Δν
which is shown in Fig. 6.40. The laser phase noise expressed through the spectral
linewidth will cause bit error probability degradation.
As an illustration, the impact of the laser phase noise to BPSK performance is
illustrated in Fig. 6.41. As we can see, the effect of phase noise on BER curves is
twofold: (i) the BER curves are shifted to the right and (ii) BER floor appears. In the
design of advanced coherent detection schemes, the impact of the laser phase noise
is mitigated by digital signal processing that takes place after photodetection, and it
does impose a serious limitation if spectral linewidth is measured by hundreds of
kilohertz. Moreover, for higher multilevel modulation schemes, such as M-ary
QAM, the laser phase noise can cause larger performance degradation.
Polarization noise, which comes from discrepancies between the SOP of incoming
optical signal and local laser oscillator, is another factor that causes performance
degradation in coherent receiver schemes. In order to mitigate its impact, several
avoidance techniques have been considered. These techniques can be classified as
follows: (i) polarization control, (ii) employment of polarization-maintaining fibers,
(iii) polarization scrambling, (iv) polarization diversity, and (v) polarization-
division multiplexing. The employment of polarization control, polarization diver-
sity, and polarization-division demultiplexing has already been discussed above.
6.8 Optical Communication Systems with Coherent Optical Detection 475
-2
10
-4
10 o
σ φ =20
-6
Bit error probability, Pb
10
Ide
o
16
al
-8
10
ca
Real case o
14
se
-10
10
Δν(
=0
-12 o
10 12
)
-14
10
Power penalty
-16
10 o
σφ=0
o 10
-18
10 BER floor
-20
10
6 8 10 12 14 16 18 20 22 24
Number of photons per bit, np [ d B ]
Fig. 6.41 Probability of error vs. number of photons per bit in the presence of the laser phase noise
for homodyne BPSK signaling
The polarized electromagnetic field launched into the fiber can be represented
as:
ex ðtÞ jωc t
EðtÞ ¼ e , ð6:293Þ
ey ðtÞ
where ex and ey represent two orthogonal SOP components and ωc is the optical
carrier frequency. The received field can be represented by:
0 ex ðtÞ jωc t
ES ðtÞ ¼ H e ð6:294Þ
ex ðtÞ
launched SOP, on the surface of the Poincaré sphere. This rotation can also be
represented in terms of rotation matrices Ri (i ¼ 1,2,3) for angles αi around axes si.
These matrices can be represented as [75]:
" #
cos ðα1 =2Þ j sin ðα1 =2Þ
R1 ðα1 Þ ¼ ,
j sin ðα1 =2Þ cos ðα1 =2Þ
" #
cos ðα2 =2Þ sin ðα2 =2Þ
R2 ðα2 Þ ¼ , ð6:296Þ
sin ðα2 =2Þ cos ðα2 =2Þ
" #
ejα3 =2 0
R3 ðα3 Þ ¼ :
jα3 =2
0 e
If we assume that the SOP of local laser oscillator is aligned with s1-axis (whose
Jones vector is given by ELO ¼ [ex(t) 0]T) in Stokes space, we can establish the
relationship between received and local laser SOPs in terms of spherical coordi-
nates (r,2ε,2η) (see Fig. 2.2 in Chap. 2) as:
0
ex ðt Þ jη
ey ðtÞ ¼ cos ðεÞ sin ðεÞ e ex ðtÞ
0 0
¼
|fflfflfflffl{zfflfflfflffl} sin ðεÞ cos ðεÞ 0 ejη 0
ES |fflfflfflffl{zfflfflfflffl}
ELO
ejη cos ðεÞ
¼ e ðtÞ: ð6:297Þ
ejη sin ðεÞ x
The ratio between the power of heterodyned component (aligned with local
laser) and the total power is given by:
RL
Rf
uout
The intensity noise comes from the variation of optical power of transmitting
laser P ¼ 〈P〉 + ΔP (〈〉 denotes, as before, the statistical averaging). The relative
intensity noise is defined as RIN ¼ 〈ΔP2〉/〈P〉2. Because the power of transmitting
laser fluctuates, the photocurrent fluctuates as well, I ¼ 〈I〉 + ΔI . The corresponding
shot noise PSD can be determined as 2q〈I〉 ¼ 2qR〈P〉. The intensity noise PSD is
simply 〈ΔI2〉 ¼ R2RIN〈P〉2. The SNR in the presence of shot, receiver, and RIN can
be determined as signal power over total noise power:
2R2 PS PLO
SNR ¼ , ð6:302Þ
2qRPLO BW þ RIN R2 P2LO BW þ PSDrec BW
where BW is the receiver bandwidth and PSDrec is introduced by Eq. (6.300). The
SNR for balanced coherent optical reception can be written as:
478 6 Advanced Detection Techniques and Compensation of Channel Impairments
2R2 PS PLO
SNR ¼ ð6:303Þ
2qRPLO BW þ CMRR
RIN
R2 P2LO BW þ 2PSDrec BW
where CMRR is the common mode rejection ratio of FET. Therefore, the RIN of
balanced receiver is significantly reduced by balanced detection.
In the rest of this section, we describe the coherent optical detection in the presence
of amplified spontaneous emission (ASE) noise. To facilitate explanations, we
return to the basic balanced coherent optical detector, shown in Fig. 6.28. The
2 2 optical hybrid output port electric field for κ ¼ 1/2, ϕ1 ¼ 0, and ϕ2 ¼ π can be
written as follows:
1 1
Eo;1 ¼ pffiffiffi ðSn þ Z þ LÞ, Eo,2 ¼ pffiffiffi ðSn þ Z LÞ, ð6:304Þ
2 2
where we use Z to denote the ASE noise vector, which can be represented as Z ¼ z
exp( jωTt), where ωT is the angular frequency of the transmit laser. Further, z can be
decomposed in terms of x- and y-polarization states by z ¼ zx |x〉 + zy |y〉. The
photocurrent i1 now becomes:
R
i1 ¼ RjEo, 1 j2 ¼ ðSn þ Z þ LÞ S∗ ∗
n þZ þL
∗
þ I 1, sh ¼
2
R R
¼ jSn j2 þ jLj2
2
|fflffl{zfflffl} 2ffl{zfflffl}
|ffl
Signal power LO laser power
R 2 R
R ∗
R
þ jZ j þ Sn L∗ þ S∗ nL þ Sn Z þ S∗ ∗ ∗
n Z þ ðLZ þ L Z Þ þI 1, sh ,
2
|fflffl{zfflffl} 2 2 2
|fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl}
ASE-ASE noise Signal-LO laser beating Signal-ASE noise beating LO laser-ASE noise beating
ð6:305Þ
where we have identified various beating terms as: ASE-ASE noise interaction,
signal-LO laser beating, signal-ASE noise beating, and LO laser-ASE noise beating
components. With I1,sh we denoted the shot noise of photodiode 1. In similar
fashion, the photocurrent i2 can be expressed as:
6.9 Compensation of Atmospheric Turbulence Effects 479
R
i2 ¼ RjEo, 2 j2 ¼ ðSn þ Z LÞ S∗ ∗
n þZ L
∗
þ I 2, sh ¼
2
R R 2
¼ jSn j2 þ jLj
2
|fflffl{zfflffl} 2
|ffl{zffl}
Signal power LO laser power
R 2 R
R ∗
R
þ jZ j þ Sn L∗ S∗ nL þ Sn Z þ S∗ ∗
n Z þ ðLZ L Z Þ þI 2, sh :
∗
2
|ffl{zffl} 2 2 2
|fflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflffl
ffl{zfflfflfflfflfflfflfflfflfflfflfflfflffl}
ASE-ASE noise Signal-LO laser beating Signal-ASE noise beating LO laser-ASE noise beating
ð6:306Þ
The relevant approaches to deal with atmospheric turbulence effects include adap-
tive coding and adaptive coded modulation [5, 9, 44–53], hybrid RF-FSO commu-
nications [9, 53], diversity techniques, MIMO signal processing [5, 8, 9, 12, 16],
adaptive optics approaches [82–88], and spatial light modulator (SLM)-based
backpropagation method [88], to mention a few.
In adaptive coding approaches, the error-correction strength (code rate) is
adapted based on time-varying channel conditions. When channel conditions are
bad, a stronger channel code is used; on the other hand, when channel conditions are
favorable, a weaker channel code is used. In adaptive modulation and coding, both
modulation format and code rate are simultaneously adapted. These schemes have
been already described in Sect. 6.5; see also Chaps. 9 and 10 in Ref. [9].
The key idea behind the diversity-combining techniques [5, 8, 9, 12, 16] is to use
several independent realizations of that same transmitted signal to improve toler-
ance to channel impairments. The independent signal copies transmitted over
different paths or degrees of freedom will have a low probability of experiencing
the same level of channel distortion. In multiple-input multiple-output (MIMO)
480 6 Advanced Detection Techniques and Compensation of Channel Impairments
systems, the transmitters and receivers can exploit the knowledge about the channel
to determine the rank of so-called channel matrix H, which is related to the number
of independent data streams that can be simultaneously transmitted. The diversity
and MIMO techniques are subject of study in Chap. 8.
In hybrid FSO-RF communications, FSO and RF subsystems cooperate to
overcome shortcomings of each other [9, 53]. The atmospheric turbulence, as
described in Chap. 2, is one of the most important factors that degrade the
performance of an FSO link, which is even present even in clear sky conditions.
Another relevant factor that impacts FSO transmissions is the Mie scattering, which
occurs in the near-infrared wavelength region when particle sizes due to fog, haze,
and pollution (aerosols) become comparable to the operating wavelength. Fog itself
is the most detrimental factor that impacts the reliability of an FSO link. In contrast,
RF signals are not impacted by these problems, but are affected by other issues,
particularly rain and snow. This suggests that the two transmission media (FSO and
RF) can be operated in a complementary fashion, depending on the predominant
weather and atmospheric conditions. During certain channel conditions, FSO and
RF link performance becomes comparable, when it makes sense to simultaneously
and cooperatively communicate over the two channels so as to maximize the
overall link performance. For additional details, an interested reader is referred to
Chap. 4 (see Sect. 4.6).
Atmospheric turbulence effects can also be handled through the use of the
azimuthal phase correction method, similar to the Gerchberg-Saxton (GS) phase
retrieval algorithm [82, 83]. This method can be described as follows [89]. In the
first stage, we determine the azimuthal phase of a given spatial mode, φ(x,y), in the
absence of turbulence, based on the magnitude response of the Fourier transform of
exp[jφ(x,y)]. In the second stage, we determine the azimuthal phase of spatial
modes in the presence of turbulence. The distortions introduced by atmospheric
turbulence can be compensated for by using GS phase retrieval algorithm. How-
ever, there is no evidence that this method can be used to deal with strong
turbulence effects.
In the reminder of this chapter, we describe the usage of adaptive optics and
SLM-based backpropagation method to deal with atmospheric turbulence effects.
A linear adaptive optics system consists of three subsystems: (i) wavefront sensor to
detect the atmospheric distortions, (ii) wavefront corrector to compensate for
turbulence effects, and (iii) the control processor to monitor the wavefront sensor
information and control the wavefront corrector.
Before we describe each individual subsystem, we provide the Zernike repre-
sentation of the atmospheric turbulence.
6.9 Compensation of Atmospheric Turbulence Effects 481
X
1
φðrÞ ¼ al Zl ðrÞ, ð6:309Þ
l¼1
where al are the coefficients of expansion. Zernike polynomials Zl(r) form a set of
orthogonal polynomials expressed as product of radial Rnm and azimuth Vml
components as follows [85]:
pffiffiffiffiffiffiffiffipffiffiffiffiffiffiffiffiffiffiffi
Z l ðrÞ ¼ 2δm0 n þ 1 R m ðr=RÞV ml ðθÞ ¼ cmn Rnm ðr=RÞV ml ðθÞ, ð6:310Þ
|fflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl} n
cmn
ðnm
XÞ=2 ð1Þs ðn mÞ!
Rnm ðρÞ ¼ nþm
ρn2s
s¼0 s! 2 s ! nm2 s !
!
ðnm
XÞ=2 ns n 2s
¼ ð1Þ s
nm ρn2s , ð6:311Þ
s¼0
s s
2
The first several Zernike polynomials, ordered by Noll index l, are summarized
in Table 6.2, based on [90]. The following recurrence relation can be used to
calculate all other radial terms:
Rnm
m
2ðn 1Þ 2nðn 2Þρ2 m2 nðn 2Þ Rn2 ðρÞ nðn þ m 2Þðn m 2ÞRn4
m ðρÞ
¼ :
ðn þ mÞðn mÞðn 2Þ
ð6:317Þ
The convenience of the Zernike polynomials is that we can determine the power
associated with each Zernike term. Once the certain number of Zernike terms get
compensated for, one can determine residual aberration as follows:
ðð
ΔL ¼ jφðrÞ φL ðrÞj2 d2 r, ð6:318Þ
r<R
X
L
φL ð r Þ ¼ al Z l ðrÞ: ð6:319Þ
l¼1
When L > 10, the following approximation due to Noll can be used [90]:
pffiffi
5=3
3=2 D
2
ΔL 0:2944L rad , ð6:320Þ
r0
The most widely used wavefront sensor is the Shack-Hartmann sensor, whose basic
layout is illustrated in Fig. 6.43.
This wavefront sensor consists of the array of collecting lenslets, in whose focal
plan an array of photodetectors is placed. The subapertures (lenslets) can be
arranged in rows, the hexagon packing can be used, etc. Each subaperture focuses
the corresponding portion of the light beam to the photodetector plane. The signals
from different photodetectors are used to determine the displacement of every
sub-beam from the optical axis of the corresponding subaperture, which is propor-
tional to the mean tilt of the wavefront within the subaperture. When sufficient
number of photodetectors in the array is used, such as CCD array, the displacement
of the focal spot is determined as the displacement of its centroid. The focal spot
centroid vector within subaperture A can be determined as [91] (see also [85]):
484 6 Advanced Detection Techniques and Compensation of Channel Impairments
Control processor
Distorted wavefront
ðð
kf
rc ¼ I ðrÞ∇φd2 r, ð6:321Þ
P
A
where f is the focal length of the lenslet and P is the total radiation power incident to
the subaperture A. The normalized phase gradient can be expressed in terms of the
gradients of the real and imaginary parts of the complex amplitude E as follows
[85]:
ImðEÞ
I ðrÞ∇φ ¼ jEj2 ∇tan 1 ¼ ReðEÞ∇ImðEÞ ∇½ReðEÞImðEÞ: ð6:322Þ
ReðEÞ
After substituting Eq. (6.322) into Eq. (6.321), we obtain the following equation
for the local tilt:
ðð
1
s ¼ rc =kf ¼ fReðEÞ∇ImðEÞ ∇½ReðEÞImðEÞgd2 r: ð6:323Þ
P
A
The wavefront modal reconstruction of the sensor aperture can be obtained from
the estimates of local tilts, as described in [92] (see also [85]). The starting point is
6.9 Compensation of Atmospheric Turbulence Effects 485
the approximation of φ(r) in terms of Zernike polynomials Zl, given by Eq. (6.319).
The local tilts of the m-th subaperture sm (m ¼ 1,2,. . .,M ) are fitted to the estimates
obtained in the wavefront sensor as follows:
" #2
X
M X
L
εL ¼ al Zlm sm , ð6:324Þ
m¼1 l¼1
where Zlm is the local tilt of the l-th basis function Zl on the m-th subaperture. The
variation method can be applied to determine the expansion coefficients ak, by
setting the partial derivatives of the error ε with respect to ak to zero [85]:
" #
∂εL ∂ XM X
L
¼ al Zlm sm ¼ 0: ð6:325Þ
∂ak ∂ak m¼1 l¼1
X
M X
M
Aa ¼ b, Akl ¼ Zlm Zkm , bk ¼ sm Zkm : ð6:326Þ
m¼1 m¼1
a ¼ A1 b: ð6:327Þ
Regarding the wavefront correctors, the most popular are adaptive mirrors, which
can be classified as either deformable mirrors or segmented mirrors. In modal
corrector, the residual aberration error, based on Eq. (6.318), can be defined as:
ðð 2
XL
ΔL ¼ W ð r Þ φð r Þ al Zl ðrÞ d2 r, ð6:328Þ
l¼1
where the aperture function W(r) corresponds to the circle of the radius R:
1, r R
W ðrÞ ¼ : ð6:329Þ
0, r > R
486 6 Advanced Detection Techniques and Compensation of Channel Impairments
Alternatively, the vibrational method, similar to that given by Eqs. (6.325, 6.326,
and 6.327), can be used. The only difference is that the elements of matrix A and
vector b are determined, respectively, as:
ð ð
Akl ¼ W ðrÞZ k ðrÞZl ðrÞd 2 r, bk ¼ W ðrÞZ k ðrÞφðrÞd2 r: ð6:331Þ
The most commonly used deformable mirrors are those with discretely arranged
points of force (force moment). The simplest and most popular method is to control
the mirror surface with the help of actuators. The mirror surface can be described as
the weighted sum of the response functions fl [85]:
X
L
SðrÞ ¼ al f l ðr rl Þ, ð6:332Þ
l¼1
wherein the response functions are determined experimentally, based on the system
of mechanical equations. To simplify the problem, the Gaussian response approx-
imation is used in numerous papers, such as [85, 93]:
f l ðrÞ ¼ exp r 2 =w2l , ð6:333Þ
where the halfwidth wl is determined experimental and typically ranges from 0.7d
to 0.8d, with d being the spacing between actuators. The approximation of the
surface required by the deformable mirror, with a given set of response functions,
can be obtained as the minimization problem of the following variance, which is
similar to Eq. (6.328),
ðð 2
XL
σ 2L ¼ W ðrÞ φðrÞ al f l ðr rl Þ d2 r: ð6:334Þ
l¼1
Photodetector
array
Lenslet
array
BS CCD
Compressing
telescope
Collimating
subsystem
Signal beam
lens
Control
Pilot beam
Deformable mirror
Fig. 6.44 Typical receiver side adaptive optics system. BS: beam splitter
No we can apply the variation method given by Eqs. (6.325, 6.326, and 6.327),
wherein the elements of matrix A and vector b are determined, respectively, as:
X
Akl ¼ W ri, j f k ri, j rk f l ri, j rk ,
Xjri, j rk j<2w ð6:336Þ
bk ¼ W ri, j f k ri, j rk φ ri, j ,
k
where we used subscripts i,j to denote the grid (i ¼ 1,. . .,I; j ¼ 1,. . .,J).
Now we have all elements required for an adaptive optics systems, which can be
placed at either transmitter or receiver side. The receiver side adaptive optics
system is illustrated in Fig. 6.44. The wavefront errors are measured with the
help of the Shack-Hartmann wavefront sensor, and to correct for the aberration
errors, the deformable mirror is used in a closed loop, controlled by the control
subsystem. The pilot beam is used to estimate the distortions introduced by atmo-
spheric turbulence channels and deformable mirror. Once the residual aberrations
are minimized, the signal beam is reflected from deformable mirrors, and the
atmospheric turbulence-induced wavefront errors are corrected for, providing that
resolution is sufficiently good and time needed for deformable mirror adjustment is
shorter than the channel coherence time.
The size of aperture in front of photodetector is properly chosen, depending on
FSO link length. For signal spatial mode transmission, a single photodetector might
be sufficient. Alternatively, a photodetector array can be used to exploit spatial
diversity, by properly selecting the compression telescope, collimating lens, the
aperture size in front of photodetector array, and separation of photodetectors so
488 6 Advanced Detection Techniques and Compensation of Channel Impairments
that the different optical paths will exhibit different turbulence effects. In such a
way, we combine the adaptive optics with spatial diversity to deal with strong
turbulence effects. Alternatively, the low-cost wavefront sensorless adaptive optics
can be used to reduce the effects due to turbulence, and to deal with the remaining
turbulence effects, the adaptive LDPC coding can be used, as described in [88]. By
employing the multiple spatial laser sources, the MIMO signal processing can be
combined with adaptive optics.
The receiver side adaptive optics can be used to deal with atmospheric turbulence
effects in both single-mode and multimode free-space optical communication
systems including classical, QKD, and quantum communication systems. However,
it has been shown in [87] that the residual wavefront error is limited by the finite
resolution of the deformable mirror (DM). To deal with strong turbulence effects,
the resolution of existing DMs is not sufficient. To solve for this problem, a liquid
crystal spatial light modulator (LC-SLM) can be used as a promising alternative to
the DM [87]. As an illustration, an LC-SLM with a 1000 1000 pixel array in a
10 10 mm2 area has been reported in [94]. The SLMs can also be used to emulate
atmospheric turbulence effects [95]. However, because the LC-SLM is polarization
sensitive, we need two SLMs, one for each orthogonal polarization state. Alterna-
tively, SLM can be segmented into two areas corresponding to each SOP. To deal
with strong turbulence effects, SLM-based backpropagation mode (BPM) method
has been proposed in [87]. In the SLM-based BPM scheme, the pilot beam is
propagated backward from the receiver to the transmitter to probe the atmospheric
channel. The distorted wavefront is now determined at the transmitter side with the
help of wavefront sensor, as illustrated in Fig. 6.45.
For the signal beam, SLM (SLMs) is (are) used to transmit the date sequence into
specific spatial mode, which is the conjugation of the determined wavefront. Even
though there exist amplitude-modulating liquid crystal on silicon (LCOS) devices,
it has been shown in [87] that the low-cost phase-only SLMs to modulate the signal
beams in LSM-based BPM scheme are sufficient to deal with turbulence effects in
strong atmospheric turbulence regime. Compared to receiver side adaptive optics
scheme, in which the segmented DM applies modal correction with superposition
Zernike modes, the SLM is programmed to generate the conjugated phase of the
piecewise wavefront measured by the wavefront sensor directly [87]. Essentially,
SLM operates as a zonal corrector to take advantage of its high spatial resolution.
Therefore, the wavefront of the signal beam is pre-shaped so that after propagation
the light will focus at a predetermined position, i.e., the target detector. This scheme
is applicable in both single transmitter-single receiver and MIMO systems. In
multi-spatial mode scenario, when we use one probing source for each parallel
channel, the same number of wavefront sensors will be needed, which results in
high complexity of the transmitter optics. To reduce the complexity, fewer probing
6.10 Concluding Remarks 489
Optical
transmitter
Expanding
telescope
Collimating
lens
Signal beam
Pilot beam
SLM
Lenslet array
CCD
Control
subsystem
sources can be used with linear phase interpolation, as proposed in [87]. When the
number of probe sources is smaller than the number of spatial mode-based trans-
mitters, a linear phase term is needed to modify the conjugation wavefront to
provide the necessary signal displacement to the position of the target detector at
the receiver side. Therefore, the pre-shaped wavefront Ushaped is given by [87]:
8
9
< x xdet xprob þ y ydet yprob =
U shaped ¼ U {back-propagation exp j2π ð6:337Þ
: λf ;
where (xdet, ydet) is the position of a target detector, (xprob, yprob) is the position of
the closest probing source to the target detector, and f is the focal length of the
receiver (compressing) telescope. Additional details of SLM-based BPM can be
found in [87].
This chapter has been devoted to the advanced detection and channel impairment
compensation techniques applicable to both wireless and optical communication
systems. To better understand the principles behind advanced detection and channel
impairment compensation, the fundamentals of detection and estimation theory
have been described in Sect. 6.1, including geometric representation of received
490 6 Advanced Detection Techniques and Compensation of Channel Impairments
signals (Sect. 6.1.1), optimum receiver design (Sects. 6.1.2 and 6.1.3) in either
maximum SNR sense (Sect. 6.1.2) or symbol error probability sense (Sect. 6.1.3),
and symbol error probability derivations (Sect. 6.1.4). Fundaments of estimation
theory have been provided in Sect. 6.1.5.
In section on wireless communication systems performance, Sect. 6.2, different
scenarios have been described including outage probability scenario (Sec. 6.2.1),
average error probability scenario (Sect. 6.2.2), and combined outage-average error
probability scenario (Sect. 6.2.3). The moment-generating function-based approach
to average error probability calculation has been described in Sect. 6.2.4. The
performance calculation in the presence of Doppler spread and fading effects has
been described in Sect. 6.2.5.
In section on channel equalization techniques, Sect. 6.3, after introductory
remarks on ISI-free transmission and partial-response signaling (Sect. 6.3.1), the
zero-forcing equalizers suitable for compensation of ISI, chromatic dispersion, and
PMD in fiber-optics communication, ISI and multipath fading effects in wireless
communications, and ISI and multipath effects in indoor optical wireless commu-
nications have been described. The optimum linear equalizer design in the mini-
mum mean-square error sense has been provided in Sect. 6.3.3, while the Wiener
filtering concepts have been introduced in Sect. 6.3.4. The most relevant post-
compensation techniques, applicable to both wireless and optical communications,
have been described next including adaptive equalizer (Sect. 6.3.5), decision-
feedback equalizer (Sect. 6.3.6), MLSD or Viterbi equalizer (Sect. 6.3.7), and
blind equalization techniques (Sect. 6.3.8). Relevant synchronization techniques
have been described in Sect. 6.4.
In section on adaptive modulation techniques, Sect. 6.5, various techniques to
adapt the transmitter to time-varying wireless/optical channel conditions, enabling
reliable and high spectral-efficient transmission, have been described. Various
scenarios have been described including data rate, power, code rate, error proba-
bility adaptation scenarios, as well as a combination of various adaptation strate-
gies. Various variable-power variable-rate modulation techniques have been
described in Sect. 6.5.1 including water-filling method, channel inversion, and
truncated channel inversion. The discrete-rate and discrete-power discrete-rate
approaches have been discussed as well. The adaptive coded modulation techniques
have been described in Sect. 6.5.2.
The Volterra series-based equalization to deal with fiber nonlinearities and
nonlinear effects in wireless communications has been described in Sect. 6.6. In
Sect. 6.7 the digital backpropagation has been described as a method to deal with
fiber nonlinearities, chromatic dispersion, and PMD in a simultaneous manner.
Section 6.8 has been devoted to the coherent optical detection. The following
topics have been covered: various balanced coherent optical detection schemes for
two-dimensional modulation schemes in Sect. 6.8.1, polarization diversity and
polarization demultiplexing schemes in Sect. 6.8.2, homodyne coherent optical
detection based on phase-locked loops in Sect. 6.8.3, phase diversity receivers in
Sect. 6.8.4, and the dominant coherent optical detection sources, such as laser phase
noise, polarization noise, transimpedance amplifier noise, and ASE noise, in Sect.
6.8.5.
References 491
References
24. Djordjevic IB, Arabaci M, Minkov L (2009) Next generation FEC for high-capacity commu-
nication in optical transport networks. IEEE/OSA J Lightw Technol 27(16):3518–3530.
(Invited Paper)
25. Djordjevic IB, Xu L, Wang T (2009) Beyond 100 Gb/s optical transmission based on
polarization multiplexed coded-OFDM with coherent detection. IEEE/OSA J Opt Commun
Netw 1(1):50–56
26. Proakis JG, Manolakis DG (2007) Digital signal processing: principles, algorithms, and
applications, 4th edn. Prentice-Hall, Upper Saddle River, NJ
27. Tseng C-C (2003) Design of IIR digital all-pass filters using least pth phase error criterion.
IEEE Trans Circuits Syst II, Analog Digit Signal Process 50(9):653–656
28. Goldfarb G, Li G (2007) Chromatic dispersion compensation using digital IIR filtering with
coherent detection. IEEE Photon Technol Lett 19(13):969–971
29. Ip E, Pak A, Lau T, Barros DJF, Kahn JM (2008) Coherent detection in optical fiber systems.
Opt Express 16(2):753–791
30. Ip E, Kahn JM (2007) Digital equalization of chromatic dispersion and polarization mode
dispersion. J Lightw Technol 25:2033–2043
31. Kuschnerov M, Hauske FN, Piyawanno K, Spinnler B, Alfiad MS, Napoli A, Lankl B (2009)
DSP for coherent single-carrier receivers. J Lightw Technol 27(16):3614–3622
32. Proakis JG (2005) Partial response equalization with application to high density magnetic
recording channels. In: Vasic B, Kurtas EM (eds) Coding and signal processing for magnetic
recording systems. CRC Press, Boca Raton
33. Lyubomirsky I (2007) Optical duobinary systems for high-speed transmission. In: Xu L
(ed) Advanced technologies for high-speed optical communications. Research Signpost,
Kerala, India
34. Alic N, Papen GC, Saperstein RE, Milstein LB, Fainman Y (2005) Signal statistics and
maximum likelihood sequence estimation in intensity modulated fiber optic links containing
a single optical preamplifier. Opt Express 13:4568–4579
35. Colavolpe G, Foggi T, Forestieri E, Prati G (2008) Multilevel optical systems with MLSD
receivers insensitive to GVD and PMD. IEEE/OSA J Lightw Technol 26:1263–1273
36. Ivkovic M, Djordjevic IB, Vasic B (2006) Hard decision error correcting scheme based on
LDPC codes for long-haul optical transmission. In Proc. Optical Transmission Systems and
Equipment for Networking V-SPIE Optics East Conference, vol. 6388, pp 63880F.1-
63880F.7, 1–4 October 2006, Boston
37. Hagenauer J, Hoeher P (1989) A Viterbi algorithm with soft-decision outputs and its applica-
tions. In Proc. IEEE Globecom Conf., Dallas, pp 1680–1686, Nov 1989
38. Bahl LR, Cocke J, Jelinek F, Raviv J (1974) Optimal decoding of linear codes for minimizing
symbol error rate. IEEE Trans Inform Theory IT-20:284–287
39. Wymeersch H, Win MZ (2008) Soft electrical equalization for optical channels. In Proc.
ICC’08, pp. 548–552, 19–23 May 2008
40. Douillard C, Jézéquel M, Berrou C, Picart A, Didier P, Glavieux A (1995) Iterative correction
of intersymbol interference: turbo equalization. Eur Trans Telecommun 6:507–511
41. Tüchler M, Koetter R, Singer AC (2002) Turbo equalization: principles and new results. IEEE
Trans Commun 50(5):754–767
42. Jäger M, Rankl T, Spiedel J, Bul€ow H, Buchali F (2006) Performance of turbo equalizers for
optical PMD channels. IEEE/OSA J Lightw Technol 24(3):1226–1236
43. Djordjevic IB, Minkov LL, Xu L, Wang T (2009) Suppression of fiber nonlinearities and PMD
in coded-modulation schemes with coherent detection by using turbo equalization. IEEE/OSA
J Opt Commun Netw 1(6):555–564
44. Hayes MH (1996) Statistical digital signal processing and modeling, Wiley, New York
45. Haykin A (2003) Adaptive filter theory, 4th edn. Pearson Education, Boston
46. Manolakis DG, Ingle VK, Kogon SM (2000) Statistical and adaptive signal processing.
McGraw-Hill, Boston
References 493
47. Seshadri N (1994) Joint data and channel estimation using fast blind trellis search techniques.
In IEEE Trans. Comm., col. COMM-42, pp 1000–1011, Feb/Mar/Apr 1994
48. Godard DN (1980) Self-recovering equalization and carrier tracking in two-dimensional data
communication systems. IEEE Trans Comm 28(11):1867–1875
49. Sato Y (1975) A method of self-recovering equalization for multilevel amplitude-modulation
systems. IEEE Tran Comm 23(6):679–682
50. Benveniste A, Goursat M, Ruget G (1980) Robust identification of a nonminimum phase
system. IEEE Trans Auto Control AC-25:385–399
51. Goldsmith A, Chua S-G (May 1998) Adaptive coded modulation for fading channels. IEEE
Trans Comm 46:595–601
52. Djordjevic IB (2010) Adaptive modulation and coding for free-space optical channels. IEEE/
OSA J Opt Commun Netw 2(5):221–229
53. Djordjevic IB, Djordjevic GT (2009) On the communication over strong atmospheric turbu-
lence channels by adaptive modulation and coding. Opt Express 17(20):18250–18262
54. Djordjevic IB (2013) On the irregular nonbinary QC-LDPC-coded hybrid multidimensional
OSCD-modulation enabling beyond 100 Tb/s optical transport. IEEE/OSA J Lightw Technol
31(16):2969–2975
55. Zou D, Djordjevic IB (2016) FPGA-based rate-adaptive LDPC-coded modulation for the next
generation of optical communication systems. Opt Express 24(18):21159–21166
56. Zou D, Djordjevic IB (Oct. 2016) FPGA-based rate-compatible LDPC codes for the next
generation of optical transmission systems. IEEE Photon J 8(5):7906008-1–7906008-8.
doi:10.1109/JPHOT.2016.2602063
57. MacKay DJC (2005) Fountain codes. IEE Proc-Commun 152:1062–1068
58. Shokrollahi A (2006) Raptor codes. IEEE Inf Theory 52:2551–2567
59. Djordjevic IB (2016) On Advanced FEC and Coded Modulation for Ultra-High-Speed Optical
Transmission. IEEE Communications Surveys and Tutorials 18(3):1920–1951
60. Wang HS, Moayeri N (1995) Finite-state Markov channel-a useful model for radio commu-
nication channels. IEEE Trans Veh Technol 44(1):163–171
61. Forney GD, Gallager RG, Lang GR, Longstaff FM, Qureshi SU (1984) Efficient modulation
for band-limited channels. IEEE J Sel Areas Comm SAC-2(5):632–647
62. Forney GD (1988) Coset codes-Part I: introduction and geometrical classification. IEEE Trans
Infrom Theory 34(5):1123–1151
63. Nowak RD, Van Veen BD (1997) Volterra filter equalization: a fixed point approach. IEEE
Tran Sig Proc 45(2):377–388
64. Jeruchim MC, Balaban P, Shanmugan KS (2000) Simulation of Communication systems:
Modeling, Methodology, and Techniques, 2nd edn. New York, Kluwer Academic/Plenum
Publishing
65. Nazarathy M, Weidenfeld R (2011) Nonlinear impairments in coherent optical OFDM and
their mitigation. In: Kumar S (ed) Impact of nonlinearities on fiber optic communication.
Springer, pp 87–175, New York
66. Guiomar FP, Reis JD, Teixeira AL, Pinto AN (2011) Mitigation of intra-channel nonlinearities
using a frequency-domain Volterra series equalizer. In Proc. ECOC 2011, Paper Tu.6.B.1,
18–22 September 2011, Geneva, Switzerland
67. Peddanarappagari KV, Brandt-Pearce M (1997) Volterra series transfer function of single-
mode fibers. J Lightw Technol 15:2232–2241
68. Xu B, Brandt-Pearce M (2002) Modified Volterra series transfer function method. IEEE
Photon Technol Lett 14(1):47–49
69. Guiomar FP, Reis JD, Teixeira AL, Pinto AN (2011) Digital post-compensation using volterra
series transfer function. IEEE Photon. Technol. Lett. 23(19):1412–1414
70. Gao Y, Zgang F, Dou L, Chen Z, Xu A (2009) Intra-channel nonlinearities mitigation in
pseudo-linear coherent QPSK transmission systems via nonlinear electrical equalizer. Opt
Commun 282:2421–2425
71. Liu L, Li L, Huang Y, Cui K, Xiong Q, Hauske FN, Xie C, Cai Y (2012) Intrachannel
nonlinearity compensation by inverse Volterra series transfer function. J Lightw Technol 30
(3):310–316
494 6 Advanced Detection Techniques and Compensation of Channel Impairments
72. Ip E, Kahn JM (2008) Compensation of dispersion and nonlinear impairments using digital
backpropagation. J Lightw Technol 26(20):3416–3425
73. Ip E, Kahn JM (2009) Nonlinear impairment compensation using backpropagation. In: Lethien
C (ed) Optical fibre, new developments. In-Tech, Vienna
74. Agrawal GP Nonlinear fiber optics, 3rd edn. Academic Press, San Diego
75. Djordjevic IB (2012) Quantum information processing and quantum error correction: an
engineering approach. Elsevier/Academic Press, Amsterdam-Boston
76. Priest RG (1982) Analysis of fiber interferometer utilizing 3 3 fiber coupler. IEEE J
Quantum Electron QE-18(10):1601–1603
77. Paiam MR, MacDonald RI (1997) Design of phased-array wavelength division multiplexers
using multimode interference couplers. Appl Opt 36(21):5097–5108
78. Seimetz M, Weinert CM (2006) Options, feasibility and availability of 24 90o hybrids for
coherent optical systems. IEEE J Lightw Technol 24(3):1317–1322
79. Norimatsu S et al (1992) An 8 Gb/s QPSK optical homodyne detection experiment using
external cavity laser diodes. IEEE Photon Technol Lett 4(7):765–767
80. Camatel S et al (2004) Optical phase-locked loop for coherent detection optical receiver.
Electron Lett 40(6):384–385
81. Camatel S et al (2006) 2-PSK homodyne receiver based on a decision driven architecture and a
sub-carrier optical PLL. In: Proceedings of optical fiber communication conference (OFC),
paper OTuI3
82. Jesacher A, Schwaighofer A, Frhapter S, Maurer C, Bernet S, Ritsch-Marte M (2007)
Wavefront correction of spatial light modulators using an optical vortex image. Opt Express
15(5):5801–5808
83. Gerchberg RW, Saxton WO (1972) A practical algorithm for the determination of phase from
image and diffraction plane pictures. Optik 35:237–246
84. Chandrasekaran N, Shapiro JH (2012) Turbulence-induced crosstalk in multiple-spatial-mode
optical communication. In Proc. CLEO 2012, San Jose, CA, May 6–11, 2012, Paper CF3I.6
85. Lukin VP, Fortes BV (2002) Adaptive beaming and imaging in the turbulent atmosphere. SPIE
Press, Bellingham
86. Glindemann A, Hippler S, Berkfeld T, Hackenberg W (2000) Adaptive optics on large
telescopes. Exp Astron 10(1):5–47
87. Sun X, Djordjevic IB, Neifeld MA (2016) Multiple spatial modes based QKD over marine
free-space optical channels in the presence of atmospheric turbulence. Opt Express 24
(24):27663–27673
88. Qu Z, Djordjevic IB (2016) 500Gb/s free-space optical transmission over strong atmospheric
turbulence channels. Opt Lett 41(14):3285–3288
89. Djordjevic IB, Anguita J, Vasic B (2012) Error-correction coded orbital-angular-momentum
modulation for FSO channels affected by turbulence. IEEE/OSA J Lightw Technol 30
(17):2846–2852
90. Noll RJ (1976) Zernike polynomials and atmospheric turbulence. J Opt Soc Am 66
(3):207–211
91. Tatarskii VI (1967) The effects of the turbulent atmosphere on wave propagation (translated by
Israel program for scientific translations in 1971), U.S. Dept. of Commerce, National Techni-
cal Information Service, Springfield
92. Cubalchini R (1979) Modal wave-front estimation from phase derivative measurements. J Opt
Soc Am 69:972–977
93. Ealey MA, Wellman JA (1992) Deformable mirrors: design fundamentals, key performance
specifications, and parametric trades. In: Proc. SPIE 1543, active and adaptive optical com-
ponents, pp 36–51, January 13; doi:http://dx.doi.org/10.1117/12.51167
94. Tyson RK (2015) Principles of adaptive optics. CRC Press, Boca Raton
95. Qu Z, Djordjevic IB, Neifeld MA (2016) RF-subcarrier-assisted four-state continuous-variable
QKD based on coherent detection. Opt Lett 41(23):5507–5510
Chapter 7
OFDM for Wireless and Optical
Communications
f k f l ¼ n=T s , ð7:1Þ
1, 1=2 < t 1=2
sk ðtÞ ¼ rectðt=T s Þe j2πf k t
, rectðtÞ ¼ ð7:2Þ
0, otherwise
ZT s =2
1 sin ðπ ðf k f l ÞT s Þ
h sl ; sk i ¼ sk ðtÞs∗
l ðtÞdt ¼
Ts π ð f k f l ÞT s ð7:3Þ
T s =2
¼ sincððf k f l ÞT Þjf k f l ¼n=T s ¼ 0,
where with Xk we denoted the QAM/PSK symbol imposed on k-th subcarrier, and
Nsc denotes the number of subcarriers. Based on this interpretation, we can repre-
sent the OFDM modulator as shown in Fig. 7.1a. The QAM serial data stream is
demultiplexed into Nsc parallel streams, which are multiplied with different
subcarrier basis functions to generate the OFDM waveform, shown in
Fig. 7.1b. The real and imaginary part of this OFDM signal after digital-to-analog
conversions can be used as RF inputs of I/Q modulator. Therefore, this OFDM
modulator is consistent with synthesizer, described in Chap. 5. In this particular
configuration, the OFDM principle is employed to perform modulation. On the
other hand, if Nsc independent QAM streams for different sources are multiplied
QAM OFDM
S/P
data converter signal
exp[-j π(Nsc -2)t/Ts]
(a) (b)
Fig. 7.1 The OFDM signal: (a) waveform generation and (b) Nyquist overlapping subcarriers
498 7 OFDM for Wireless and Optical Communications
with corresponding subcarrier basis functions before being combined together, the
OFDM synthesizer will serve as multiplexer.
The demodulation of l-th subcarrier QAM symbol can be performed by down-
conversion by l/Ts, in other words by correlation receiver from Chap. 5 as follows:
ZT s =2 NX
sc =2
1 l k
exp j2π t XkþNs =2 exp j2π t dt
Ts T k¼-N =2 Ts
T s =2 sc
ZT s =2 ð7:5Þ
1 X
N sc =2
kl
¼ XkþNsc =2 exp j2π t dt ¼ XlþNs =2
T s k¼N =2 T
sc
T s =2
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
T s , k¼l ð0;k6¼lÞ
which represents the inverse discrete Fourier transform (IDFT) of input QAM
sequence. The IDFT can be efficiently implemented by inverse fast Fourier trans-
form (IFFT). This discrete-time implementation is an important reason of high
appealing of the OFDM scheme. The DT implementation is very flexible as several
subcarriers can be used for channel estimation. In addition, the radix-2 and radix-4
algorithms can be used to reduce complexity of IDFT. Namely, in radix-2 algorithm
7.2 Guard Time, Cyclic Extension, and Windowing 499
k¼NXsc =21
1
¼ sincðfT s Þ* XkþNsc =2 δ f k ð7:8Þ
k¼N sc =2
Ts
k¼NXsc =21
1
¼ XkþNsc =2 sinc f k Ts :
k¼N =2
Ts
sc
One of the key advantages of OFDM is that it can straightforwardly be used to deal
with various dispersion and multipath effects. To reduce the ISI among OFDM
symbols, the guard time is introduced for every OFDM symbol. The guard time is
typically chosen to be longer than the expected dispersion/multipath widening so
that dispersion/multipath components from one symbol are not able to interfere
with the neighboring symbols. The guard time could be just an empty time interval;
however, the problem of intercarrier interference (ICI) will arise in that case as the
subcarrier components cease to be orthogonal. In order to eliminate the ICI intro-
duced by dispersive optical and multipath wireless channels, the OFDM symbol is
commonly cyclically extended in the guard time to restore the orthogonality of the
subcarrier components. The symbol duration, after cyclic extension, is determined
as Ts ¼ TG + TFFT, where TG is the guard interval duration, while TFFT is the
duration of effective portion of OFDM symbol (FFT part) related to subcarrier
spacing Δfsc by TFFT ¼ 1/Δfsc. The cyclic extension can be performed by repeating
the last NG/2 samples (corresponding to TG/2) of the FFT frame (of duration TFFT
with NFFT samples) as a prefix and repeating the first NG/2 samples (out of NFFT) as
a suffix, which is illustrated in Fig. 7.2. Another alternative is to use only either
prefix or suffix of duration TG.
In fiber-optics communications, for complete elimination of ISI, the total delay
spread Δt due to chromatic dispersion and differential group delay (DGD) should
be shorter than the guard interval [5]:
c
Δt ¼ jβ2 jLtot Δω þ DGDmax ¼ jDt jN FFT Δf sc þ DGDmax T G , ð7:9Þ
f2
where Dt is the accumulated dispersion, c is the speed of the light, f is the central
frequency (typically set to 193.1 THz), Ltot is the total transmission distance,
DGDmax is the maximum DGD, and β2 is the second-order group-velocity
dispersion (GVD) parameter related to chromatic dispersion parameter D by
Preffix
Suffix
X
N FFT
Es ¼ exp j 2πf LD t þ ϕPN, S Xk ej2πf k t ejϕCD ðkÞ , ð7:10Þ
k¼1
X
N FFT
vðtÞ ’ RPIN RL efj½2πðf LD f LO ÞtþϕPN, S ϕPN, LO g Xk ej2πf k t ejϕCD ðkÞ þ N ðtÞ, ð7:12Þ
k¼1
where fLO denotes the carrier frequency of the local laser oscillator, RPIN is the
photodetector responsivity, and RL is the feedback resistance in transimpedance
amplifier configuration, while ϕS,PN and ϕL,PN represent the laser phase noise of the
transmitting laser and local laser oscillator, respectively. These two noise sources
are commonly modeled as Wiener-Lévy process [7], which is a zero-mean Gauss-
ian process with variance 2π(ΔνS + ΔνL)|t|, where ΔνS and ΔνL are the laser
linewidths of transmitting laser and local oscillator, respectively, while N ¼ NI
jNQ represent the noise process, mostly dominated by ASE noise. The received
symbol Yk of k-th subcarrier can be represented as:
Y k ¼ Xk exp j ϕPN, S ϕPN, LO exp½jϕCD ðkÞ þ N k , N k ¼ N k, I þ N k, Q ð7:13Þ
where the chromatic dispersion phase factor of k-th subcarrier ϕCD(k) is estimated
by training-based channel estimation, while the phase factor ϕPN , S ϕPN , LO is
determined by pilot-aided channel estimation. The additional details of various
OFDM channel estimation techniques can be found in Sect. 7.5. Therefore, with
proper guard interval selection, we can decompose the dispersive channel into NFFT
parallel channels, which will be described later with additional details. To include
502 7 OFDM for Wireless and Optical Communications
the polarization-mode dispersion (PMD) in the model, we employ the Jones vector
representation. Namely, the electric field of plane linearly polarized waves propa-
gating in the z-direction can be presented as:
where k ¼ 2π/λ is the magnitude of the wave propagation vector (λ is the operating
wavelength), and δ is the relative phase difference between the two orthogonal
polarizations. With EH and EV, we denoted H- and V-polarization states, respec-
tively. If using the Jones vector representation of polarization wave [28], we can
write that:
pffiffiffiffiffiffiffiffiffiffiffiffi
EH ðtÞ 1p
EðtÞ ¼ ¼ E pffiffiffiffi jδ r ejðωtkzÞ , ð7:16Þ
EV ðtÞ pr e
where pr is the power splitting ratio between states of polarizations (SOPs), while
the complex phasor term is typically omitted. From Eq. (7.16), the equivalent
channel model can be expressed as:
" ðH Þ
# " ðH Þ
# " ðH Þ #
Yk Xk
Nk
ðV Þ
¼ U ðf k Þ ðV Þ
exp j ϕPN, S ϕPN, LO exp½jϕCD ðkÞ þ ðV Þ
,
Yk k Xk Nk
ð7:17Þ
where U( fk) denotes the Jones matrix of fiber link, defined as:
U HH ðf k Þ U HV ðf k Þ
U ðf k Þ ¼ ð7:18Þ
U VH ðf k Þ U VV ðf k Þ
X
N 1
DFTfxðnÞg ¼ Xk ¼ x½nej2πnk=N , 0k N1
n¼0
ð7:19Þ
1 X
N 1
IDFTfXk g ¼ xðnÞ ¼ Xk ej2πnk=N , 0nN1
N k¼0
7.2 Guard Time, Cyclic Extension, and Windowing 503
The output y(n) of a linear time-invariant (LTI) system can be obtained by convo-
lution of the input x(n) and LTI dispersive channel impulse response h(n):
X
yðnÞ ¼ xðnÞ * hðnÞ ¼ hðnÞ * xðnÞ ¼ hðkÞxðn kÞ: ð7:20Þ
k
On the other hand, the circular convolution of x(n) and h(n) is defined as:
X
yðnÞ ¼ xðnÞ * hðnÞ ¼ hðkÞxðn kÞN , ðn kÞN ðn kÞmod N, ð7:21Þ
k
where with (n k)N, we denoted the periodic extension of x(n k), with period N.
Therefore, the resulting sequence obtained by circular convolution is periodic with
a period of N. DFT of circular convolution of x(n) and h(n) is product of
corresponding DFTs of individual terms:
In this case, the channel output is not a circular but rather a linear convolution of the
channel input and its impulse response. However, the linear convolution can be
converted to circular by adding a cyclic extension. The cyclic extension can be
inserted as a prefix, suffix, or to be split into prefix and suffix portions. The cyclic
extension of {x(n)}, inserted as a prefix, is defined by {x(N L),. . .,x(N 1)},
where with L presents the last L samples of sequence, as illustrated in Fig. 7.3.When
the cyclic extension is appended as a prefix (to the beginning of the sequence x(n)),
the convolution of the resulting sequence and impulse response h(n) yields to the
circular convolution:
X
L
y ð nÞ ¼ xcircular ðnÞ * hðnÞ ¼ hðkÞxcircular ðn kÞ
k¼0
ð7:23Þ
X
L
¼ hðkÞxðn kÞN ¼ xðnÞ * hðnÞ,
k¼0
where with xcircular(n), we denoted the cyclic extended sequence. The DFT of
circular convolution of x(n) and h(n) is given as:
x(N-L) x(N-L+1) … x(N-1) x(0) x(1) x(2) … x(N-L-2) x(N-L-1) x(N-L) x(N-L+1) … x(N-1)
Fig. 7.3 The illustration of cyclic prefix creation for FFT-based OFDM
504 7 OFDM for Wireless and Optical Communications
The estimation of the input sequence, denoted here as ~x ðnÞ, can be done by:
Yk DFTfyðnÞg
~x ðnÞ ¼ IDFT ¼ IDFT , ð7:25Þ
Hk DFTfhðnÞg
where Hk can be obtained for by pilot-aided channel estimation [5]. The function y
(n), used in Eq. (7.25), has the length N + L. However, the first L samples in y(n)
(where n ¼ L,. . .,1) are not required to recover the original sequence x(n)
(where n ¼ 0,1,. . .,N 1). By adding the cyclic prefix, we have solved the problem
of circular convolution, but we have introduced an overhead of L/N, while the
overall data rate has been reduced by N/(L + N ) times. Instead of using DFT/IDFT
in OFDM, we can apply FFT/IFFT. The length of sequence N in discussion above
will correspond to NFFT. In OFDM, we add the cyclic prefix to every OFDM
symbol. As a summary, with the help of cyclic prefix, we can simultaneously
address the problems of both ISI and circular convolution.
7.2.2 Windowing
Effective part
Twin
T=TFFT+TG+Twin
kT
7.3 Bandwidth Efficiency of OFDM 505
8
>
> 1
< 2½1 cos π ðt þ T win þ T G =2Þ=T win , T win T G =2 t < T G =2
>
wðtÞ ¼ 1:0, T G =2 t < T FFT þ T G =2
>
>1
>
: ½1 cos π ðt T FFT Þ=T win , T FFT þ T G =2 t < T FFT þ T G =2 þ T win
2
ð7:26Þ
where TG is the guard interval duration, and Twin is the duration of windowing
interval. The window shape expressed above can be represented in digital signal
processing by various digital functions (also known just as windows), such as
Hamming, Hanning, Bartlett, etc. [28]. The windowing interval needs to be care-
fully chosen not to violate the orthogonality principle since a partial overlap of
neighboring OFDM is allowed in practice. Please notice that digital filtering
techniques can be used instead of windowing, to reduce the out-of-band spectrum.
However, the digital filtering requires at least several multiplications per sample,
while windowing needs several multiplications per symbol, which means that the
windowing is simpler to implement. The OFDM signal after windowing can be
represented as:
X
1 X
N FFT =21
j2π T k
ðtnT s Þ
sB ðtÞ ¼ wðt nT s Þ X n, k e FFT , ð7:27Þ
n¼1 k¼N FFT =2
where we used the index n to denote the n-th OFDM symbol, while index k denotes
the k-th OFDM subcarrier. For single-band OFDM systems, the windowing oper-
ation can be omitted. (In Eq. 7.27, subscript “B” stands for the baseband signal.)
In summary, the OFDM signal can be generated as follows. The NQAM input
QAM symbols are zero-padded to obtain NFFT input samples used to calculate the
IFFT. The last NG/2 samples of the IFFT output are inserted at the start of the
OFDM symbol, while the first NG/2 samples are appended at the end. The OFDM
symbol is multiplied by corresponding windowing function. After that, the real and
imaginary parts are separated and digital-to-analog conversion performed on both
the real and imaginary parts. Finally, after amplification in the driver, the real and
imaginary parts are used as inputs to I and Q ports of an I/Q modulator.
If we assume that Nsc subcarriers are used, each having Rsc symbol rate, so the total
symbol rate Rs for CO-OFDM and wireless OFDM systems can be calculated as:
Rs ¼ N sc Rsc : ð7:28Þ
506 7 OFDM for Wireless and Optical Communications
N sc 1
BW OFDM ¼ þ 2Rsc , ð7:29Þ
T FFT
where TFFT is the effective portion of OFDM symbol (carrying data), as shown in
Fig. 5.39. Since the subcarrier spacing is given by Δfsc ¼ 1/TFFT, the bandwidth
occupied by subcarriers equals (Nsc 1)Δfsc. On the other hand, the bandwidth
portion due to finite rise and falling edges of the first and last subcarriers is given by
2Rsc. Therefore, the overall bandwidth efficiency of CO-OFDM systems can be
expressed as:
bN sc Rsc bN sc Rsc
S¼2 ¼2 , ð7:30Þ
BW OFDM 2Rsc þ ðN sc 1Þ=T FFT
where b denotes the number of bits per QAM symbol, while factor 2 originates from
polarization-division multiplexing (PDM). In wireless communications, typically,
the PDM is not used so that the factor 2 in (7.30) should be omitted. The subcarrier
spacing can be determined as Δfsc ¼ 1/(Ts TG), and it is system design dependent.
The guard interval is strongly dependent on the amount of dispersion/multipath
fading the system needs to compensate for. Therefore, the true bandwidth efficiency
can be determined only if all details of OFDM system design are known. Never-
theless, the following rule of thumb can be used for an initial study. Typically, the
ratio Rs /BCO OFDM is around eight-ninths, so that the bandwidth efficiency is
about (1.778b) bits/s per Hz [5]. As an illustration, when all subcarriers carry
16-QAM symbols, the bandwidth efficiency is ~7.112 bits/s/Hz. Notice that trans-
mission of cyclic prefix, in addition of reducing the bandwidth efficiency, also
reduces the power efficiency.
The power efficiency of OFDM can be improved by using all-zero prefix, which
is illustrated in Fig. 7.5. Namely, on transmitter side we leave the guard intervals
empty. The optical channel will introduce the trails in guard intervals due to
chromatic dispersion and PMD. These trails need to be “copy-pasted” as prefix of
OFDM symbols before OFDM demodulation takes place. In principle, there is no
difference in dispersion compensation capabilities of this scheme as compared to
cyclic prefix in CO-OFDM systems. However, the power efficiency can be
improved (N + L )/N times. The drawback of this scheme is that ASE noise gets
Fig. 7.5 The illustration of Leave the guard interval empty on transmitter side
the zero-prefix OFDM
approximately doubled, as the noise from trail is transferred to already noisy prefix
portion of OFDM symbol. On the other hand, the bandwidth efficiency can be
improved through so-called no-guard interval OFDM [17, 18]. The no-guard
interval OFDM, however, requires the use of conventional linear equalizer to
compensate for distortions introduced by dispersion effects.
The generic OFDM system suitable for wireless applications is shown in Fig. 7.6.
The binary data sequence is first LDPC or turbo encoded, depending on application
of interest, and the encoder output is written into interleaver. For turbo coding
s-random interleaver can be used, while for LDPC coding the block-interleaver can
be used. For block-interleaver, log2(M ), where M is signal constellation size,
codewords are written in row-wise fashion interleaver. Notice that arbitrary
two-dimensional (2-D) constellation can be used. Then log2(M ) bits are taken
into column-wise fashion from the interleaver and used to select a point from 2-D
constellation such as QAM, by applying appropriate mapping rule. The QAM
symbol data stream is converted from serial to parallel form, and with the help of
subcarrier mapper, different subcarriers are loaded with different QAM symbols.
The inverse FFT is then applied, followed by the cyclic extension and windowing
operations. After digital-to-analog conversion (DAC), the corresponding RF signal
is up-converted, amplified, and transmitted by using a transmit antenna. On the
receiver side, after low-noise amplification, down-conversion, and analog-to-digital
conversion (ADC), the timing and frequency offset compensation are performed.
On such obtained symbol sequence, with proper timing and frequency offset
compensated, the cyclic removal step is applied, followed by serial-to-parallel
(S/P) conversion. Further, FFT demodulation is performed followed by symbol
detection and QAM demapping. Further, deinterleaving is preformed, followed by
turbo or LDPC decoding. Deinterleaving and turbo/LDPC decoding are typically
jointly performed.
On the other hand, the generic CO-OFDM system architecture (suitable for
optical communications) is shown in Fig. 7.7. The QAM data stream, obtained
after encoding of binary data stream and performing the corresponding binary-to-
QAM mapping, arrives as serial symbol flow to OFDM RF transmitter, as shown in
Fig. 7.7a. The symbols in QAM stream belong to the set of constellation points
{0,1,. . .,M 1}, where M is the QAM signal constellation size. When nonbinary
QAM
symbol OFDM RF transmitter
data stream
RF transmitter
S/P converter
(or DEMUX)
Binary
Subcarrier
LDPC/turbo/
mapper
Cyclic extension
data stream QAM IFFT DAC
convolutional Interleaver … +
coding mapper modulator
windowing
(a)
Symbol
timing Estimated binary
OFDM RF receiver Estimated
data stream
QAM data stream
RF receiver
frequency convolutional
…
Deinterleaving
…
Frequency-offset
Corrected signal
(b)
Fig. 7.6 The block diagram of OFDM transceiver suitable for wireless applications: (a) OFDM
transmitter configuration and (b) OFDM receiver configuration
7.4 OFDM Parameters Selection, OFDM Building Blocks. . . 509
OFDM RF transmitter
I/Q Modulator
I
S/P converter
DAC LPF to SMF
Subcarrier
mapper
QAM
symbol
IFFT Cyclic extension
data stream
… modulator insertion
DAC LPF
Q
(a)
From
OFDM RF receiver
SMF DFT/frequency
Balanced LPF ADC FFT demodulator, Estimated
synchronization, P/S QAM
…
…
channel estimation,
…
coherent converter
cyclic removal, data stream
detector LPF ADC symbol detection
From S/P conversion
local laser
(b)
Fig. 7.7 The CO-OFDM system architecture: (a) OFDM transmitter configuration and (b)
CO-OFDM receiver configuration
coding is used, the codeword symbols can be interpreted as QAM symbols, thus
providing that encoder nonbinary field size is the same as the size of the QAM
constellation. The serial QAM stream is converted into parallel stream in P/S
converter (or DEMUX), with Nsc symbols provided to the subcarrier mapper. The
subcarrier mappers serves as a look-up table (LUT), which assigns the in-phase and
quadrature coordinates to every input symbol and creates the corresponding com-
plex numbers passed to IFFT OFDM modulator in parallel fashion. After the FFT
portion of OFDM symbol is created, the cyclic extension is performed. The
cyclically extended OFDM symbol undergoes P/S conversion and upsampling
operation, before being passed to the DACs. The real and imaginary outputs of
DACs are (after pulse shaping and amplification, denoted as low-pass filtering
operation) used as inputs of an optical I/Q modulator. The optical OFDM data
stream is transmitted over optical communication system of interest. On the
receiver side [see Fig. 7.7b], the received optical signal is mixed with local laser
signal in balanced coherent detector. The balanced coherent detector provides the
projections along in-phase and quadrature basis functions, denoted as vI and vQ in
Fig. 7.7b, which are after amplification and ADC interpreted as real and imaginary
parts of corresponding complex number. Upon the S/P conversion, the FFT demod-
ulation is performed, followed by QAM symbol detection. The QAM symbol
stream is after P/S conversion delivered to the end user. In OFDM RF receiver
from Fig. 7.7b, the OFDM signal after DACs undergoes the following synchroni-
zation steps: (i) FFT window synchronization, in which OFDM symbols are
properly aligned to avoid any ISI, and (ii) frequency synchronization, in which
the frequency offset is estimated and compensated. Additionally, after FFT demod-
ulation the subcarrier recovery is performed, where the channel coefficients at
subcarrier level are estimated and compensated for. Full details of these steps,
together with various channel estimation techniques will be provided in incoming
sections.
510 7 OFDM for Wireless and Optical Communications
The OFDM signal at the output of transmitter shown in Fig. 7.7 a, can be
expressed as:
X
1 X
N FFT =21
t nT s j2π T k ðtnT s Þ
sðtÞ ¼ ej½2πf LD tþϕPN, S Xn, k rect e FFT , ð7:31Þ
n¼1 k¼N FFT =2
Ts
where we omitted the windowing function. In Eq. (7.31), fLD denotes the optical
carrier frequency of transmitter laser diode, while ϕPN,S denotes the stochastic laser
phase noise process. The other parameters in Eq. (7.31) are already described in
previous sections.
The transmitted optical OFDM signal propagates over optical medium of impulse
response h(t,τ), where the parameter τ is used to denote that the impulse response is
time-variant, so that the received signal can be represented as:
where w(t) denotes the ASE noise process that originates from EDFAs periodically
deployed to compensate for fiber loss. Upon the balanced coherent detection, the
corresponding signal can be written as:
where RPIN denotes the photodiode responsivity, and RL is load resistance. With
sB(t) we denoted the baseband portion of (7.33), namely:
X
1 X
N FFT =21
t nT s j2πT k ðtnT s Þ
sB ðtÞ ¼ Xn, k rect e FFT : ð7:34Þ
n¼1 k¼N FFT =2
Ts
kTZ
s þT FFT
1
Y n, k ¼ vðtÞej2πiðtkT s Þ=T FFT dt
T FFT
t¼kT s
kTZ
2 3 ð7:35Þ
s þT FFT ZΔt
1 tkT
4 j2πn T s
¼ hk ðτÞsB ðt τÞdτ þ wðtÞ5e FFT dt,
T FFT
t¼kT s 0
where for simplicity of presentation, we omitted RPINRL term and assumed that
frequency offset and phase error were compensated for.
By substituting sB(t) with expression given by Eq. (7.34), we obtain:
2 3
X
N=21 ZT FFT ZΔt
1 4 hk ðτÞej2πn ðστÞ=T FFT dτ5ej2πnσ=T FFT dσ þ wn, k
0
Y n, k ¼ Xn0 , k
n0 ¼N=2
T FFT
σ¼0 0
X
N=21 ZT FFT ZΔt
1 0 0
¼ X n0 , k hk ðτÞej2πn τ=T FFT dτ ej2π ðnn Þσ=T FFT dσ þ wn, k
n0 ¼N=2
T FFT
σ¼0 0
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
H n0 , k
ð7:36Þ
where Hn,k denotes the transfer function term of k-th subcarrier in the n-th OFDM
symbol. This term is not a function of outer integral and can be moved out so that
the equation above becomes:
1, n¼n0
zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{
X
N=21 ZT FFT
1 0
Y n, k ¼ Xn , k H n , k
0 0 ej2πðnn Þσ=T FFT dσ þ wn, k , ð7:37Þ
n0 ¼N=2
T FFT
σ¼0
The channel coefficient Hn,k accounts for chromatic dispersion, filtering effects, and
other linear distortion effects. The chromatic dispersion portion has the form
512 7 OFDM for Wireless and Optical Communications
…
Fig. 7.8 The parallel
dispersive optical channel
decomposition in frequency Hn,k wn,k
domain
Xn,k Yn,k
Hn,k+1 wn,k+1
Xn,k+1 Yn,k+1
…
exp[jϕCD(k)], where ϕCD(k) is defined earlier. We can now substitute Hn,k ¼ H’n,k
exp[jϕCD(k)] to obtain:
The generalization of Eq. (7.40) to PDM systems can be done by introducing the
Jones matrix of fiber link U( fk), so we obtain the following channel model:
Yn, k ¼ Uðf k ÞH0n, k ejðϕPN, S ϕPN, LO Þ ejϕCD ðkÞ Xn, k þ Wn, k , ð7:41Þ
where the corresponding symbols get replaced with two-component column vec-
tors, with the first component representing x-polarization state and the second
component representing the y-polarization state. This model can be used to study
CO-OFDM systems and various channel distortion compensation methods. For
instance, to study the impact of first-order PMD, we can use the following Jones
matrix [5, 47]:
U xx ðωÞ U xy ðωÞ ejωτ=2 0
U¼ ¼ RPðωÞR1 , PðωÞ ¼ , ð7:42Þ
U yx ðωÞ U yy ðωÞ 0 ejωτ=2
where τ is DGD, ω is the angular frequency, and R ¼ R(θ,ε) is the rotational matrix:
7.4 OFDM Parameters Selection, OFDM Building Blocks. . . 513
2 3
θ jε=2 θ jε=2
6 cos 2 e sin e 7
R¼6 2 7 ð7:43Þ
4 θ jε=2 θ jε=2 5
sin e cos e
2 2
with θ being the polar angle, while ε is the azimuthal angle. The magnitude of Uxx
and Uxy coefficients of Jones channel matrix against normalized frequency fτ (the
frequency is normalized with DGD τ so that the conclusions are independent on the
data rate) is shown in Fig. 7.9 for two different cases: (i) θ ¼ π/2 and ε ¼ 0 and
(ii) θ ¼ π/3 and ε ¼ 0. In the first case, channel coefficient Uxx completely fades
away for certain frequencies, while in the second case it never completely fades
away, thus suggesting that the first case represents the worst case scenario.
For multipath fading radio channel, we can denote the impulse response as h
(t,τ), where the parameter τ is used to denote that the impulse response is time-
variant. Therefore, the Eq. 7.32 is also applicable here. By assuming that the guard
interval is longer than the maximum delay spread while the wireless channel is
quasi-static for at least the duration of one OFDM symbol, we can perform the
multipath fading channel decomposition in similar fashion as given by Eqs. 7.35–
7.38. The time-varying impulse response, as already shown in Chap. 2, can be
represented as a sum of multipath components arriving at the receiver side:
X
hðτ; tÞ ¼ h ðtÞejθn ðtÞ δ½τ τn ðtÞ,
n n
ð7:44Þ
where hn, θn, and τn represent the n-th propagation path amplitude, phase, and
delay, respectively. The Fourier transform (FT) of the time-varying impulse
response with respect to propagation path delay τ will give us time-varying transfer
function:
Z1 X
H ðf ; tÞ ¼ hðτ; tÞej2πf τ ¼ h ðtÞe
n n
j½2πf τn ðtÞþθn ðtÞ
, ð7:45Þ
1
which changes rapidly in both time and frequency, exhibiting therefore both time-
and frequency-selective fading. Given that the transfer function is time-varying, it
makes sense to define the autocorrelation function of the transfer function:
RH ðf 1 ; f 2 ; t1 ; t2 Þ ¼ hH ∗ ðf 1 ; t1 ÞH ðf 2 ; t2 Þi: ð7:46Þ
Magnitude
0.6
0.4
0.2
0.0
0 2 4 6 8 10 12
Normalized frequency, f τ
(a)
|Uxx| |Uxy| q=π/3, e=0
1.0
0.8
Magnitude
0.6
0.4
0.2
0.0
0 2 4 6 8 10 12
Normalized frequency, f τ
(b)
The ranges in time and frequency over which the transfer function exhibits signif-
icant correlation are known as coherence time and coherence bandwidth. The
coherence time is defined as the time range when the spaced-time correlation
function RH(Δt) ¼ RH(0;Δt) drops below 0.9. On the other hand, the coherence
bandwidth is defined as the frequency range when the spaced-frequency correlation
function RH(Δf ) ¼ RH(Δf;0) drops below 0.9. The delay power spectrum (DPS),
denoted as Rh(τ), is the inverse Fourier transform of the space-frequency correlation
7.4 OFDM Parameters Selection, OFDM Building Blocks. . . 515
function RH(Δf ) ¼ RH(Δf;0). The following simple model can be used to study
OFDM systems for wireless applications [4]:
8
< ρ2 δðτÞ, τ ¼ 0
Rh ð τ Þ ¼ Π, 0 < τ τc ð7:48Þ
: γðττc Þ
Πe , τ > τc
where ρ2 is the normalized power of the line of site (LOS) component, Π is the
normalized power density of the constant-level portion of DPS, τc is the duration of
the DPS constant-level, and γ is the decay exponent of the exponentially decreasing
portion of the DPS. Given that the magnitude R ¼ |H( f, t)| of time-varying transfer
function H( f, t) for WSS-US model follows the Rician distribution:
2 Z2π
r r þ s2 rs 1
f R ðr Þ ¼ 2 exp I0 2 , I 0 ðxÞ ¼ expðx cos ψ Þdψ, ð7:49Þ
σ 2σ 2 σ 2π
0
where I0(x) is the modified Bessel function of the first kind and zero order,
s ¼ j〈H( f, t)〉|, and σ2 is the variance of the real and imaginary components
of the complex Gaussian process. As already discussed in Chap. 2, the total
power X in multipath
2 components different from the LOS component is
2σ 2 ¼ h
n, n6¼0 n
, while the total power is given by:
Z1
PRx ¼ r 2 f R ðr Þdr ¼ s2 þ 2σ 2 : ð7:50Þ
0
The Rician parameter can be used as a measure of the fading severity: the small
K implies severe fading, a large K implies mild fading, and when K tends to infinity
there is no fading at all. The parameters of the model given by Eq. (7.48) can easily
be related to K, PffiRx , and root-mean-square (RMS) delay spread, defined as
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
τRMS ¼ hτ2 i hτi2 , as described in [4]. Based on this model, we can build the
frequency-domain channel simulator, based on Gaussian random generator, with
details found in [4], which agrees very well with the measurement results.
516 7 OFDM for Wireless and Optical Communications
The operation principles for wireless communications have already been provided
in Sect. 7.4.2. The operation principle of CO-OFDM system is illustrated in
Fig. 7.10. Several basic building blocks can be identified including RF OFDM
transmitter, optical I/Q modulator (to perform electro-optical conversion), disper-
sion map of interest, balanced coherent detector, and RF OFDM receiver. Upon the
balanced coherent detection, the received signal can be expressed as:
( )
r ðtÞ ’ Aexp j½ðωTx ωLO Þt þ ϕPN, Tx ϕPN, LO sBB ðtÞ hðtÞ þ wðtÞ, ð7:52Þ
|fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflffl}
Δω Δϕ
where A is the balanced coherent detection constant, h(t) is optical channel impulse
response, and w(t) is additive noise process (dominated by ASE noise), while sBB(t)
denotes the baseband (BB) portion of the signal:
X
1 X
N FFT =21
t nT s j2πT k ðtnT s Þ
sBB ðtÞ ¼ Xn, k rect e FFT : ð7:53Þ
n¼1 k¼N FFT =2
Ts
Estimate of
transmitted data
Data input
Multiplexer RF OFDM
Demultiplexer … receiver
… Data symbol
decisions
RF OFDM transmitter
Constellation
mapper …
… FFT demodulator
IFFT modulator … •DFT window synchronization
S/P converter and •Frequency synchronization
…
CE remover •Subcarrier recovery
P/S converter and
cyclic extension (CE) Im{⋅} Re{⋅}
The Xn,k denotes a two-dimensional signal constellation (such as QAM) point trans-
mitted on the k-th subcarrier in the n-th OFDM symbol, Ts is symbol duration and TFFT
is the effective FFT part of OFDM symbol. The ωTx and ωLO denote the carrier
frequencies of transmit laser and local laser oscillator, respectively. Finally, ϕPN,Tx
and ϕPN,LO denote the transmit laser and local oscillator laser phase noise, respec-
tively. It is evident from Eqs. (7.52) and (7.53) that estimation and compensation of
frequency offset Δω ¼ ωTx ωLO and the phase error Δϕ ¼ ϕPN , Tx ϕPN, LO
are of crucial importance.
After this review of the optical OFDM signal processing, at conceptual level, we
describe the following RF OFDM signal processing steps: DFT window synchro-
nization, frequency synchronization, channel estimation, and phase noise estima-
tion. In DFT window synchronization, the OFDM symbols are properly aligned to
avoid ISI. In frequency synchronization, we estimate the frequency offset between
transmit laser and local oscillator laser frequency in order to compensate for it. In
subcarrier recovery, we estimate the channel coefficients for each subcarrier and
compensate for channel distortion. Finally, in phase noise estimation, we are trying
to estimate the phase noise originating from laser phase noise of transmit and local
lasers and trying to compensate for it. (The reader is advised to look at references
[5, 30–37] if needed.)
In the rest of this section, we describe the receiver operations common to both
wireless OFDM communication and coherent optical OFDM communication
including DFT window synchronization, frequency synchronization, phase estima-
tion, and channel estimation.
Fig. 7.11 The organization of OFDM frame showing Schmidl-Cox preamble for DFT windowing
518 7 OFDM for Wireless and Optical Communications
where pm denotes the m-th pilot symbol and Nsc denotes the number of subcarriers.
By sampling the received signal, based on parallel channel decomposition model
described earlier, we obtain that:
where TFFT is the effective portion of OFDM symbol (see Fig. 7.11). The following
correlation function can be used in DFT windowing:
X
N sc =2
Rd ¼ r∗
mþd r mþdþN sc =2 , ð7:56Þ
m¼1
with the peak for d ¼ 0. The start of FFT effective part can easily be identified,
providing that frequency offset Δω is reasonably small. Another approach is to
define normalized magnitude squared of correlation function as [5]:
vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
uN =2
uX sc NX sc =2
Md ¼ jRd =Sd j2 , Sd ¼ t jr mþd j 2 r mþdþN =2 2 , ð7:57Þ
sc
m¼1 m¼1
d^ ¼ argmax Md : ð7:58Þ
d
The frequency synchronization has two phases: (i) frequency acquisition phase and
(ii) frequency tracking phase. Typically, telecommunication lasers are locked to
references in accordance with ITU-T defined frequency grid. Regarding the optical
communications, a wavelength locker that is commonly used has accuracy of
~2.5 GHz. Any frequency offset between 5 GHz to 5GHz will cause serious
problems for OFDM system operation, as discussed in [5]. The purpose of fre-
quency acquisition is to perform course estimation of frequency offset and to reduce
it to fall into a range equal several times of OFDM subcarrier spacing. After that,
the frequency tracking phase can be initiated.
The frequency acquisition can be performed based on pilots [38], ML estimation
[39], or cyclic prefix [40], which is illustrated in Fig. 7.12. If the cyclic extension
procedure is implemented as shown in Fig. 7.2, the prefix and the last NG/2 samples
of the effective OFDM symbol portion are identical. On the other hand, the first NG/
2 samples of the effective OFDM symbol portion and the suffix, which are
7.5 CO-OFDM Principles, DFT Windowing, Frequency Synchronization, Phase. . . 519
Frequency
∫ ( ) dt
TG
Maximum
correlation offset
Delay
Conjugation
TFFT Timing
separated by TFFT seconds, are also identical. We are able to estimate the fre-
quency offset and compensate for it by crosscorrelating the corresponding seg-
ments. At the same time, correlation peaks obtained after every OFDM symbol can
be used for timing. However, this approach, given the duration of guard interval, is
inferior to Schmidl-Cox timing approach proposed in [32].
The frequency offset remained upon frequency acquisition can be estimated by
using Schmidl-Cox approach. By substituting Eq. (7.55) into Eq. (7.56), we can
rewrite Rd. in terms of the frequency offset by:
2πf offset
z}|{
j Δω T FFT =2þΔϕ
X
N sc =2 |ffl{zffl} X
N sc =2
Rd ¼ jr mþd j2 e 1=Δf sc
þ nd ¼ jr mþd j2 ejðπf offset =Δf sc þΔϕÞ þ nd ,
m¼1 m¼1
ð7:59Þ
where nd is the equivalent noise term. By ignoring the phase noise error Δϕ, we can
estimate the frequency offset foffset as follows [5, 32]:
Δf
f^offset ¼ sc ∡Rd^, ð7:60Þ
π
where ∡Rd^ is the angle of correlation function (in radians), while d^ is obtained from
Eq. (7.58). Once the frequency offset is estimated, it can be compensated from
received signal by:
^
r comp ðtÞ ¼ ej2π f offset t r ðtÞ: ð7:61Þ
After the time synchronization and frequency synchronization were completed, the
subcarrier recovery takes place. The subcarrier recovery involves phase estimation
and channel estimation.
520 7 OFDM for Wireless and Optical Communications
In the equivalent OFDM channel model described earlier, the received symbol
vector of the k-th subcarrier in the n-th OFDM symbol, denoted as rn , k, can be
represented as:
where sn , k denotes the transmitted symbol of the k-th subcarrier in the i-th OFDM
XNsc
symbol, Hk is the channel coefficient of k-th subcarrier, and ϕn ¼ ð1=N sc Þ k¼1
ϕnk is the common phase error (CPE). Parameter wn,k denotes the additive noise
term (again dominated by AWGN). The likelihood function in this case is given as:
By minimizing the log-likelihood function, we can obtain the following solution for
common phase error [5]:
( )
X
N sc
b n ¼ arg
ϕ r ni, k H ∗
k sn, k =σ k : ð7:65Þ
2
k¼1
There exist a number of algorithms for channel estimation proposed so far. They
could be time-domain-based, frequency-domain-based, or a combination of the
two. The channel estimation techniques can be classified as either data-aided or
pilot-aided. The data-aided channel estimation techniques are prone to the error
propagation effect and as such will not be discussed here with much details.
7.5 CO-OFDM Principles, DFT Windowing, Frequency Synchronization, Phase. . . 521
Data Pilot
symbols symbols
Subcarrier, k
Subcarrier, k
Pilot
symbols
Data
symbols
Fig. 7.13 Pilot arrangements for OFDM channel estimation: (left) block-type arrangement and
(right) comb-type arrangement
Subcarrier, k
two-dimensional OFDM
channel estimation
Time, i
XN sc
j r k H k sk j 2
lðr 1 ; r 2 ; ; r Nsc jH1 ; H 2 ; ; HNsc Þ ¼
2σ 2
k¼1
ð7:67Þ
XN sc
ðr k H k sk Þðr k H k sk Þ∗
¼
k¼1
2σ 2
The channel estimate obtained by Eq. (7.68) is commonly referred to as the least
square (LS) solution. The estimated information symbols by LS estimator are given
as:
rk Hk sk þ wk wk w0k sk
sk ¼ ¼
sk þ , ð7:69Þ
H k H k s0k
w 0
H k, LS Hk þ s0k
k
where we used s’k and w’k to denote the transmitted symbol and noise sample
generated when the LS estimate of Hk is obtained. Since there are two additive
terms, it is evident that noise gets enhanced, indicating that this scheme represents
an instance of zero-forcing estimator.
7.5 CO-OFDM Principles, DFT Windowing, Frequency Synchronization, Phase. . . 523
which will minimize the MSE. The estimator error can be defined as:
ε ¼ AHLS H: ð7:71Þ
By employing the orthogonality principle from Chap. 5 and by claiming that the
error matrix is independent on “data,” we obtain that:
ðAHLS HÞH{ ¼ 0 , A HLS H{ HH{ ¼ 0, ð7:72Þ
|fflfflfflfflfflffl{zfflfflfflfflfflffl} |fflfflffl{zfflfflffl}
RH, HLS RH
where RH denotes the correlation matrix of H, while RH, HLS denotes the
crosscorrelation matrix between H and HLS. By solving Eq. (7.72) for A, we obtain:
A ¼ RH R1
H, HLS , ð7:73Þ
and after substituting it in Eq. (7.70), we derive the MMSE channel estimation as:
which resembles a quite general Wiener filter solution. Based on Eq. (7.68), the
1
crosscorrelation matrix RH, HLS ffi RH, HLS þ σ 2n SS{ , where σ 2n is the variance of
the noise and S is the diagonal pilot matrix. Now, upon substitution into Eq. (7.74),
we obtain a simpler equation for MMSE estimation of H:
n 1 o-1
HMMSE ¼RH RH, HLS þ σ 2n SS{ HLS : ð7:75Þ
^ p, LS ¼ H p, LS ð1Þ H p, LS N p T , H p, LS ðiÞ ¼ Y p ðiÞ ;
H i ¼ 1, . . . , N p ð7:77Þ
X p ði Þ
In Eq. (7.77), we use Np to denote the number of pilot subcarriers, while Xp(i) and
Yp(i) denote the i-th transmitted and received pilot symbols (i ¼ 1, . . ., Np),
respectively. Once the pilots have been determined in combo-type and 2-D arrange-
ments, we need to perform the interpolation to estimate the channel coefficients for
data subcarriers. Various interpolation methods, such as linear interpolation,
second-order interpolation, low-pass interpolation, spline cubic interpolation, and
time-domain interpolation, have been proposed so far. For instance, in linear
interpolation the channel estimation for k-th subcarrier is given by [35]:
l
^ ðkÞ ¼ H p ðm þ 1Þ H p ðmÞ
H þ H p ðm Þ
N sc =N p
N sc N sc N sc ð7:78Þ
m < k < ð m þ 1Þ ; 0<l<
Np Np Np
where we assumed the uniform spacing of pilots X(mNsc/Np + l ) ¼ Xp(m), with X(i),
i ¼ 1,. . ., Nsc, being the symbol carried by i-th subcarrier. The time-domain
interpolation method [35, 48] represents a high-resolution method based on zero-
padding FFT/IFFT. The IFFT is applied to H^ p, LS in order to perform conversion into
time domain [35]:
p 1
NX
hp ð nÞ ¼ Hp, LS ej2πkn=Np ; n ¼ 0, 1, , N p 1 ð7:79Þ
k¼0
NX
sc 1
and such obtained channel coefficient are used to compensate for channel
impairments.
The calculation of channel coefficients by using Eq. (7.74) is computationally
extensive. The following approximation has been shown to be effective for both
7.6 Differential Detection in OFDM Systems 525
So far the pilot-aided channel estimation techniques suitable for both wireless
coherent and optical coherent detections have been studied. The use of pilots
reduces the overall spectral efficiency. In other words, the power efficiency can
be improved if the pilot subcarriers are not transmitted. In data-aided channel
estimation, the first OFDM symbol must be known at the receiver side to start the
detection process. The subcarrier symbols from previous OFDM symbol detection
are used to predict the channel for the current OFDM symbol. Namely, when the
channel is slowly time-varying, there will be a large correlation of current OFDM
symbol with previous OFDM symbol, so that the channel estimation based on
previous OFDM symbol will be reliable. Otherwise, the error propagation effect
will occur. For additional details on data-aided channel estimation, an interested
reader is refereed to [50, 51].
The key idea behind various channel estimation techniques described so far, based
on coherent detection, is to determine accurate magnitude and phase estimates of
the subcarriers’ channel coefficients. These estimates are then used to compensate
for channel distortions. On the other hand, the differential detection does not
perform any channel estimation, since the information is written in the phase
difference between current and previous sub-symbol. The overall complexity and
latency have been reduced at the cost of about 3 dB penalty in signal-to-noise ratio.
The configuration of OFDM receiver with differential detection, suitable for wire-
less applications, is shown in Fig. 7.15.
This scheme can easily be adopted in direct-detection OFDM, to be described
later. The absolute phase reference is not needed, as the differential detector
compares the current sub-symbol with previous sub-symbol. Given that the
526 7 OFDM for Wireless and Optical Communications
Estimated binary
data stream
RF receiver
LDPC/turbo/
S/P FFT Differential P/S
ADC
…
…
Deinterleaving convolutional
…
converter demodulator detection converter
decoding
Fig. 7.15 The simplified configuration of OFDM receiver with differential detection, suitable for
wireless applications
X
n
θn, k ¼ ϑm, k mod2π, ð7:83Þ
m¼0
with wn,k representing an AWGN noise sample, as before. The n-th phase differ-
ential detection can be performed by:
j ðθ n, k θn1, k Þ
∗ j ϕ ϕ |fflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl}
Y n, k Y ∗ ¼
jHn, k j H n1, k e ð n, k n1, k Þ
e ϑ n, k
n1, k
∗ jϕ
þjHn, k jejϕn, k w∗ wn, k þ wn, k w∗
n1, k þ H n1, k e ð7:85Þ
n1, k
n1, k
Even though that the phase ϑn , k is properly detected, there is the phase disturbance
term ϕn,k ϕn 1,k, which is introduced by the time-selective fading. When OFDM
symbol duration is properly chosen to small relative to the phase coherence time,
this phase disturbance can be neglected. On the other hand, the signal level get
affected by fading, while the additive noise get doubled, resulting in at least 3 dB
degradation in SNR compared to the coherent detection case. On the other hand,
when pilot-aided channel estimation is imperfect, the differential detection penalty
is actually lower than 3 dB. Based on Clark-Jakes model described in Chapter, the
normalized correlation coefficient corresponding to the n-th OFMD symbol would
be:
7.6 Differential Detection in OFDM Systems 527
where Ts if OFDM symbol duration, while νD,max is the maximum Doppler fre-
quency. This correlation coefficient can be used to estimate maximum tolerable
Doppler frequency. The difference between received sub-symbols can be related to
the correlation coefficient as follows [3]:
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
Y n, k Y n1, k ¼ ½1 Rð1ÞY n1, k þ 1 R2 ð1Þzn, k , ð7:87Þ
where zn,k is the unit variance noise sample. When yn 1,k and zn,k are uncorrelated,
the signal-to-distortion ratio (SDR) can be estimated as [3]:
1
SDR ¼ , ð7:88Þ
2ð 1 Rð 1 Þ Þ
and must much larger than SNR not to affect the BER performance. For a SNR
penalty of 1 dB, the SDR should be at least 10 dB, so that the corresponding
correlation coefficient is R(1)
0.95, corresponding to Doppler frequency OFDM
symbol duration product of νD,maxTs
0.07 or equivalently the maximum tolerable
Doppler frequency of νD,max
0.07/Ts. Since the maximum Doppler frequency is
related to the user speed u by νD,max ¼ fcu/c ( fc is the carrier frequency), the
maximum tolerable user velocity would be:
X
k
θn, k ¼ ϑn, l mod2π: ð7:90Þ
l¼0
j ðθ n, k θn, k1 Þ
∗ jðϕ ϕ Þ |fflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflffl}
Y n, k Y ∗
n, k1 ¼ jHn, k jH n, k1 e n, k n, k1 e ϑ n, k
∗ jϕ
þjHn, k jejϕn, k w∗ ∗
n, k1 þ H n, k1 e n, k þ wn, k wn, k1 ð7:91Þ
n, k1 w
528 7 OFDM for Wireless and Optical Communications
Not surprisingly, this equation has similar form as Eq. (7.85). The phase distortion
is now related to the phase difference between the n-th and (n 1)-th subcarrier. In
other words, this phase disturbance is now introduced by the frequency-selective
fading. For the exponentially decreasing multipath power delay profile, the
frequency-domain (FD) normalized correlation function is given by [3]:
1
RFD ðkÞ ¼ Rðk=T Þ=PRx ¼ , ð7:92Þ
1 þ j2πτRMS k=T
where τRMS is the RMS multipath delay spread and the subcarrier channel spacing
is given by 1/T. The corresponding frequency-domain SDR for k ¼ 1 would be:
1
SDRFD ¼ : ð7:93Þ
2ð1 RFD ð1ÞÞ
For the FD SDR of 10 dB, the corresponding correlation will be 0.95, which results
in normalized subcarrier spacing (1/T)/(1/τRMS) of 0.03. In other words, the max-
imum tolerable RMS delay spread is 3% of the FFT period T. Clearly, in frequency-
domain differential detection, the robustness to multipath fading is FFT period
dependent and, therefore, significantly worse than coherent detection where the
tolerance to multipath fading is the guard interval dependent.
signal from two different DAB transmitters located at distances d1 and d2. When the
difference in arrival times, Δτ ¼ |d1-d2|/c, is smaller than the guard interval duration
TG, the signals coming from different DAB transmitters can be interpreted as the
transmit diversity scheme to improve SNR and reduce the BER. The audio signals
in DAB are encoded into either MPEG-1 (frame duration of 24 ms) or MPEG-2
(48 ms) frames. During the compression, from 1.5 Mb/s down to 64–384 kb/s, the
perceptual coding is used in which the audio components that cannot be detected by
human earing system are omitted. MPEG compatible DAB audio frame is illus-
trated in Fig. 7.16.
The header is 32 bits long, while the CRC checksum is 16 bits long. The bit
allocation field, scale factors, and sub-band samples follow the CRC field. The
audio sampling rate in MPEG-1 is maximum 48 kHz, which is higher than 44.1 kHz
used in the standard CD. For mono sound the data rates range from 32 to 192 kb/s,
while for stereo, dual sound, and joint stereo the data rates range between 64 kb/s
and 384 kb/s. The MPEG-2 frame represents the MPEG-1 frame supplemented with
MPEG-2 extension. The sampling rate in MPEG-2 is 24 kHz; thus, the frame
duration is twice longer (48 ms). The sub-band coding of audio signals is used.
After the staffing bytes field, the DAB extension is used in DAB standard. In DAB
extension, the program-associated data (PAD) are transmitted, with possible ver-
sions extended-PAD (X-PAD), which is variable in size with minimum size of
4 bytes, and fixed-PAD (FPAD), which is of fixed size (2 bytes). The PAD contains
the information related to the music/voice identifier, program-related text, and
additional scale factor-CRC (SCF-CRC) bits. The DAB audio rates used in the
UK are 256 kb/s for classical music, 128 kb/s for popular music, and 64 kb/s for the
voice signal.
The coded-OFDM frame, in DAB, consists of 77 coded-OFDM symbols, the
null symbol is used to denote the start of DAB frame, the first symbol is used as the
530 7 OFDM for Wireless and Optical Communications
STU
…
FF
Header CRC Sub-band samples X-PAD
allocation SI factors CRC PAD
Variable size
Byte L-1 Byte L
4 bytes
F-
X-PAD SCF-CRC
PAD
Fixed size
phase reference for phase/frequency synchronization on receiver side, and the data
OFDM symbols start with the symbol number 2. The coded-OFDM symbol dura-
tion ranges from 125 μs, for mode III, to 1 ms, for mode I. To deal with multipath
fading effects, the guard interval is appended to the OFDM symbol, with duration of
guard interval being approximately one-fourth of the duration of OFDM symbol.
The first several symbols of total rate 96 kb/s compose the so-called fast informa-
tion channel (FIC), with number of OFDM symbols dictated by the DAB mode
(sampling rate). The remaining data OFDM symbols of rate 2.304 Mb/s compose
the so-called main service channel (MSC). The number of subcarrier per OFDM
symbol is dictated by DAB mode and ranges from 192 for mode III to 1536 for
mode I. Each subcarrier carries π/4-shift-DQPSK symbols, with corresponding
constellation diagram shown in Fig. 7.17a. The carrier phase gets shifted for π/4
from symbol to symbol. On such a way, we move from QPSK to rotated QPKS for
π/4 rad from symbol to symbol. From Fig. 7.17a it is evident that with π/4 phase
shift, we move to 00 and 10 correction symbols (states), while with 3π/4 shifts we
move to 01 and 11 states. Clearly there is no transition of π rad. For comparison
purposes, the conventional DQPSK signal constellation is shown as well. The
transition from 00 state to 11 state result in the phase shift of π rad, which changes
amplitude of the carrier causing additional symbol errors in detection stage, due to
filtering effects. After the computation of projections of received signal along the
bases functions ϕ1(t) and ϕ2(t), to get the in-phase and quadrature estimates, the
corresponding detector is composed of the following blocks: (i) arctangent compu-
tation block to determine the absolute phase, (ii) the phase-difference block, and
(iii) modulo-2π correction block to correct the errors due to phase angles wrapping
around the ϕ1(t)-basis function.
The bandwidth of DAB signal is 1.536 MHz, and together with the guard band, it
occupies in total 1.75 MHz, which is the 1/4 of the 7 MHz channel available in band
III (174–240 MHz). Therefore, four DAB channels get frequency multiplexed into
one VHF channel.
The DAB signal is composed of up to 64 subchannels carrying audio, data, or
combination of the two signals, multiplexed together into the common interleaved
7.7 OFDM Applications in Wireless Communications 531
φ2 φ2
01 00 01 00
φ1 φ1
11 10 11 10
(a) (b)
Fig. 7.17 The constellation diagrams for: (a) π/4-shift-DQPSK and (b) DQPSK
frame, with the help of the ensemble multiplexer. The data rate per subchannel is a
multiple of 8 KHz. Such obtained ensemble transfer interface (ETI) signal is used as
the input to the DAB modulator, shown in Fig. 7.18, composed of n FEC schemes, one
per subchannel, providing unequal error protection (UEP) and an OFDM modulator.
Clearly, the DAB modulator is in fact the coded-OFDM modulator. The configuration
of OFDM modulator is shown in Fig. 7.19. The frequency interleaver is used to deal
with frequency-selective fading effects. The differential encoding and mapping is
already described earlier; the pre-compensation block is used to partially
pre-compensate for the nonlinearities introduced by the amplifier. After I/Q modula-
tion and intermediate frequency (IF)/RF up-conversion, the OFDM signal is ampli-
fied, followed by the band-pass filtering (BPF), and broadcasted by a transmit antenna.
The OFDM demodulator is similar to that shown in Fig. 7.15. The organization of
DAB packet is shown in Fig. 7.20, which is self-explanatory.
To avoid synchronization problems on receiver, originating from sequences of
all zeroes/ones, the scrambler shown in Fig. 7.21 is used. The scrambler has been
reset every 24 ms, by the all-ones pattern into the shift register.
The FEC is based on convolutional coding, as illustrated in Fig. 7.22. The
convolutional codes have been described in Chap. 9; here we briefly describe the
puncturing mechanism. To achieve the unequal error protection, the code rate R is
varied by changing the puncturing index PI according to the following equation:
8
R¼ , PI 2 f1; 2; ; 24g: ð7:94Þ
8 þ PI
Therefore, the code rate ranges from 8/9 to 8/32. Typically, the FIC is protected by
code rate 1/3, while the code rates related to the data payload are chosen from the
set {2/8, 3/8, 4/8, 6/8}, depending on the priority level.
532 7 OFDM for Wireless and Optical Communications
FEC 1
Convolutional Time
Scrambler encoder
S/P converter interleaver
…
ETI OFDM
signal FEC n modulator
Convolutional Time
Scrambler encoder interleaver
Pre-compensation
Power amplifier
encoder and
Frequency
interleaver
Differential
and BPF
From
mapper
Scrambler Scrambler
input output
Puncturing
Fig. 7.22 The convolutional encoder configuration and puncturing mechanism. The code rate is
determined by R ¼ 8/(8 + PI), where PI is the puncturing index, which is dependent on the
protection level. The set of code rates of this punctured convolutional code is {8/9, 8/10, . . ., 8/31,
8/32}
Today there exist a numerous standards related to DVB [52, 53]. DVB-S, DVB-C,
and DVB-T represent the DVB standards for the first generation satellite, cable, and
terrestrial transmission, respectively. On the other hand, DVB-S2, DVB-C2, and
DVB-T2 represent the second generation standards for satellite, cable, and terres-
trial transmission, respectively. DVB-H standard represents an extension of DVB-T
for handheld mobiles. DVB-SH standard describes the hybrid method for handheld
mobiles via satellite and terrestrial transmission systems. DVB-IP is the standard
for video stream transmission over the IP networks. DVB-SNG represents the
satellite transmission standard for professional applications. DVB-T, DVB-C2,
and DVB-T2 standards are coded-OFDM-based, while DVB-S, DVB-C, DVB-
SNG, and DVB-S2 are single-carrier-based standards.
In the reminder of this section, we briefly describe the basics of DVB-T and
DVB-T2. DVB-T channel has the bandwidth of 6, 7, or 8 MHz. There are two
534 7 OFDM for Wireless and Optical Communications
The corresponding sampling frequencies for 7 MHz and 6 MHz channels are given,
respectively, by:
64 7
f s IFFT, 7 MHz ¼ MHz ¼ 8 MHz
7 8 ð7:96Þ
64 6
f s IFFT, 6 MHz ¼ MHz ¼ 6:857142857 MHz
7 8
The subcarrier spacing can be obtained by dividing the sampling frequency with
the number of subcarriers N:
The guard interval TG is chosen to be 1/4, 1/8, 1/16, or 1/32 part of the symbol
duration. The total symbol duration (OFDM symbol duration) is then given by:
1þg
T s ¼ T G þΔt ¼ gΔt þ Δt ¼ , g 2 f1=4; 1=8; 1=16; 1=32g: ð7:99Þ
|{z} Δf sc
gΔt
Δf sc
Rsubcarrier ¼ 1=T s ¼ , g 2 f1=4; 1=8; 1=16; 1=32g: ð7:100Þ
1þg
The number of subcarriers actually used in 2 K mode is Nsc ¼ 1705, while the
number of subcarriers used in 8 K mode is Nsc ¼ 6817. Therefore, the bandwidth
occupied BWDVB T would be then:
BW DVB-T ’ N sc Δf sc : ð7:101Þ
Out of 1705 subcarriers used in 2 K mode, there are 1512 payload subcarriers,
carrying QPSK, 16-QAM, or 64-QAM symbols, 142 scattered pilots (whose
7.7 OFDM Applications in Wireless Communications 535
Program
Video streams
encoder
Multiplexer
Program
PS1
(MUX)
Audio
encoder
Multiplexer (MUX)
Transport
Data stream (TS) TS1
Transport
encoder PS2
Splitter
TS2
…
Source coding
+ MPEG-2 MUX PSn
(a)
MUX Coded
TSi adaptation, data
RS(204,188) Convolutional Convolutional Puncturing
Energy
encoder interleaver encoder block sequence
(i=1,2) dissipation
(scrambling)
(b)
Fig. 7.23 The source coding and FEC in DVB-T: (a) source coding and MPEG-2 multiplexing
and (b) FEC in DVB-T, DVB-C, and DVB-S
side, the TV set can decide which mode to select (LP or HP), depending on the
receive signal quality.
The aggregate data information rate (net data rate), denoted as RD, can be
determined as:
Δf sc 188
RD ¼ N sc RPCC log2 M cf BW , g 2 f1=4; 1=8; 1=16; 1=32g, ð7:102Þ
1 þ g 204
where RPCC is the punctured convolutional code rate, M is the signal constellation
size, and cfBW is channel bandwidth dependent correction factor, which is based on
Eq. (7.96), determined as:
8
< 1, BW ¼ 8 MHz
cf BW ¼ 7=8, BW ¼ 7 MHz :
:
6=8, BW ¼ 6 MHz
The DVB-T FEC decoder configuration is shown in Fig. 7.24. After symbol/bit
deinterleaving, the Viterbi decoder inserts dummy bits on positions where the parity
bits get punctured on transmitter side. After the Viterbi decoding, the convolutional
deinterleaver breaks the burst errors, so that RS (204,188) decoder deals only with
7.7 OFDM Applications in Wireless Communications 537
Energy
From Symbol/bit Viterbi Convolutional RS(204,188) dissipation TS
demapper deinterleaver decoder deinterleaver decoder removal & output
adaptation
Code rate
adaptation
Interval insertion
TS1 Low-priority
interleaver
interleaver
adaptation
Demux
Symbol
Mapper
FEC
Guard
Frame
IFFT
Bit
…
…
…
TS2 High-priority modulator
FEC
Transmit
Pre-correction
antenna
conversion
IF/RF up-
amplifier
Band-
Power
block
DAC Pass
filter
random errors and short bursts. If the number of errors exceeds the error correction
capability of the RS decoder, the transport error indicator gets activated so that the
corresponding packet in error cannot be processed by MPEG-2 decoder. After
energy dissipation removal and re-synchronization, the MPEG-2 TS get recreated.
The overall configuration of DVB-T transmitter is shown in Fig. 7.25. Clearly,
by comparing with Fig. 7.6, we conclude that the core of DVB-T transmitter is
coded-OFDM RF transmitter. The corresponding low-priority and high-priority
data streams after FEC encoding, as described in Fig. 7.23 b, undergo the
demultiplexing, followed by bit and symbol interleaving steps. After subcarrier
QAM mapping, the frame adaptation is performed by appropriately inserting the
pilots used on the receiver side for channel estimation and TPS subcarrier symbols.
The remaining steps are identical to those described in Fig. 7.6 a and include the
guard interval insertion and DAC, while the pre-correction step to deal with
amplifier nonlinearities is optional. After the IF/RF up-conversion, power amplifi-
cation, and band-pass filtering, the corresponding DVB-T signal is transmitted over
a transmit antenna.
The TPS subcarriers contain information about the mode (2 K or 8 K), duration
of the guard interval (1/4, 1/8, 1/16, or 1/32 of IFFT part), convolutional code rate
(1/2, 2/3, 3/4, 5/6, 7/8), the type of modulation (QPSK, 16-QAM, 64-QAM), and
538 7 OFDM for Wireless and Optical Communications
φ2
φ2
φ1
φ1
(a) (b)
φ2 φ2
φ1
φ1
(c) (d)
Fig. 7.26 DVT-B signal constellation diagrams for (a) QPSK and (b) 16-QAM (for ef ¼ 1).
Hierarchical 16-QAM modulation for expansion factors: (c) ef ¼ 2 and (d) ef ¼ 4
decompose the constellation into four quadrants each with 16 points. The quadrant
information can be used for HP stream; while with 4 bits, we can select one of
16 points in each quadrant, which corresponds to the LP stream. The expansion
factor increases the distance among center of mass points for each quadrant, as
illustrated in Fig. 7.26(c,d). By increasing the expansion factor, the interference
between HP and LP streams is lower. On the other hand, for LP stream the
constellation points are getting closer to each other, and the LP stream is more
sensitive to cross talk and low SNR values.
The configuration of DVB-T receiver is provided in Fig. 7.27. The first module
represents the tuner, to convert the selected RF channel down to the intermediate
frequency (IF). At IF the signal is band-pass filtered, typically by a surface acoustic
wave (SAW) filter. Further, the second IF down-conversion stage takes place, with
center IF frequency being at 32/7 MHz. The I/Q demodulation in DVB-T is based
on fs/4-method, shown in Fig. 7.28, where fs is the sampling frequency in the ADC,
which is equal to fs ¼ 432/7 MHz. The time synchronization is based on autocor-
relation method described in Fig. 7.12. In parallel with the time synchronization,
the signal after the ADC is used as the input to the changeover switch, whose
outputs get selected in an alternative fashion. Therefore, the corresponding branch
data rate is fs/2. There is the offset between two signal branches for the half of the
sampling cycle. To compensate for this, the FIR filter is used in the lower branch
540 7 OFDM for Wireless and Optical Communications
Scattered TPS
Cont.
pilots subcarriers
pilots
compensation
Impairments
demodulator
Demapper
Channel
Delay
Decoder
Channel
Switch
Recovered
FFT
TS
FIR
Receive
antenna
RF/IF down-
conversion
Low- Band-
ADC Pass Pass
filter filter
Clock Local
oscillator
fs=4⋅32/7 MHz
fs/4=32/7 MHz
Fig. 7.27 The block diagram of the DVB-T receiver. NCO numerically controlled oscillator. The
channel decoder is described in Fig. 7.24
and delay line in the upper branch (to make sure that delays in I and Q channels are
properly aligned in time domain), see Fig. 7.28. The output data streams of the
upper and lower branches are used as the input of the numerically controlled
oscillator (NCO). The NCO and mixer are essentially used as a digital PLL.
However, since the oscillators are not of very high precision (to ensure that the
TV set is inexpensive), the AFC approach is used by employing the information
conveyed by the continuous pilots after FFT demodulation. When transmit and
receive frequencies differ, there will be either clockwise or anticlockwise rotation
of the constellation diagram. The phase difference between continuous pilots from
symbol to symbol is used as a control variable of the NCO, which changes the
output in the direction of reducing the difference between incoming frequency and
digital PLL frequency. Once this difference becomes zero, the rotation of constel-
lation diagram is compensated for, and we employ the scattered pilots to compen-
sate for the channel impairments. The detection of TPS subcarriers is differential
and therefore independent on the phase error. The repetition coding and additional
BCH coding are used to ensure that the TPS sequence is error free. After that, the
demapping takes place followed by channel decoding, with details of channel
decoder provided already in Fig. 7.24. The output of decoder represents the
recovered TS MPEG-2 stream.
The fs/4 method for I/Q demodulation is illustrated in Fig. 7.28. The QAM signal
with carrier frequency fIF is used as input to ADC clocked at fs ¼ 4fIF. On the other
hand, the 1-to-2 switch is clocked at twice lower frequency ( fs/2 ¼ 2fIF) so that two
7.7 OFDM Applications in Wireless Communications 541
Switch
QAM
ADC
signal Q
FIR
fs=4fIF −
+1
Fig. 7.29 The FEC used in DVB-T2 is based on concatenated code in which LDPC code is used
as inner code and BCH code is used as outer code
samples per I and two samples per Q channel are obtained at upper and lower output
branches of the switch, respectively. Since the second sample in either branch is of
opposite sign that is needed, we flip the signs with rate fIF. The FIR is used in lower
branch to ensure the proper synchronization of the upper and lower branches. The
outputs of the upper and lower branches represent the estimates of in-phase and
quadrature samples, used at the input of the demodulator.
In order to increase the overall data rates of DVB-T, the DVB-T2 standard is
introduced [52, 55]. In addition to channel bandwidths already in use in DVB-T, the
10 MHz bandwidth is introduced. Stronger FEC is used in DVB-T2, employing
LDPC coded as inner code and BCH code as outer code, which is illustrated in
Fig. 7.29. The following code rates are supported: 1/2, 3/5, 2/3, 4/5, and 5/6. The
corresponding FEC frame is shown in Fig. 7.30. Both BCH and LDPC codes belong
to the class of systematic codes, in which information portion remains unchanged
while generalized parity bits are added to the information word to form a codeword.
The number of parity bits in BCH code is 16 t, where t is the error correcting
capability of BCH code (8, 10, or 12). The LDPC codeword length is either 64,800
or 16,200 bits. The information word length for the LDPC code, denoted as kLPDC,
is determined from the target code rate and FEC frame length. Moreover, the LDPC
code is adaptive; the FEC strength can be increased (code rate decreased) when
channel conditions get worse. The adaptive coding can be combined with adaptive
modulation in so-called adaptive modulation and coding (AMC) [6, 7, 30].
The following modulation formats are supported in DVB-T2: QPSK, 16-QAM,
64-QAM, and 256-QAM. In DVB-T2 Gray mapping and coherent detection are
used. For 8 MHz channel bandwidth, the signal bandwidth is 7.61 MHz. Therefore,
the date rates for guard interval fraction g ¼ 1/128 range from 4 Mb/s for QPSK
with code rate R ¼ 1/2 to 50.32 Mb/s for 256-QAM with R ¼ 5/6 [52]. The
542 7 OFDM for Wireless and Optical Communications
Padding
kBCH
BCH
(parity bits)
kLDPC
LDPC
(parity bits)
log2M I’k Ik Ik
Sequence bits Q-
S/P Mapper Rotator
converter (LUT) Q’k block Qk coordinate Qk−1
of bits delay
Qk−1
Fig. 7.31 The illustration of rotated Q-coordinate delayed signal constellation principle
The Q-coordinate delay block, in the k-th transmission instance, transmits the
following coordinates (Ik, Qk 1). Therefore, the k-th signal constellation point of
rotated QAM (Ik, Qk) is transmitted into two consecutive instances (Ik, Qk 1) in the
k-th time instance, also referred to as “cell” k, and (Ik+1, Qk) in the (k + 1)-st time
instance, also referred as cell k + 1. Since DVB-T2 is based on coded OFDM, the
Q-coordinate of a given signal constellation point is on the next subcarrier. On such
a way, better tolerance to time-varying channel conditions and fading effects is
obtained.
In addition to 10 MHz channel bandwidth introduced in DVB-T2, for cellular
(mobile) telephony applications, additional two channel bandwidths are introduced
as well, 1.7 MH and 5 MHz. The number of different FFT modes for coded OFDM
in DVB-T2 is larger compared to DVB-T, and these are denoted as 1 K, 2 K, 4 K,
8 K, 16 K, and 32 K. The numbers of subcarriers in the 8 MHz channel are 853 for
mode 1 K, 1705 for mode 2 K, 3409 for 4 K, 6817 for 8 K, 13,633 for 16 K, and
27,625 for mode 32 K. Because of sinc(x) has tails, the out-of-band spectrum is
typically filtered by corresponding windowing functions. As the number of
subcarriers increases, the transition in frequency domain is sharper. Nevertheless,
for modes larger or equal to 8 K, the spectrum moves toward the spectrum of
neighboring channel. To solve for this problem, the extended carrier mode is
introduced in which additional channel bandwidth is allocated. The numbers of
subcarriers in extended carrier mode are 6913 in 8 K, 13,921 in 16 K, and 27,861 in
32 K mode. As before, the script K is used to denote the size of FFT block of 1024.
For instance, the size of FFT block in 32 K is 32,768.
The organization of DVB-T2 frame is shown in Fig. 7.32. The symbol P1 is used
for synchronization and frame detection purposes. The symbols P2 are used for
signaling purposes on receiver side to determine the parameters of OFDM frame,
and the number of P2 symbol is a function of the FFT mode: 16 P2 symbols are used
in 1 K, 8 in 2 K, 4 in 4 K, 2 in 8 K modes, and 1 in 16 K and 32 K modes. The
payload symbols that follow after P2 symbols are organized into so-called physical
layer pipes (PLP), and up to 255 input data streams are possible. The length of
DVB-T2 frame in terms of number of OFDM symbols is dependent on FFT mode
and guard interval fraction g, and for 8 MHz channel and g ¼ 1/16, it ranges from
64 in 32 K mode to 2098 in 1 K mode.
Before the IFFT modulation takes place, different types of interleavers are used:
bit interleaver is used just after FEC encoder, cell interleaver as described in
Fig. 7.31, and the time interleaver is used after the cell interleaver. The symbol
P2
P1 PLP0 PLP1 … Payload symbols PLPn
symbols
DVB-T2 frame
PLP0
Mode/stream adaptation
Concatenated FEC Mapper cell time
Frequency interleaver
Frame builder block
stream + bit interleaver (LUT) interleaver interleaver
PLP1
Concatenated FEC Mapper cell time
+ bit interleaver (LUT) interleaver interleaver
…
…
…
…
PLPn Concatenated FEC Mapper cell time
+ bit interleaver (LUT) interleaver interleaver
Guard P1 To RF
Pilot IFFT PAPR
interval symbol DAC
MISO processing
Guard P1 To RF
Pilot IFFT PAPR
interval symbol DAC
insertion modulator reduction Tx2
insertion insertion
Fig. 7.33 The configuration of DVB-T2 transmitter based on coded OFDM and multiple input
single output (MISO)
streams from different PLPs are frequency interleaved before the IFFT modulation,
as shown in Fig. 7.33.
The coded-OFDM portion of transmitter is very similar to generic coded-OFDM
transmitter shown in Fig. 7.6a, except from P1 symbol insertion. To deal with time-
selective fading effects, the time interleaver is used. To deal frequency-selective
fading effects, the frequency interleaver is used. To deal with multipath fading, the
multiple input single output (MISO) processing is used, based on Alamouti coding
scheme [56, 57]. Additional details about Alamouti coding scheme can be found in
Chap. 8.
Since in OFDM different subcarriers are modulated independently, some of the
subcarriers can add constructively leading to high peak-to-average power ratio
(PAPR), defined as:
0 1
max jsOFDM ðtÞj2
PAPR ¼ 10log10 @ D E A ½dB,
0t<T OFDM
ð7:103Þ
2
jsOFDM ðtÞj
where sOFDM(t) represents the OFDM frame of duration TOFDM. High PAPR can
introduce nonlinearities in driver amplifier and DAC and ADC blocks. To solve for
this problem, either tone reservation or active constellation extension (ACE) is used
in DVB-T2. In tone reservation, certain subcarriers planed for payload symbols,
which are not used as pilots, are reserved to reduce the PAPR. These tones are not
used unless the PAPR is too high, when they get activated to reduce the PAPR. In
7.8 OFDM for WiFi, LTE, and WiMAX 545
ACE the outmost constellation points are displaced further away from original
constellation in an effort to reduce the PAPR.
The pilots used in DVB-Tw can be categorized as edge pilots (at the beginning
and end of spectrum), continuous pilots, scattered pilots, P2 pilots, and frame-
closing pilots. The continuous and scattered pilots have the same role as in DVB-T,
for AFC and channel estimation, respectively. On the other hand, the P2 symbols
have the same role as TPS subcarriers in DVB-T. There exist eight pilot patterns
(PPs) in DVB-T2 depending on distance between neighboring subcarriers in time
and frequency domains. Let d1 and d2 denote the distance between scattered pilot
subcarrier positions and distance between scattered pilots within the same symbol,
respectively. Let d3 denote the number of symbols involved in the pilot sequence.
Then the PPs can be specified by the following triple (d1, d2, d3). The PP1 is
specified by the triple (3,12,4), PP2 by (6,12,2), PP3 by (6,24,4), PP4 by (12,24,2),
PP5 by (12,48,4), PP6 by (24, 48, 2), PP7 by (24, 96, 4), and PP8 by the triple (6, 96,
16). The scatter pilot patterns PP1 and PP2 are transmitted with normalized
amplitude 4/3 and PP3 and PP4 with 7/4, while PP5-PP7 with normalized amplitude
7/3. As an illustration, the pilot patterns used in MISO mode for 32 K with g ¼ 1/16
are PP2 and PP8. The corresponding PPs used in single input single output (SISO)
mode are PP2, PP8, and PP4.
The OFDM is widely used in WiFi, Long-Term Evolution (LTE), and Worldwide
Interoperability for Microwave Access (WiMAX). The WiFi alliance was
established in 1999 to serve as a nonprofit organization to promote the WiFi
technology and corresponding product certification. The WiFi is based on IEEE
802.11 standard family, representing the set of MAC and PHY standards
implementing WLAN computer communications in 0.9, 2.4, 3.6, 5, and 60 GHz
frequency bands [58–60]. The first wireless networking standard from this family
was 802.11–1997; however, the 802.11b was the widely accepted one, which was
followed by 802.11a, 802.11 g, 802.11n, and 802.11 ac. Other standards in this
family (such as c–f, h, j) represent the service amendments to the existing ones that
are used to extend the scope, or eventually the amendments represent the correc-
tions to the previous specification. The basic properties of some relevant IEEE
802.11 PHY standards are summarized in Table 7.3, based on refs [58–63].
For additional details an interested reader is referred to [58–63] and references
therein. The OFDM system parameters in IEEE 802.11a are summarized in
Table 7.4. Eight OFDM channels of bandwidth 20 MHz can be supported in
UNIII bands I and II of 5GHz-band (5.15–5.35 GHz), and additional four OFDM
channels can be supported in upper UNII band III (5.725–5.825 GHz). The block
diagram of OFDM transceiver is similar to that shown in Fig. 7.2. The preamble,
which precedes the OFDM packed, is composed of three sections of durations 8 μs,
8 μs, and 4 μs, respectively. The first section is used in automatic gain control
546 7 OFDM for Wireless and Optical Communications
(AGC) and coarse frequency offset estimation, and it is composed of ten training
symbols of duration 800 ns each. These training symbols are generated by
employing only nonzero QAM symbols located subcarrier indices being a multiple
of 4, namely, {24, 20, 16, 12, 8, 4, 4, 8, 12, 16, 20, 24}; wherein the
subcarrier indices range from 26 to 26. Given that for the digital signal with a
symbol duration of T, the shortest measurable frequency offset is 1/(2 T), we
conclude that the offset up to 1/(2 800 ns) ¼ 625 kHz can be estimated. If the
whole FFT duration is used for estimation, namely, 4 μs–0.8 μs ¼ 3.2 μs, the
frequency offset of 156 kHz can be estimated, so that the corresponding relative
frequency error of 26.89 ppm at carrier frequency 5.8 GHz can be measured. The
sequence of short training symbols is also used for frame detection by correlating to
neighboring short symbols (pulses), and the frame will be detected once correlator
outputs exceeds a desired threshold. The AGC circuit can adjust operation once the
frame is detected.
The sequence of short training symbols is followed by a long training symbol
(of duration 8 μs), composed for 52 QPSK-modulated subcarriers, which is used
fine frequency offset estimation, timing, and channel estimation; with
corresponding concepts explained already above. Given the duration of this long
training symbol, it is possible to place 8 μs/3.2 μs ¼ 2.5 FFT frames and therefore
perform the cyclic extension. This first portion of duration of 1.6 μs is used as guard
interval and contains the copy of the last 1.6 μs of FFT part. By measuring the
frequency drift of two samples separating by 3.2 μs, the fine frequency offset
estimation is possible. Moreover, the long training symbol is sued to estimate the
amplitude for coherent (synchronous) detection. The training symbols are properly
selected so that the PAPR of 3 dB is obtained, significantly lower than in data
carrying OFDM symbols, thus avoiding any nonlinear distortion due to power
amplifier.
The last 4 μs of preamble contains the information about modulation type, code
rate employed, and the duration of the packet length.
Even after the fine frequency offset compensation, there will be the
uncompensated frequency drift causing the common phase error (drift) for all
subcarriers, and to compensate for the common phase error, 4 out of 52 subcarriers
are used as pilots, located at subcarrier indices {21, 7, 7, 21}. The pilots are
548 7 OFDM for Wireless and Optical Communications
10 MHz all the way to 20 MHz and thus improving the spectral efficiency;
(3) introducing the advanced antenna diversity schemes and hybrid automatic
repeat-request (HARQ); (4) introducing the adaptive antenna systems (AAS) and
MIMO signal processing; (5) providing the denser subchannelization and therefore
improving the indoor penetration; (6) introducing downlink subchannelization, in
order to trade the coverage for capacity or vice versa; (7) introducing the LDPC
coding to improve the error correction strength, and (8) introducing an extra QoS
class for VoIP applications. The basic OFDM parameters and other relevant system
parameters in IEEE 802.16e-2005 are summarized in Table 7.5.
For OFDM PHY, the following FEC schemes are used: (1) mandatory
concatenated RS-convolutional code (RS), in which RS code is used as outer
code and rate-compatible CC code as inner code, (2) optional block turbo coding
(BTC), and (3) optional convolutional turbo coding (CTC). The RS-CC
concatenated code has already been discussed above; for additional detail an
interested reader is referred to Chap. 9. The BTC and CTC schemes are fully
described in Chap. 9. In the burst mode, when we are concerned with correcting
both burst and random errors, the following FEC schemes are used: (1) mandatory
tail-biting CC code as specified in IEEE 802.16 standard or zero-tailing CC in
WiMAX profiles; (2) CTC, which is optional in IEEE 802.16 standards but man-
datory in WiMAX profiles; (3) optional TC; and (4) optional LDPC coding.
Table 7.5 OFDM system parameters and other relevant parameters in WiMAX IEEE 802.16e standard
Channel bandwidth 1.25 MHz 5 MHz 7 MHz 8.75 MHz 10 MHz 20 MHz
Sampling frequency 1.4 5.6 MSa/s 8 MSa/s 10 MSs/s 11.2 MSa/s 22.4 MSa/s
The FFT size 128 512 1024 1024 1024 2048
Number of subchannels 2 8 16 16 16 32
Subcarrier spacing (Δf) 10.94 kHz 10.94 kHz 7.81 kHz 9.77 kHz 10.94 kHz 10.94 kHz
Symbol duration (T ¼ 1/Δf) 91.4 μs 91.4 μs 128 μs 102.4 μs 91.4 μs 91.4 μs
Guard interval duration (TG ¼ T/8) 11.425 μs 11.425 μs 16 μs 12.8 μs 11.425 μs 11.425 μs
OFDM symbol duration (Ts ¼ T + TG) 102.825 μs 102.825 μs 144 μs 115.2 μs 102.825 μs 102.825 μs
Number of OFDMA symbols per frame 48 48 34 43 48 48
Frame duration 4.94 ms ffi 5 ms 4.94 ms ffi 5 ms 4.89 ms ffi 5 ms 4.95 ms ffi 5 ms 4.94 ms ffi 5 ms 4.94 ms ffi 5 ms
Modulation QPSK, 16-QAM, 64-QAM
Channel coding rates Convolutional coding (CC), 1/2, 2/3,3/4
Block turbo coding (BTC), 1/2, 3/4
LDPC coding, 1/2, 2/3,3/4, 5/6
Convolutional turbo coding (CTC) in both downlink (DL) and uplink (UL): for QPSK and 16-QAM, 1/2, 3/4;
for 64-QAM, 1/2, 2/3,3/4, 5/6
7 OFDM for Wireless and Optical Communications
7.9 OFDM in Ultra-Wideband Communication (UWC) 551
Band group # 1 Band group # 2 Band group # 3 Band group # 4 Band group # 5
Band Band Band Band Band Band Band Band Band Band Band Band Band Band
#1 #2 #3 #4 #5 #6 #7 #8 # 9 # 10 # 11 # 12 # 13 # 14
3432 3960 4488 5016 5544 6072 6600 7128 7656 8184 8712 9240 9768 10296 f [MHz]
OFDM Tx
RF Tx
exp(j2πfc)
Time-frequency
coding
Higher rate convolutional codes (of rate 11/32, 1/2, 5/8 and 3/4) can be obtained by
puncturing. The number of subcarriers used in MB-OFDM is 128, 100 of which are
used to transmit QPSK data, 12 are pilots, and 10 are guard tones (the remaining
subcarriers are set to zero). The pilots are used for channel estimation and carrier-
phase tracking on receiver side. To improve performance of MB-OFDM scheme,
LDPC-coded MB-OFDM can be used instead. It has been shown in [71, 72] that the
transmission distance over wireless channel of LDPC-coded MB-OFDM can be
increased by 29–73% compared to that of MB-OFDM with convolutional codes.
After pilot insertion, and serial-to-parallel conversion (S/P), inverse FFT (IFFT)
operation, and parallel-to-serial (P/S) conversion, cyclic extension and windowing
are performed. After D/A conversion (DAC) and time-frequency coding, the RF
signal is transmitted over transmit (Tx) antenna. The transmitted MB-OFDM signal
can be written as [5, 68]:
( )
X
N1 h i
sMB-OFDM ðtÞ ¼ Re sOFDM, n ðt nT OFDM Þexp j2πf ðn mod 6Þ t , ð7:105Þ
n¼0
where N is the number of OFDM symbols transmitted, while sOFDM, n(t) denotes the
n-th OFDM symbol of duration TOFDM transmitted on carrier frequency f n mod 6. As
discussed above, the carrier frequency changes over three frequencies assigned to
the band group, organized in sequences of length 6 (TFCs). The n-th OFDM symbol
is generated in similar fashion as we described in Sect. 7.1.2.
The receiver configuration, shown in Fig. 7.36, is very similar to conventional
OFDM receiver [Fig. 7.6b], except from pre-select filter that is used to select
OFDM signal of 528 MHz bandwidth at given carrier frequency.
cos(ωct)
AGC
VGA
Pre-select Timing
filter LNA LPF ADC
Timing and Remove
frequency cyclic
synchronization extension
LPF ADC
Frequency-
corrected
sin(ωct) signal
OFDM Rx
Binary QAM Channel
Descrambler Decoding Deinterleaver P/S FFT S/P
output data de-mapping correction
Various OFDM types can be placed into two broad categories [5]: (i) coherent
optical OFDM (CO-OFDM) and (ii) direct-detection-based optical OFDM
(DDO-OFDM).
The basic principles of coherent optical OFDM (CO-OFDM) have already been
introduced in Fig. 7.10. Here we provide some additional details. As indicated in
[5], the synergy between OFDM and coherent optical detection is twofold:
(i) coherent optical detection brings the required linearity of RF-to-optical
up-conversion and optical-to-RF down-conversion and (ii) brings the efficiency
for channel and phase noise estimation. Given that basic operation principles of
CO-OFDM have already been described, here we provide more details of various
modules within CO-OFDM system. The basic modules for CO-OFDM systems are
(1) RF OFDM transmitter, (2) RF OFDM receiver, (3) RF-to-optical (RF2O)
up-converter based on either MZM or optical I/Q modulator, and (4) optical-to-
RF (O2RF) down-converter based on coherent optical detection. The details of RF
RF-to-optical up-convertor
In-phase (I) RF component
Optical link
Data in
MZM
RF OFDM Laser
Tx diode
MZM π/2
Y-junction
(a)
Optical-to-RF down-convertor
RF OFDM Estimated
Local Q’ receiver data
Oscillator
Laser
(b)
Fig. 7.37 The block diagram of CO-OFDM system in direct optical-to-RF up-conversion con-
figuration architectures of: (a) transmitter and (b) receiver for CO-OFDM
554 7 OFDM for Wireless and Optical Communications
OFDM transmitter and receiver have been provided already in Figs. 7.7 and 7.10,
together with the description of operation principles. There are two options for
RF-to-optical up-conversion, as indicated in [5], namely, direct RF2O
up-conversion and RF2O up-conversion through RF intermediate frequency, with
both options shown in Figs. 7.37 and 7.38. The detailed description of operation
principles of balanced coherent optical detector, Mach-Zehnder modulator (MZM),
optical I/Q modulator has been provided already in Chap. 3. To perform RF2O
up-conversion in direct up-conversion configuration, the optical I/Q modulator is
used [Fig. 7.37a]; while to perform O2RF down-conversion, the balanced coherent
optical detector is used [Fig. 7.37b]. On the other hand, to implement CO-OFDM
transmitter in RF intermediate frequency-based configuration, RF up-conversion is
combined with optical RF-to-optical convertor based on single MZM followed by
an optical band-pass filter (OBPF), as shown in Fig. 7.38a. To implement
CO-OFDM receiver in RF intermediate frequency-based configuration, the optical-
to-RF down-converter, implemented with a help of an OBPF and an optical π-
hybrid-based balanced optical detector, is combined with an RF down-converter, as
shown in Fig. 7.38b.
The advantages of direct up-configuration are twofold [5]: (1) the required
electrical bandwidth in transmitter and receiver is significantly lower and
(2) there is no need for the image rejection filters (BPF and OBPF) in transmitter
and receiver. The MZMs in either configuration are operated at null point (see
Chap. 3 for additional details). It is also possible to use direct RF-to-optical
up-conversion on transmitter side and RF intermediate frequency assisted config-
uration on receiver side, and vice versa.
By omitting the distortions due to imperfect channel and phase estimations, the
receiver sensitivity will be identical to that of single-carrier in ASE noise
RF up-converter
Data in RF-to-optical up-converter
RF OFDM Optical link
BPF
Tx
Laser
RF MZM OBPF
diode
oscillator
(a)
Optical-to-RF down-convertor
RF local
From optical link oscillator
OBPF
RF OFDM Estimated
π-hybrid BPF
Local receiver data
oscillator RF down-converter
laser
Balanced optical detector
(b)
Fig. 7.38 The block diagram of CO-OFDM system in optical-to-RF up-conversion through RF
intermediate frequency. Architectures of: (a) transmitter and (b) receiver for CO-OFDM
7.10 Optical OFDM Applications 555
dominated scenario. For instance, the BER performance of CO-OFDM with QPSK
can be described as:
1 pffiffiffiffiffiffiffiffi σ 2s
BER ’ erfc ρ=2 , ρ¼ ð7:106Þ
2 σ 2wn
where ρ is symbol signal-to-noise ratio, defined as the ratio of the signal variance σ 2s
and the white noise variance σ 2wn . The symbol SNR (for QPSK) is related to OSNR,
number of subcarriers Nsc, and subcarrier spacing Δf by [5, 73]:
Bref
ρ ffi 2OSNR , ð7:107Þ
N sc Δf
where Bref is the reference bandwidth (12.5 GHz in 0.1 nm at 1550 nm).
There exist many variants of DDO systems [5, 8–11, 74–76], which can be
classified into to broad categories [5]: (i) linearly mapped DDO-OFDM in which
there exists a linear mapping between baseband OFDM and optical field and
(ii) nonlinearly mapped DDO-OFDM in which there exist the linear mapping
between the baseband OFDM and optical intensity instead.
In linearly mapped DDO-OFDM, the optical carrier frequency should be at least
the OFDM signal bandwidth from the main optical carrier, so the transmitted signal
can be represented in complex from as follows:
sðtÞ ¼ 1 þ aej2πΔf G sBB ðtÞ ej2πf o t , ð7:108Þ
where ΔfG is the guard frequency band between the main optical carrier frequency
fo and OFDM signal and a is the coefficient related to the ratio of OFDM signal
power and the main optical carrier, while the baseband OFDM signal is defined by:
X
N sc =2
with xk being the symbol carried by the k-th subcarrier fss. The received signal, in
the presence of chromatic dispersion, can be represented as:
2 3
X
N sc =2
where ΦCD( fk) is the phase distortion of the k-th subcarrier introduced by chromatic
dispersion, and ϕ(t) is the random phase shift of the main optical carrier. When the
second-order GVD can be neglected, the phase distortion is quadratic [5]:
ΦD ðf k Þ ¼ πcDtot ðf k =f o Þ2 , ð7:111Þ
where Dtot denotes the accumulated chromatic dispersion (expressed in ps/pm), and
c is the speed of light. After the PIN photodetector, the photo current I(t) will be
proportional to the magnitudes squared of the received optical field:
2
X sc =2
N
2
I ðtÞ / jr ðtÞj ¼ e jΦCD ðΔf G Þ
þ aej2πΔf G t
xk e j2πf k tþjΦCD ðf k Þ
k¼N sc =2þ1
8 9
< NX sc =2 =
¼ 1 þ 2aRe ej2πΔf G t xk ej2πf k tþj½ΦCD ðf k ÞΦCD ðΔf G Þ
: k¼N =2þ1
;
sc
X
N sc =2
j2π ðf k1 f k2 Þþj½ΦCD ðf k1 ÞΦCD ðf k2 Þ
þjaj2 xk1 x∗
k2 e
k1 , k2 ¼N sc =2þ1
ð7:112Þ
The DC component can easily be removed by DC blocker, while the third term
represents the second-order nonlinearity that must properly cancel out. The second-
term contains the desired OFDM signal. To improve the spectral efficiency, the
single-side band (SSB) transmission is advocated in [11, 13]. To remove one of the
bands (either upper- or lower-band), the optical filtering approach is used in
[11, 13]. Alternatively, the Hilbert transform approach for SSB generation can be
used at the expense of increased complexity in digital domain on a transmitter side
[26, 27]. Namely, the quadrature signal will represent the OFDM baseband signal
passed through the Hilbert transform filter, and in passband representation, the
quadrature signal will represent an interference canceling the desired upper-/lower-
band of the double-side band (DSB) signal. The quadratic term is then filtered out in
electrical domain (after the photodetection takes place). Alternatively, the param-
eter a in Eq. (7.108) should be chosen sufficiently low so that quadratic term
becomes negligible. It is also possible to estimate the quadratic-term in an iterative
fashion, by using the estimate linear term to cancel the quadratic term [77]. It is also
possible to transmit QAM/PSK symbols only on odd subcarrier; the second-order
term will introduce the cross talk only on even subcarrier, not carrying any
information [78]. Each of these approaches to deal with the second-order distortion
has advantages and disadvantages as discussed in [5].
As indicated earlier, in nonlinearly mapped DDO-OFDM, we establish the linear
mapping between the baseband OFDM signal, defined by (7.109), and optical
intensity by employing the direct modulation of the laser diode as follows:
7.10 Optical OFDM Applications 557
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
EðtÞ ¼ jEðtÞjej2πf o t , jEðtÞj ¼ E0 1 þ aRe ej2πf IF t sBB ðtÞ , ð7:113Þ
where E(t) is the complex representation of laser diode output field, and fIF is the RF
intermediate frequency (IF). By ignoring the dispersion effects, the PIN photode-
tector photocurrent would be proportional the OFDM baseband signal:
2 j2πf t
I ðtÞ / EðtÞ ¼ E20 81 þ aRe 8
e IF sBB ðtÞ 99
< < X
N sc =2 == ð7:114Þ
¼ E20 1 þ aRe ej2πf IF t xk ej2πf k t :
: : k¼N =2þ1
;;
sc
QAM symbol
data stream RF OFDM
(x-pol.) transmitter (x pol.)
4-D E/O modulator
I/Q
modulator
Transmit (x-pol.)
to fiber
laser PBS PBC
diode I/Q
modulator
(y-pol.)
QAM symbol
data stream RF OFDM
(y-pol.) transmitter (y pol.)
(a)
From Balanced coherent
PBS detector (y pol.)
SMF
Estimated QAM
ADC LPF Cyclic extension Chromatic dispersion data stream
FFT
…
Fig. 7.39 Polarization-division multiplexed CO-OFDM scheme: (a) transmitter architecture and
(b) receiver architecture. PBS(C) polarization beam splitter (combiner)
detector, while the y-polarization outputs are used as inputs of down branch of
balanced coherent detector, as shown in Fig. 7.39b. The configuration of coherent
balanced detector has been provided already in Sect. 7.10.1.1 (see also Chap. 3).
The outputs of balanced coherent detectors represent estimates of real and imagi-
nary parts of corresponding RF OFDM receiver, whose configuration is shown in
Figs. 7.7 and 7.10. After FFT demodulations in x- and y-polarization branches,
chromatic dispersion compensation, PMD/PDL compensation, and symbol detec-
tion have been performed. In the presence of polarization dependent loss (PDL), we
also need to perform the matrix inversion by using the parallel decomposition (see
figure and corresponding text related to it). This operation is not computationally
extensive given the fact that channel matrix size is 2 2.
7.10 Optical OFDM Applications 559
Ix
QAM [ − s*y sx ] DAC LPF
S/P IFFT Cyclic extension
…
symbols conv. insertion Qx
block
DAC LPF
(x-pol.)
Alamouti-type
PT encoder Iy
QAM
DAC LPF
symbols S/P IFFT Cyclic extension
…
conv. block insertion Qy
(y-pol.) [ s*x s y ] DAC LPF
Fig. 7.40 The transmitter architecture of PT coding scheme combined with CO-OFDM
where the Jones (channel) matrix U(k) has been already introduced by Eqs. (7.18)
and (7.42) (we use again index k to denote the frequency ωk of k-th subcarrier) and
h iT
ðmÞ ðmÞ ðmÞ
r i , k ¼ r x , i , k ; r y, i , k denotes the received symbol vector in the m-th (m ¼ 1,2)
h iT
ðmÞ ðmÞ ðmÞ
channel use of i-th OFDM symbol and k-th subcarrier, while zi, k ¼ nx, i, k ; ny, i, k
ð 1Þ
T
denotes the corresponding noise vector. We also use si, k ¼ sx, i, k ; sy, i, k to denote
h iT
ð2Þ
the symbol transmitted in the first channel use and si, k ¼ s∗ ; s ∗
y, i , k x, i , k to denote
the symbol transmitted in the second channel use (of the same symbol interval).
Because the symbol vectors transmitted in the first and the second channel use of
i-th time instance are orthogonal, the Eqs. (7.115) can be rewritten by grouping
separately x- and y-polarizations, so we have that:
560 7 OFDM for Wireless and Optical Communications
where ϕPN ¼ ϕT ϕLO. If only one polarization is used, we could solve either
Eq. (7.116) or Eq. (7.117). However, the use of only one polarization would result
in 3 dB penalty with respect to the case when both polarizations are employed.
Following the derivation similar to that described in previous section, it can
be shown that the estimates of transmitted symbols at the output of PT
decoder (for ASE noise dominated scenario, neglecting fiber nonlinearities) can
be obtained as:
where ~s x, i and ~s y, i denote the PT decoder estimates of symbols sx,i and sy,i
transmitted in i-th time instance. If only one polarization were used (i.e.,
x-polarization), the last two terms in Eqs. (7.118) and (7.119) must be omitted.
The growth of the Internet traffic does not appear to be leveling off any time soon,
and it is projected to continue to grow exponentially in the years to come [15, 79–
85]. This exponential-like traffic growth places enormous pressure on the underly-
ing information infrastructure at every level, from the core to access networks. The
growth is driven mainly by new services, particularly high quality video and cloud
computing, which demand huge bandwidths. As for the market demand, the IP
traffic in nationwide networks has grown so rapidly that some large Internet service
providers have already reported huge demands in router-to-router trunk connectiv-
ity exceeding 100 Gb/s, while expressing the desire to have Terabit Ethernet (TbE)
ports in near future. As for the standardization activities, several industry forums
(ITU-T, IEEE 802.3ba, and OIF) have completed the work on 100 Gb/s Ethernet
(100 GbE), while the activities for an early adoption of 400 Gb/s Ethernet and 1 Tb/
s Ethernet and beyond are underway, with the expectation to be completed in the
next couple of years.
As the data rates exceed 100 Gb/s, the electrical bandwidth required for OFDM
becomes a bottleneck [5, 80, 81]. To overcome this problem, the orthogonal band
multiplexed OFDM (OBM-OFDM) get proposed in [79]. This method might come
under different names such as multiband OFDM [83, 84] and superchannel OFDM
[81, 85]. The key idea behind this approach is to divide the entire OFODM
7.10 Optical OFDM Applications 561
spectrum into multiple orthogonal bands [5, 79]. To achieve this, electrical domain-
based approaches, optical domain-based approaches, or a combination of the two
are possible [5, 79, 86–88]. Let Δf be subcarrier spacing and ΔfG be the frequency
band guard between neighboring OFDM bands. The orthogonality condition among
different OFDM bands would be satisfied when the when the frequency band guard
is a multiple of subcarrier spacing [5]:
Δf G ¼ nΔf , n 1: ð7:120Þ
Content of superchannel 1
OFDM Tx
(x pol.)
4-D E/O
LD 1
modulator
Transmitter side DSP
OFDM Tx
(y pol.)
…
Power
…
combiner
OFDM Tx
(x pol.)
Spectral
4-D E/O multiplexer
LD N1 SMF
modulator
OFDM Tx WDM
(y pol.) multiplexer
…
Content of superchannel N2
…
(a)
Rx side corresponding to
PD 1 RF OFDM Rx 1
Polarization (x pol.)
diversity PD 2
optical PD 3
hybrid RF OFDM Rx 1
Receiver side DSP
PD 4 (y pol.)
Power
…
splitter LOL
…
…
N1
Spectral
PD 1 RF OFDM Rx 1
demultiplexer Polarization (x pol.)
diversity PD 2
optical PD 3
hybrid RF OFDM Rx 1
From SMF WDM (y pol.)
…
PD 4
demultiplexer
…
(b)
Fig. 7.41 The generic superchannel OBM-OFDM enabling ultra-high-speed optical transport: (a)
transmitter side and (b) receiver side architectures. N1 denotes the number of frequency-locked
laser signal within the superchannel, N2 denotes the number of superchannels within the
superchannel band group, and N3 denotes the number of superchannel band groups. LD laser
diode, LOL local oscillator laser, PD photodetector
7.10 Optical OFDM Applications 563
Superchannel Superchannel
Superchannel
band group # 1 band group # 10
band group # 4
#1 #2 # 10 # 31 # 32 # 40 # 91 # 92 # 100
… … … … … Bit rate
Fig. 7.42 The digital hierarchy of superchannel OBM-OFDM enabling up to 100 Tb/s serial
optical transport
Fig. 7.43 The DMT system Data input Estimate of input data
for transmission over MMF.
P/S parallel-to-serial, S/P
serial-to-parallel, DAC Demultiplexer Multiplexer
digital-to-analog converter,
ADC analog-to-digital … …
converter Constellation Constellation
mapper demapper
… …
IFFT FFT
modulator demodulator
… …
P/S converter and S/P converter and
cyclic extension (CE) CE remover
DAC ADC
MMF link
applied, which results in reduced data rate, DMT offers the following two advan-
tages as compared to traditional single-carrier approaches: (i) it has the ability to
maximize the information rate by tailoring the information-bearing distribution
across the channel in accordance with the channel conditions and (ii) it can adapt
to time-varying channel conditions, which is achieved by the virtue that original
data stream is divided among many subcarriers, while the subcarriers affected by
the channel conditions can be avoided through adaptive modulation. The block
diagram of DMT system for transmission over MMF links is shown in Fig. 7.43.
The demultiplexer converts incoming information data stream into parallel form.
Constellation mapper maps parallel data into N subcarriers using QAM. The
modulation is performed by applying the IFFT, which transforms frequency-
domain parallel data into time-domain parallel data. The complex-valued time-
domain sequence sk after IFFT can be expressed as:
1 X N 1 n
sk ¼ pffiffiffiffi Cn exp j2πk ; k ¼ 0, 1, . . . , N 1 ð7:121Þ
N n¼0 N
C2Nn ¼ C∗
n; n ¼ 1, 2, . . . , N 1; ImfC0 g ¼ ImfCN g ¼ 0 ð7:122Þ
meaning that the second half of input sequence (going to the IFFT block) is
complex-conjugate of the first half. In addition, 0-th and N-th subcarriers must be
7.10 Optical OFDM Applications 565
1 2N1 X n
sk ¼ pffiffiffiffiffiffi Cn exp j2πk ; k ¼ 0, 1, . . . , 2N 1 ð7:123Þ
2N n¼0 2N
where T is the time duration of DMT frame. In P/S block (see Fig. 7.43), the cyclic
extension is performed in similar fashion as one described in previous sections. The
length of cyclic extension should be longer than the maximum pulse spread due to
multimode dispersion. The digital-to-analog convertor, which typically contains a
transmit filter, performs the conversion from digital into analog domain. Direct
modulation of the laser diode by DMT signal is used to reduce the system cost, as
shown in Fig. 7.43. Also, the bias voltage is used to convert the negative portion of
DMT signal to positive one since the negative signals cannot be transmitted if an
intensity modulation is used in combination with direct detection. The signal
clipping can be used to improve power efficiency. At the receiver side, upon
optical-to-electrical conversion by photodetector, DC bias is blocked by
photodetection; while ADC, cyclic removal, and S/P conversion have been
performed. The demodulation is performed by 2 N-point FFT with the output:
1 2N1 X n
C^n ¼ pffiffiffiffiffiffi ck exp j2πk ; n ¼ 0, 1, . . . , 2N 1 ð7:125Þ
2N k¼0 2N
sDMT ðtÞ, jsDMT ðtÞj A
sclipped ðtÞ ¼ ð7:126Þ
0, otherwise
where sclipped(t) denotes the clipped DMT signal, while A denotes the maximum
tolerable amplitude before clipping. We can determine the optimum clipping level
that minimizes the BER if we measure the BER against the clipping level CL, based on
Eq. (7.126). As an example, it was shown in [18] that for 256 subcarriers and 64-QAM
the optimum clipping ratio for different ADC/DAC resolutions is between 8.5 and 9.5
dB. On the other side, the clipping introduces distortion to DMT signals. It is possible
to reduce the PAPR by using distortionless PAPR reduction [43–45]. Another
approach to reduce the PAPR would be through coding [46]. Some of these
distortionless methods have complexity significantly higher than the ones allowing
clipping. This is the reason why medium level complexity methods, such as selective
mapping [43, 44], have been proposed in [18]. The selective mapping is based on dual
use of real and imaginary parts of a complex FFT in a procedure described below. Let
us first observe the complex sequence Dn (n ¼ 0,1,. . .,N 1) of length N. Next, assume
the sequence of complex numbers of length 2 N satisfies the symmetry property:
D2Nn ¼ D∗
n ; n ¼ 1, 2, . . . , N 1; ImfD0 g ¼ ImfDN g ¼ 0 ð7:127Þ
The sequence given by Eq. (7.127) has purely imaginary values for the 2 N-point
IFFT. The IFFT of the sequence Xn ¼ Cn + jDn (Cn is the transmitted sequence as
defined above) is now given as:
1 2N1 X n
sk ¼ pffiffiffiffiffiffi Xn exp j2πk ; k ¼ 0, 1, . . . , 2N 1
2N n¼0 2N
" #
1 2N1 X n X
2N1 n ð7:128Þ
¼ pffiffiffiffiffiffi Cn exp j2πk þj Dn exp j2πk
2N n¼0 2N n¼0
2N
¼ Refsk g þ jImfsk g
X
N 1
gi ðPi þ Pbias Þ
C¼ P
max BN log2 1þ , ð7:129Þ
Pi : Pi ¼P i¼0 N 0 BN
7.10 Optical OFDM Applications 567
32
16
Subcarrier index, n
where Pi is the optical power allocated to i-th subcarrier and N0 is the power
spectral density of transimpedance amplifier, while Pbias represents the
corresponding power used to transmit the bias. The signal bias is used to convert
negative values of DMT signal to positive ones. The subcarrier gain gican be
calculated as gi ¼ R2|Hi|2, with R being the photodiode responsivity and Hi being
the MMF transfer function amplitude of the i-th subcarrier. Since the direct
detection is used, the Eq. (7.129) represents essentially a lower bound on channel
capacity. Nevertheless, it can be used as an initial figure of merit. By using the
Lagrangian method, it can be shown that [5]:
Pi þ Pbias 1=γ c 1=γ i , γ i γ c
¼ , γ i ¼ gi ðP þ Pbias Þ=N 0 BN ð7:130Þ
P 0, otherwise
where γ i is the signal-to-noise ratio of i-th subcarrier, while γ c is the threshold SNR.
By substituting Eq. (7.128) into Eq. (7.127), the following expression for channel
capacity can be obtained:
X
γ
C¼ BN log2 i : ð7:131Þ
i:γ i >γ c
γc
The i-th subcarrier is used when corresponding SNR is above the threshold. The
number of bits per i-th subcarrier is determined by mi ¼ bBNlog2(γi/γc)c, where bc
denotes the largest integer smaller than the enclosed number. Therefore, the signal
constellation size and power per subcarrier are determined based on MMF channel
coefficients. When subcarrier’s SNR is high, larger constellation sizes are used, and
power per subcarrier is chosen in accordance with Eq. (7.130); smaller constellation
sizes are used when the subcarrier’s SNR is low, and nothing is transmitted when
the subcarrier SNR falls below a certain threshold value. An example of adaptive
QAM is shown in Fig. 7.44.
568 7 OFDM for Wireless and Optical Communications
The main subject of this chapter has been on the OFDM fundamentals and OFDM
application to wireless and optical communications. The chapter starts with Sect.
7.1, where the basics of OFDM, including the generation of OFDM signal by
inverse FFT, have been described. After that, in Sect. 7.2, several basic manipula-
tions on OFDM symbols, required to deal with multipath effects in wireless
communications and dispersion effects in fiber-optics communications, including
guard time and cyclic extension as well as the windowing operation, have been
described. Next, the bandwidth efficiency of OFDM has been discussed in Sect. 7.3.
The next topic in the chapter, Sect. 7.4, has been devoted to the OFDM system
design, description of basic OFDM blocks, and OFDM-based parallel channel
decomposition, including multipath fading radio and dispersion-dominated chan-
nels decomposition. In Section 7.5, following the description of CO-OFDM prin-
ciples (Sect. 7.5.1), the basic estimation and compensation steps, common to both
wireless and optical communication systems, have been described including DFT
windowing (Sect. 7.5.2), frequency synchronization (Sect. 7.5.3), phase estimation
(Sect. 7.5.4), and channel estimation (Sect. 7.5.5). Regarding the channel estima-
tion, both pilot-aided and data-aided channel estimation techniques have been
described. Following the differential detection in OFDM description (Sect. 7.6),
the focus has moved in Sect. 7.7 on various applications of OFDM in wireless
communications including DAB (Sect. 7.7.1) and DVB (Sect. 7.7.2). The WiFi,
LTE, and WiMAX have been described in Sect. 7.8, while the OFDM application in
UWB has been described in Sect. 7.9. Next, the optical OFDM applications have
been discussed in Sect. 7.10, starting with description of basic OFDM systems
types, Sect. 7.10.1, such as CO-OFDM systems (Sect. 7.10.1.1) and DDO-OFDM
systems (Sect. 7.10.1.2). Regarding the high-speed spectrally efficient CO-OFDM
systems, described in Sect. 7.10.2, the polarization-division multiplexed OFDM
systems (Sect. 7.10.2.1) and OFDM-based superchannel optical transmission sys-
tems (Sect. 7.10.2) have been described. Section 7.10.3 has been devoted to the
application of OFDM in multimode fiber links. Finally, in Sect. 7.11 concluding
remarks have been provided.
References
29. Proakis JG, Manolakis DG (2007) Digital signal processing: principles, algorithms, and
applications, 4th edn. Prentice-Hall, NJ
30. Goldsmith A (2005) Wireless communications. Cambridge University Press, Cambridge
31. Shieh W, Yi X, Ma Y, Yang Q (2008) Coherent optical OFDM: has its time come? [invited]. J
Opt Netw 7:234–255
32. Schmidl TM, Cox DC (1997) Robust frequency and time synchronization for OFDM. IEEE
Trans Commun 45:1613–1621
33. Minn H, Bhargava VK, Letaief KB (July 2003) A robust timing and frequency synchroniza-
tion for OFDM systems. IEEE Trans Wirel Comm 2:822–839
34. Pollet T, Van Bladel M, Moeneclaey M (1995) BER sensitivity of OFDM systems to carrier
frequency offset and wiener phase noise. IEEE Trans Comm 43:191–193
35. Coleri S, Ergen M, Puri A, Bahai A (2002) Channel estimation techniques based on pilot
arrangement in OFDM systems. IEEE Trans Broadcast 48(3):223–229
36. Zou D , Djordjevic IB (2011) Multi-Tb/s optical transmission based on polarization-
multiplexed LDPC-coded multi-band OFDM. Proceedings of 13th International Conference
on Transparent Optical Networks (ICTON) 2011, Paper Th.B3.3, Stockholm, June 2011, pp
26–30
37. Zou D, Djordjevic IB (2012) Beyond 1Tb/s superchannel optical transmission based on
polarization multiplexed coded-OFDM over 2300 km of SSMF. iProceedings of the 2012
Signal Processing in Photonics Communications (SPPCom), Paper SpTu2A.6, Colorado
Springs, June 2012, pp 17–21
38. Sari H, Karam G, Jeanclaude I (1995) Transmission techniques for digital terrestrial TV
broadcasting. IEEE Commun Mag 33(2):100–109
39. Moose P (1994) A technique for orthogonal frequency division multiplexing frequency offset
correction. IEEE Trans Commun 42:2908–2914
40. Sandell M, Van de Beek JJ, B€ orjesson PO (1995) Timing and frequency synchronization in
OFDM systems using cyclic prefix. Proceeding of international symposium, Synchron, Dec
1995, Saalbau, Essen, pp 16–19
41. Zou D, Lin C, Djordjevic IB (2012) LDPC-coded mode-multiplexed CO-OFDM over
1000 km of few-mode fiber. Proceedings of CLEO 2012, Paper no. CF3I.3, San Jose, May
2012, pp 6–11
42. Jin XQ, Tang JM, Spencer PS, Shore KA (2008) Optimization of adaptively modulated
optical OFDM modems for multimode fiber-based local area networks [Invited]. J Opt Netw
7(3):198–214
43. Mestdagh DJG, Spruyt PMP (1996) A method to reduce the probability of clipping in
DMT-based transceivers. IEEE Trans Commun 44:1234–1238
44. Eetvelt PV, Wade G, Thompson M (1996) Peak to average power reduction for OFDM
schemes by selected scrambling. IEE Electron Lett 32:1963–1964
45. Friese M (1996) Multicarrier modulation with low peak-to-average power ratio. IEE Electron
Lett 32:712–713
46. Davis JA, Jedwab J (1999) Peak-to-mean power control in OFDM, Golay complementary
sequences, and Reed-Muller codes. IEEE Trans Inf Theory 45:2397–2417
47. Djordjevic IB, Xu L, Wang T (2008) PMD compensation in multilevel coded-modulation
schemes with coherent detection using BLAST algorithm and iterative polarization cancel-
lation. Opt Express 16(19):14845–14852
48. Zhao Y, Huang A (1997) A novel channel estimation method for OFDM mobile communi-
cation systems based on pilot signals and transform-domain processing. Proceedings of IEEE
47th Vehicular Technology Conference,1997, vol. 3, Phoenix, 1997, pp 2089–2093
49. Frenger PK, Arne N, Svensson B (1999) Decision-directed coherent detection in multicarrier
systems on Rayleigh fading channels. IEEE Trans Veh Technol 48(2):490–498
50. Kella T (2003) Decision-directed channel estimation for supporting higher terminal velocities
in OFDM based WLANs. iProceedings of IEEE Global Telecommunications Conference
2003 (GLOBECOM ’03), Dec 2003,vol. 3 (1–5), pp 1306–1310
References 571
51. Hoeg W, Lauterbach T (2003) Digital audio broadcasting: principles and applications of
digital radio. Wiley, Chichester
52. Fischer W (2010) Digital video and audio broadcasting technology: a practical engineering
guide, 3rd edn. Springer, Heidelberg/Dordrecht/London/New York
53. ETSI Standard EN 300 744 V1.5.1, Digital Video Broadcasting (DVB); Framing structure,
channel coding and modulation for digital terrestrial television
54. Ghavami M, Michael LB, Kohno R (2007) Ultra wideband signal and Systems in Commu-
nication Engineering, 2nd edn. Wiley, Chichester
55. ETSI Standard (2009) EN 302755, Digital Video Broadcasting (DVB), Frame structure,
channel coding and modulation for a second generation digital terrestrial video broadcasting
system, ETSI, 2009
56. Alamouti SM (1998) A simple transmit diversity technique for wireless communications.
IEEE J Sel Area Commun 16(8):1451–1458
57. Djordjevic IB, Xu L, Wang T (2008) PMD compensation in coded-modulation schemes with
coherent detection using Alamouti-type polarization-time coding. Opt Express 16
(18):14163–14172
58. IEEE Standard for Information technology (2012) Telecommunications and information
exchange between systems Local and metropolitan area networks – Specific requirements
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifi-
cations. IEEE Std 802.11–2012 (Revision of IEEE Std 802.11–2007), pp 1-2793, 29 Mar
2012. doi: 10.1109/IEEESTD.2012.6178212
59. Heiskala J, Terry J (2002) OFDM wireless LANs: a theoretical and practical guide. Sams
Publishing, Indianapolis
60. Hanzo L, Akhtman Y, Wang L, Jiang M (2011) MIMO-OFDM for LTE, WiFi, and WiMAX,
IEEE. Wiley, Hoboken
61. Gast MS (2005) 802.11 Wireless networks: the definitive guide, 2nd edn. O’Reilly Media,
Inc, Sebastopol
62. Gast MS (2013) 802.11ac: a survival guide. O’Reilly Media, Inc, Sebastopol
63. Gast MS (2012) 802.11an: a survival guide. O’Reilly Media, Inc, Sebastopol
64. Nuaymi L (2007) WiMAX: technology for broadband wireless access. Wiley, Chichester
65. IEEE 802.16–2004 (2004) IEEE Standard for local and metropolitan area networks, Air
interface for fixed broadband wireless access systems, Oct 2004
66. IEEE 802.16e (2006) IEEE Standard for Local and Metropolitan Area Networks. Air
interface for fixed broadband wireless access systems, Amendment 2: Physical and Medium
Access Control Layers for combined fixed and mobile operation in licensed bands and
corrigendum 1, Feb 2006
67. Ghavami M, Michael LB, Kohno R (2007) Ultra wideband signals and systems in commu-
nication engineering. Wiley, Hoboken
68. Batra A, Balakrishnan J, Dabak A, Gharpurey R, Lin J, Fontaine P, Ho J-M, Lee S,
Frechette M, March S, Yamaguchi H (2004) Multi-band OFDM physical layer proposal for
IEEE 802.15 Task Group 3a, Doc. IEEE P802.15–03/268r3, Mar 2004
69. Nikookar H, Prasad R (2009) Introduction to ultra wideband for wireless communications.
Springer, New York
70. Siriwongpairat WP, Liu KJR (2007) Ultra-wideband communications systems: multiband
OFDM approach. Wiley, Hoboken
71. Boon PK, Peng X, Chin F (2004) Performance studies of a multi-band OFDM system using a
simplified LDPC code. Proceedings of 2004 international workshop on ltra Wideband
Systems & 2004 Conference on Ultrawideband Systems and Technologies (UWBST &
IWUWBS), pp 376–380, 18–21 May 2004
72. Kim S-M, Tang J, Parhi KK (2005) Quasi-cyclic low-density parity-check coded multiband-
OFDM UWB systems. Proceedings of 2005 I.E. international symposium on Circuits and
Systems, pp 65–68, 23–26 May 2005
572 7 OFDM for Wireless and Optical Communications
73. Shieh W, Tucker RS, Chen W, Yi X, Pendock G (2007) Optical performance monitoring in
coherent optical OFDM systems. Opt Express 15:350–356
74. Tang JM, Shore KA (2007) Maximizing the transmission performance of adaptively modu-
lated optical OFDM signals in multimode-fiber links by optimizing analog-to-digital con-
verters. J Lightwave Technol 25:787–798
75. Schmidt BJC, Lowery AJ, Armstrong J (2007) Experimental demonstrations of 20 Gbit/s
direct-detection optical OFDM and 12 Gbit/s with a colorless transmitter. Optical Fiber
Communication conference 2007, Paper no. PDP18, San Diego
76. Schuster M, Randel S, Bunge CA et al (2008) Spectrally efficient compatible single-sideband
modulation for OFDM transmission with direct detection. IEEE Photon Technol Lett
20:670–6722
77. Peng W, Wu X, Arbab VR et al (2008) Experimental demonstration of 340 km SSMF
transmission using a virtual single sideband OFDM signal that employs carrier suppressed
and iterative detection techniques. Optical Fiber Communication conference 2008, Paper
no. OMU1, San Diego
78. Peng WR, Wu X, Arbab VR et al (2008) Experimental demonstration of a coherently
modulated and directly detected optical OFDM system using an RF-tone insertion. Optical
Fiber Communication conference 2008, Paper no. OMU2, San Diego
79. Shieh W, Yang Q, Ma Y (2008) 107 Gb/s coherent optical OFDM transmission over 1000-km
SSMF fiber using orthogonal band multiplexing. Opt Express 16:6378–6386
80. Djordjevic IB, Shieh W, Liu X, Nazarathy M (2014) Advanced digital signal processing and
coding for multi-Tb/s optical transport [from the guest editors]. IEEE Sig Proc Mag 31
(2):15–142
81. Djordjevic IB, Cvijetic M, Lin C (2014) Multidimensional signaling and coding enabling
multi-Tb/s optical transport and networking. IEEE Sig Proc Mag 31(2):104–117
82. Djordjevic IB (2013) On the irregular nonbinary QC-LDPC-coded hybrid multidimensional
OSCD-modulation enabling beyond 100 Tb/s optical transport. IEEE/OSA J Lightwave
Technol 31(16):2969–2975
83. Djordjevic IB, Arabaci M, Xu L, Wang T (2011) Generalized OFDM (GOFDM) for ultra-
high-speed optical transmission. Opt Express 19(7):6969–6979
84. Djordjevic IB (2012) Spatial-domain-based hybrid multidimensional coded-modulation
schemes enabling multi-Tb/s optical transport. J Lightwave Technol 30(14):2315–2328
85. Liu X, Chandrasekhar S, Winzer PJ (2014) Digital signal processing techniques enabling
multi-Tb/s superchannel transmission: an overview of recent advances in DSP-enabled
superchannels. IEEE Signal Process Mag 31(2):16–24
86. Djordjevic IB, Saleh AH, Küppers F (2014) Design of DPSS based fiber Bragg gratings and
their application in all-optical encryption, OCDMA, optical steganography, and orthogonal-
division multiplexing. Opt Express 22(9):10882–10897
87. Djordjevic IB, Jovanovic A, Peric ZH, Wang T (2014) Multidimensional optical transport
based on optimized vector-quantization-inspired signal constellation design. IEEE Trans
Commun 62(9):3262–3273
88. Djordjevic IB 2016 On advanced FEC and coded modulation for ultra-high-speed optical
transmission. IEEE Commun Surv and Tutorials, 18(3):1920–1951, third quarter. doi:10.
1109/COMST.2016.2536726
89. Djordjevic I, Batshon HG, Xu L, Wang T (2011) Four-dimensional optical multiband-OFDM
for beyond 1.4 Tb/s serial optical transmission. Opt Express 19(2):876–882
90. Sano A, Yoshida E, Masuda H et al (2007) 30 100-Gb/s all-optical OFDM transmission
over 1300 km SMF with 10 ROADM nodes. European conference on Optical Communica-
tions 2007 (ECOC 2007), Paper no. PD 1.7, Berlin
91. Yamada E, Sano A, Masuda H, et al (2008) Novel no-guard interval PDM CO-OFDM
transmission in 4.1 Tb/s (50 88.8-Gb/s) DWDM link over 800 km SMF including 50-GHz
spaced ROADM nodes. Optical Fiber Communication conference 2008 (OFC 2008), Paper
no. PDP8, San Diego
References 573
92. Singh G, Alphones A (2003) OFDM modulation study for a radio-over-fiber system for
wireless LAN (IEEE 802.11a). Proceedings of ICICS-PCM, Singapore, 2003, pp 1460–1464
93. Song JB, Islam AHMR (2008) Distortion of OFDM signals on radio-over-fiber links inte-
grated with an RF amplifier and active/passive electroabsorption modulators. J Lightwave
Technol 26(5):467–477
94. Xu L, Qian D, Hu J, Wei W, Wang T (2008) OFDMA-based passive optical networks (PON).
2008 Digest IEEE LEOS Summer Topical meetings, 2008,. pp 159–60
95. Emsia A Malekizandi M Le TQ Djordjevic IB, Kueppers F (2013) 1 Tb/s WDM-OFDM-PON
power budget extension techniques. Proceedings of IEEE Photonics conference 2013 (IPC
2013), Paper WG3.3, 8–12 Sept 2013, Seattle
96. Grubor J, Jungnickel V, Langer K-D (2005) Capacity analysis in indoor wireless infrared
communication using adaptive multiple subcarrier transmission. Proceedings of ICTON
2005, pp 171–174
97. Grubor J, Gaete Jamett OC, Walewski JW, Randel S, Langer K-D (2007) High-speed
wireless indoor communication via visible light. In: ITG Fachbericht 198. VDE Verlag,
Berlin, pp 203–208
98. Djordjevic IB, Vasic B, Neifeld MA (2007) LDPC coded OFDM over the atmospheric
turbulence channel. Opt Express 15(10):6332–6346
99. Djordjevic IB (2007) LDPC-coded OFDM transmission over graded-index plastic optical
fiber links. IEEE Photon Technol Lett 19(12):871–873
100. Shah AR, Hsu RCJ, Sayed AH, Jalali B (2005) Coherent optical MIMO (COMIMO). J
Lightwave Technol 23(8):2410–2419
101. Hsu RCJ, Tarighat A, Shah A, Sayed AH, Jalali B (2005) Capacity enhancement in coherent
optical MIMO (COMIMO) multimode fiber links. J Lightwave Technol 23(8):2410–2419
102. Tong Z, Yang Q, Ma Y, Shieh W (2008) 21.4 Gb/s coherent optical OFDM transmission over
multimode fiber, Post-Deadline Papers Technical Digest. 13th Optoelectronics and Commu-
nications Conference (OECC) and 33rd Australian Conference on Optical Fibre Technology
(ACOFT), Paper No. PDP-5, 2008
103. Yaman F, Zhang S, Huang Y-K, Ip E, Downie JD, Wood WA, Zakharian A, Mishra S,
Hurley J, Zhang Y, Djordjevic IB, Huang M-F, Mateo E, Nakamura K, Inoue T, Inada Y,
Ogata T (2015) First quasi-single-mode transmission over transoceanic distance using
few-mode fibers. Proceedings of OFC Postdeadline Papers, Paper Th5C.7, 22–26 Mar
2015, Los Angeles
Chapter 8
Diversity and MIMO Techniques
Abstract The purpose of this chapter is to describe various diversity and MIMO
techniques capable of improving single-input single-output system performance.
Through MIMO concept it is also possible to improve the aggregate data rate. The
diversity and MIMO techniques described are applicable to wireless MIMO com-
munications as well as free-space optical and fiber-optics communications with
coherent optical detection. Various diversity schemes are described including
polarization diversity, spatial diversity, and frequency diversity schemes. The
following receiver diversity schemes are described: selection combining, threshold
combining, maximum-ratio combining, and equal-gain combining schemes. Vari-
ous transmit diversity schemes are described, depending on the availability of
channel state information on transmitter side. The most of the chapter is devoted
to wireless and optical MIMO techniques. After description of various wireless and
optical MIMO models, we describe the parallel decomposition of MIMO channels,
followed by space-time coding (STC) principles. The maximum likelihood
(ML) decoding for STC is described together with various design criteria. The
following classes of STC are described: Alamouti code, orthogonal designs, linear
space-time block codes, and space-time trellis codes. The corresponding STC
decoding algorithms are described as well. After that we move our attention to
spatial division multiplexing (SDM) principles and describe various BLAST
encoding architectures as well as multigroup space-time coded modulation. The
following classes of linear and feedback MIMO receiver for uncoded signals are
subsequently described: zero-forcing, linear minimum MSE, and decision-feedback
receivers. The next topic in the chapter is related to suboptimum MIMO receivers
for coded signals. Within this topic we first describe linear zero-forcing (ZF) and
linear MMSE receivers (interfaces) but in the context of STC. Within decision-
feedback and BLAST receivers, we describe various horizontal/vertical (H/V)
BLAST architecture including ZF and MMSE ones. The topic on suboptimum
receivers is concluded with diagonal (D-)-BLAST and iterative receiver interfaces.
The section on iterative MIMO receivers starts with brief introduction of concept of
factor graphs, following with the description of factor graphs for MIMO channel
and channels with memory. We then describe the sum-product algorithm (SPA)
operating on factor graphs, followed by description of SPA for channels with
memory. The following iterative MIMO receivers for uncoded signals are
described: ZF, MMSE, ZF H/V-BLAST, and LMMSE H/V-BLAST receivers.
After brief description of factor graphs for linear block and trellis codes, we
describe several iterative MIMO receivers for space-time coded signals. The
section on broadband MIMO describes how frequency selectivity can be used as
an additional degree of freedom, followed by description of MIMO-OFDM and
space-frequency block coding principles. The focus is then moved to MIMO
channel capacity calculations for various MIMO channel models including deter-
ministic, ergodic, and non-ergodic random channels, as well as correlated channel
models. The concepts of ergodic and outage channel capacity are described. The
section on MIMO channel capacity ends with MIMO-OFDM channel capacity
description. In MIMO channel estimation section, the following MIMO channel
estimation techniques are described: ML, least squares (LS), and linear minimum
MSE MIMO channel estimation techniques. The last section concludes the chapter.
The key idea behind the diversity-combining techniques [1–3] is to use several
independent realizations of that same transmitted signal to improve tolerance to
channel impairments. The independent signals copies transmitted over different
paths or degrees of freedom will have a low probability of experiencing the same
level of channel distortion. In wireless communications, the probability that all
independent fading paths are in deep fade will be low. The independent realizations
of the same signal will be properly combined to improve overall reliability of
transmission.
There are many different ways of transmitting the independent signal paths. In
polarization diversity, for optical communications, the laser signal can be split into
two polarizations by the polarization beam splitter (PBS), and the same data signal
can be imposed on two orthogonal polarization states. In wireless communications,
two transmit or receive antennas with horizontal and vertical polarizations can be
used to implement the polarization diversity. The coherent optical receivers require
matching the state of polarization (SOP) of the local oscillator laser (LOL) with that
of the received optical signal. In practice, only the SOP of local laser can be
controlled, and one possible polarization control receiver configuration is shown
in Fig. 8.1. Polarization controller is commonly implemented by using four
squeezers [4, 5]. Insensitivity with respect to polarization fluctuations is possible
if the receiver derives two demodulated signals from two orthogonal polarizations
of the received signal, which is illustrated in Fig. 8.2. This scheme is known as
polarization diversity receiver. There two main issues with respect to this approach:
(i) there only two polarization diversity branches, and (ii) since the same signal is
8.1 Diversity Techniques 577
Data
Polarization
Coherent transmitter
transformer
Receiver
Local Polarization
laser transformer Controller
Photodetector Decision
Received signal PBS
Photodetector circuit
3-dB
splitter
LO Used for balanced detection
Fig. 8.2 Polarization diversity receiver configuration in fiber-optics communications. PBS polar-
ization beam splitter
used in both polarization, the spectral efficiency of this scheme is twice lower than
that of the polarization division multiplexing (PDM) scheme.
In frequency diversity, the same narrowband signal is transmitted over different
subcarriers, while the frequency channel spacing is larger than the coherence
bandwidth. In wavelength diversity, similarly, several copies of the same signal
are transmitted over different wavelength channels. The main drawback of this
scheme is poor spectral efficiency.
In time diversity, the same signal is transmitted over different time slots, while
the slot separation is larger than the coherence time or reciprocal of the channel
Doppler spread. This scheme also suffers from the poor spectral efficiency. To
overcome for this problem, the multidimensional signaling [6, 7] can be employed.
Namely, the multiple degrees of freedom, such as time or frequency slots, can be
used as dimensions for multidimensional signaling. Now instead of using these
degrees of freedom to multiplex independent data streams, we can define the signal
constellations in multidimensional space, as discussed in chapter on advanced
modulation schemes. If some of coordinates are affected by deep fade, for instance,
the other will not, and the signal constellation point will not be completely
destroyed, which will improve tolerance to channel impairments. In another
approach, it is possible to combine the coding with interleaving.
In directional/angle diversity, for wireless applications, the receive antenna
beamwidth is restricted to a given angle increment. If the angle increment is
sufficiently small, it is possible to ensure that only one multipath array reaches
the antenna’s beamwidth. On such a way, we can efficiently deal with the multipath
fading. On the other hand, the complexity of such receive diversity scheme will be
high. Thanks to high directivity of laser beams, this method might be suitable for
free-space optical communications to deal with atmospheric turbulence effects.
However, such system is sensitive beam wandering effect. So-called smart antennas
are built from an array of directional antenna elements, wherein the phase of each
578 8 Diversity and MIMO Techniques
In receiver (Rx) diversity, the independent propagation paths are after reception
properly combined, and such obtained signal is demodulated. We are mostly
concerned with the linear combiners, shown in Fig. 8.3, in which multipath
propagation paths are properly weighted according to certain criterion. In wireless
applications, the i-th receiver Rxi is represented by the receive antenna followed by
a low-noise amplifier. In free-space optical communications with direct detection,
Combiner output
where the nominator represents the signal power while the denominator the total
noise power in all branches. To determine the maximum possible SNR at the output
of the linear combiner, let us ignore the distortion introduced during the propaga-
tion, such as the fading in wireless p
channels,
ffiffiffiffiffi so that the output of the matched filter
in the i-th branch is proportional to Es , where Es is the average symbol energy, and
the SNR of linear combiner can be upper bounded by:
M
P pffiffiffiffiffiffiffiffiffiffiffiffiffi 2
wi Es =N 0
i¼1 Es
ρ M ¼ Mρ, ð8:2Þ
P
M N0
N0 w2i |{z}
i¼1 ρ
where ρ is the average SNR of any branch. Therefore, the array gain can be now
defined as the linear combiner SNR to single-branch SNR ratio:
ρ
AG ¼ M, ð8:3Þ
ρ
and the maximum possible array gain is M. The average symbol error probability
can be determined from SNR-dependent expression of symbol error probability
Ps(ρ) by averaging out over all possible values of ρ:
ð
1
where f ρ ðρÞ is the PDF of linear combiner SNR. The outage probability can be
derived from the cumulative distribution function (CDF):
ρð0
Poutage ¼ Pr ρ ρ0 ¼ f ρ ðρÞdρ, ð8:5Þ
0
where ρ0 is the target SNR. The linear diversity combining helps get a more
favorable distribution of combiner SNR, f ρ ðρÞ; the average symbol rate and outage
probability get reduced. This reduction in the symbol error rate can be described by
more rapid slope in the corresponding symbol error probability curve. We know
that for very high SNRs, the symbol error probability is reversely proportional to ρ,
so that the diversity gain can be defined as:
logPs ðρÞ
DG ¼ lim : ð8:6Þ
ρ!1 logρ
For some diversity schemes, symbol error probability is proportional to ρM and
based on Eq. (8.6), the diversity gain for such schemes is DG ¼ M. Clearly, the
maximum diversity order is M, and when achieved it is commonly referred to as the
full diversity order.
The most popular receiver diversity schemes include selection combining,
threshold combining, maximum-ratio combining (MRC), and equal-gain combin-
ing (EGC). In selection combining, the linear combiner selects the branch with
the largest SNR. In threshold combining, the combiner scans the branches and
selects the first branch with SNR larger then threshold SNR. In MRC, the
weighting coefficients in the linear combiner are properly chosen such that the
combiner SNR is maximized. Finally, in EGC all branches have the same weight.
Additional details of various receiver diversity schemes are provided in subse-
quent sections.
As indicated earlier, in selection combining (SC), the linear combiner selects the
branch with the maximum SNR. If all receivers are identical, the noise power would
be the same, and equivalently the linear combiner in SC can instead select the
branch with largest total power, which is easier to measure. Given that only one
branch is used in this case, there is no need to use the co-phasing so that the SC is
applicable to both differential and coherent detection cases. As discussed in previ-
ous section, in order to determine either the average symbol error probability or the
outage probability, the first step is to determine the distribution of SNR of the
combiner, which can be obtained as the first derivative of CDF with respect to SNR.
The CDF is related to the probability that the combiner SNR ρ is smaller than a
8.1 Diversity Techniques 581
given SNR ρ, which is equivalent to the probability that maximum of SNRs from all
branches is smaller than ρ. When the maximum SNR is smaller than a given ρ, then
SNRs from other branches will be smaller than ρ and we can write:
Y
M
CDFρ ðρÞ ¼ Pr ρ < ρ ¼ Prðmax½ρ1 ; ρ1 ; . . . ; ρM < ρÞ ¼ Prðρi < ρÞ: ð8:7Þ
i¼1
The PDF of combiner SNR is then the first derivative of CDF with respect to ρ:
dCDFρ ðρÞ
f ρ ð ρÞ ¼ : ð8:7AÞ
dρ
Based on Eqs. (8.4) and (8.5), the average symbol error probability and the
outage probability are expressed with respect to CDF as follows:
ð
1
dCDFρ ðρÞ
Ps ¼ P s ð ρÞ dρ, Poutage ¼ CDFρ ðρ0 Þ, ð8:8Þ
dρ
0
where ρ0 is the target SNR. The PDF of combiner SNR is particularly easy to
determine for Rayleigh fading. It has been shown earlier that the PDF of SNR in the
i-th branch is given by:
1 ρi =ρi
f ð ρi Þ ¼ e , ð8:9Þ
ρi
Y
M Y
M Y
M
CDFρ ðρÞ ¼ Prðρi < ρÞ ¼ CDFρi ðρÞ ¼ 1 eρ=ρi : ð8:11Þ
i¼1 i¼1 i¼1
Assuming that all branches are identical with the same SNR ρi ¼ ρ, the CDF of
SC SNR becomes:
Y
M M
CDFρ ðρÞ ¼ 1 eρ=ρ ¼ 1 eρ=ρ : ð8:12Þ
i¼1
ð
1 ð
1
X
M M1 ρ=ρ M
1
ρ ¼ ρf ρ ðρÞdρ ¼ ρ 1 eρ=ρ e dγ ¼ ρ , ð8:14Þ
ρ i¼1
i
0 0
XM 1
and clearly the array gain AG ¼ i¼1 i
increases with the number of branches but
not in a linear fashion. The largest improvement is when we move from the case of
single-branch (no diversity at all) to two-branch case diversity. The outage proba-
YM
bility is obtained from Eq. (8.12) by Poutage ¼ CDFρ ðρ0 Þ ¼ 1 eρ0 =ρi ,
i¼1
while the average symbol error probability for different modulation formats can
be obtained by substituting (8.12) into (8.8). For instance, for BPSK the average bit
error probability, in Rayleigh fading, for SC is given by:
ð
1
pffiffiffiffiffi
Pb ðBPSKÞ ¼ Q 2ρ f ρ ðρÞdρ
0
ð
1
pffiffiffiffiffi M M1 ρ=ρ
¼ Q 2ρ 1 eρ=ρ e dρ: ð8:15Þ
ρ
0
For DPSK, in Rayleigh fading, the average bit error probability can be found in
closed form:
M1
ð
1
X1
1 ρ M M1 ρ=ρ MM m
Pb ðDPSKÞ ¼ e 1 eρ=ρ e dρ ¼ ð1Þm :
2
|ffl{zffl} ρ 2 m¼0 1þmþρ
0 |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
Pb ðρÞ
f ρ ðρÞ
ð8:16Þ
In Fig. 8.4 we show the outage probability vs. normalized SNR, defined as ρ=ρ0 ,
of the selection combining scheme for different number of diversity branches M in
Rayleigh fading. Clearly, the largest improvement is obtained by moving from
single-branch case (no diversity at all) to two-branch-based SC. On the other hand,
in Fig. 8.5 we show the average bit error probability against average SNR ρ for
BPSK in Rayleigh fading when SC is used for different number of diversity
branches. The results are obtained by numerical evaluation of integral in
Eq. (8.15). The largest improvements over single diversity branch are obtained
8.1 Diversity Techniques 583
0
10
Selection combining M= 1
M= 2
-1
10 M= 4
M= 8
Outage probability, Pout
-2
M=16
10 M=20
-3
10
-4
10
-5
10
-6
10
-10 0 10 20 30 40 50
Normalized SNR, ρav/ρ0 [dB]
Fig. 8.4 The outage probability vs. normalized SNR (ρ=ρ0 ) of selection combining scheme for
different number of diversity branches in Rayleigh fading
In threshold combining (TC), the combiner scans different branches and selects the
first branch with SNR larger then threshold SNR, denoted as ρTsh. The TC outputs
the signal from this branch as long as the SNR is larger than threshold SNR. Once
the SNR falls below ρTsh, the TC scans sequentially other branches until it finds
another branch with SNR larger than ρTsh. The TC with only two branches is
commonly referred to as switch and stay combiner (SSC). The CDF for SSC can
be determined as [1, 9]:
The first case in (8.16), ρ < ρTsh, corresponds to the case when the SNR in branch
1, ρ1, dropped below the threshold, we switched to branch 2; however, the SNR on
branch 2, ρ2, is also below the threshold. The second case in (8.16), ρ ρTsh,
corresponds to the situation when either SNR on the first branch ρ1 is larger than
584 8 Diversity and MIMO Techniques
SC:
M= 1
-1
10 M= 2
M= 4
Average bit-error probability, Pb
M= 8
-2
10 M=16
EGC:
M=2
-3
10
-4
10
-5
10
-6
10
0 4 8 12 16 20 24 28
Average SNR, ρav [dB]
Fig. 8.5 The average bit error probability vs. average SNR (ρ) of selection combining scheme for
BPSK for different number of diversity branches in Rayleigh fading
threshold but smaller than ρ or ρ1 dropped below the threshold, and we moved to
branch 2, while the SNR on branch two was above the threshold.
As an illustration, the CDF for Rayleigh fading, providing that ρi ¼ ρ, becomes:
The PDF of SSC in Rayleigh fading can be found as the first derivative with
respect to ρ:
dCDFρ ðρÞ 1 eρTsh =ρ 1=ρ eρ=ρ , ρ < ρTsh
f ρ ð ρÞ ¼ ¼ : ð8:18Þ
dρ 2 eρTsh =ρ 1=ρ eρ=ρ , ρ ρTsh
The outage probability can be obtained from Eq. (8.17), by setting ρ ¼ ρ0,
namely, Poutage ¼ CDFρ ðρ0 Þ. The average symbol error probability can be
expressed as follows:
ð
1
ρð
Tsh ð
1
ð8:20Þ
For DPSK, the average bit error probability can be determined in closed form:
ð
1
1 ρ 1
Pb ðDPSKÞ ¼ e f ρ ðρÞdρ ¼ 1 eρTsh =ρ þ eρTsh eρTsh =ρ : ð8:21Þ
2 2 1þρ
0
1
When SNR is much larger than threshold SNR, Pb ðDPSKÞ ! ,
2 1þρ
representing the single-branch result. Therefore, SSC is inferior compared to SC.
M 2 M 2
P P P
M P
M
wi r i wi r i w2i r 2i X
M
i¼1 i¼1 i¼1 i¼1
ρ ¼ ¼ ¼ ρi : ð8:22Þ
P
M P
M P
M
N0 w2i N0 w2i N0 w2i i¼1
i¼1 i¼1 i¼1
The equality sign is achieved when the squared weight of the i-th branch is
proportional to the i-th branch SNR, namely, w2i ’ r 2i =N 0 . Therefore, in MRC the
combiner SNR is equal to the sum of SNRs of individual branches.
The PDF of ρ can be obtained as “inverse” Laplace transform of moment-
generating functions (MGFs) of SNRs for individual branches. The PDF in Ray-
leigh fading is χ2 with 2 M degrees of freedom, expected value Mρ and variance
2Mρ:
586 8 Diversity and MIMO Techniques
ρM1 eρ=ρ
f ρ ðρÞ ¼ , ρ 0: ð8:23Þ
ρM ðM 1Þ!
The average symbol error probability for Rayleigh fading can be determined as:
ð
1
ρM1 eρ=ρ
Ps ¼ Ps ð ρÞ dρ, ð8:25Þ
ρM ðM 1Þ!
0 |fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl}
f ρ ðρÞ
and for BPSK the average bit error probability can be found in closed form:
ρð0
pffiffiffiffiffi ρM1 eρ=ρ
Pb ðBPSKÞ ¼ Q 2ρ M dρ
ρ ðM 1Þ!
0 |fflfflfflfflfflfflffl
ffl {zfflfflfflfflfflfflffl
ffl }
ð8:26Þ
f ρ ð ρ Þ
M
M X m qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
M1þm 1 þ ρn
¼ 1ρn
2 , ρn ¼ ρ= 1 þ ρ :
m¼1
m 2
The upper bound on symbol error probability for M-ary QAM, obtained by
employing the Chernoff bound [Q(x) exp(x2/2)], is given by:
pffiffiffiffiffiffiffiffiffiffiffi
Ps ¼ αM Q βM ρ αM exp βM ρ =2
¼ αM expðβM ½ρ1 þ . . . þ ρM =2Þ ð8:27Þ
so that the average symbol error probability can be upper bounded by:
ð
1
Y
M
1
Ps ¼ Ps ðρÞf ρ ðρÞdρ αM : ð8:28Þ
i¼1
1 þ β M ρi =2
0
When all branches in MRC scheme are identical, for high SNR, the upper bound
is simply:
M
Ps αM βM ρ=2 , ð8:29Þ
logPs
DG ¼ lim ¼ M, ð8:30Þ
ρ!1 logρ
ð
1
1
MGFρ ðsÞ ¼ m , ð8:33Þ
1 sρ=m
with K being the Rician parameter K, defined by K ¼ s2/(2σ 2) (s2 is the power in
line-of-sight and 2σ 2 is the power in multipath components). Based on Eq. (8.22),
we concluded that in MRC, the combiner SNR is equal to the sum of SNRs of
individual branches, ρ ¼ ∑iρi. Assuming that SNRs at different branches are
independent of each other, the joint PDF can be represented as the product of PDFs:
where α and β are constants, such as for DPSK and M-ary QAM for high SNRs (see
Eq. 8.27), the average symbol error probability can be related to MGF as follows:
588 8 Diversity and MIMO Techniques
ð1
1 ð ð
1
Y
M
¼ α MGFρi ½β:
i¼1
As an illustration, the average bit error probability for DPSK will be obtained
1 YM
from (8.32) by setting α ¼ 1/2 and β ¼ 1 to obtain Pb ¼ i¼1
MGFρi ½1.
2
Another relevant case is when the symbol error probability is of the form [1]:
ðd
Ps ðρÞ ¼ αexpðβðuÞρÞdu, ð8:38Þ
c
ð
ππ=M
1 sin 2 ðπ=MÞ
Ps ð ρÞ ¼ exp ρ dϕ ð8:39Þ
π sin 2 ϕ
0
ð1
1 ð ð ðd
1
The average symbol error probability for M-ary PSK will be then:
8.1 Diversity Techniques 589
ð
ππ=M
Y
1 M
sin 2 ðπ=MÞ
Ps ðMPSKÞ ¼ MGFρi dϕ: ð8:41Þ
π i¼1
sin 2 ϕ
0
This MGF-based method is suitable only for MRC schemes, since the combiner
SNR in this case is equal to the sum of SNRs of individual branches, which is not
the case for other diversity-combining schemes.
In Fig. 8.7 we show the outage probability vs. normalized SNR, also defined as
ρ=ρ0 , of the maximum-ratio combining scheme for different number of diversity
branches M in Rayleigh fading. By comparing the Figs. 8.6 and 8.4, we conclude
that MRC significantly outperforms the SC scheme.
On the other hand, in Fig. 8.7 we show the average bit error probability against
average SNR ρ for BPSK in Rayleigh fading when MRC is used for different
number of diversity branches. Similarly as in SC, the largest improvements over
single diversity branch are obtained for M ¼ 2 and M ¼ 4 diversity branches. Going
above M ¼ 8 diversity branches does not make sense, as the further increasing in
number of branches provides diminishing improvements. By comparing Figs. 8.7
and 8.5, we conclude that MRC significantly outperforms SC. As an illustration, for
M ¼ 4 and BPSK, the improvement of MRC over SC is about 4.8 dB at average bit
error probability of 106.
0
10
MRC:
M= 1
-1
10 M= 2
M= 4
Outage probability, Pout
-2
M= 8
10
M=16
EGC:
-3
10
M=2
-4
10
-5
10
-6
10
-10 0 10 20 30 40 50
Normalized SNR, ρav/ρ0 [dB]
Fig. 8.6 The outage probability vs. normalized SNR (ρ=ρ0) of maximum-ratio combining scheme
for different number of diversity branches in Rayleigh fading as well as for EGC with two diversity
branches
590 8 Diversity and MIMO Techniques
MRC:
M= 1
10
-1
M= 2
M= 4
Average bit-error probability, Pb
M= 8
10
-2
M=16
EGC:
M=2
-3
10
-4
10
-5
10
-6
10
-4 0 4 8 12 16 20 24 28
Average SNR, ρav [dB]
Fig. 8.7 The average bit error probability vs. averaged SNR (ρ) of maximum-ratio combining
scheme for different number of diversity branches in Rayleigh fading as well as for EGC with two
diversity branches
In equal-gain combining (EGC), once the co-phasing is performed, the signals from
different diversity branches ri (i ¼ 1, 2, . X
. . , M ) are combined with equal weights,
M pffiffiffiffiffi
so the EGC output can be written as r ¼ i¼1
r i = M. The combiner output SNR
would be then, assuming that all branches are composed of identical components,
!2
X
M
ρ ¼ ri =ðN 0 MÞ: ð8:42Þ
i¼1
Unfortunately, the PDF of combiner SNR cannot be found in closed form, except
for Rayleigh fading channel with two diversity branches [1, 9]. The CDF of
combiner SNR for Rayleigh fading channel with two diversity branches can be
determined as [9]:
pffiffiffiffiffiffiffiffiffiffi ρ=ρ pffiffiffiffiffiffiffiffiffiffi
CDFρ ðρÞ ¼ 1 e2ρ=ρ πρ=ρ e 1 2Q 2ρ=ρ : ð8:43Þ
The corresponding outage probability will be then Poutage ðρ0 Þ ¼ CDFρ ðρ0 Þ. The
PDF for this case can be found as the first derivative of CDF with respect to
combiner SNR:
8.1 Diversity Techniques 591
dCDFρ ðρÞ
f ρ ð ρÞ ¼
dρ
rffiffiffi rffiffiffiffiffiffi
1 2ρ=ρ pffiffiffi ρ=ρ 1 1 ρ ρ
¼ e πe pffiffiffiffiffiffiffiffi 1 2Q 2 : ð8:44Þ
ρ 4ρρ ρ ρ ρ
ð
1 rffiffiffi rffiffiffiffiffiffi
1 2ρ=ρ pffiffiffi ρ=ρ 1 1 ρ ρ
Ps ¼ Ps ð ρÞ e πe pffiffiffiffiffiffiffiffi 1 2Q 2 dρ:
ρ 4ρρ ρ ρ ρ
0 |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
f ρ ð ρÞ
ð8:45Þ
For BPSK, the average error probability expression can be derived in closed
form:
2 sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 3
ð
1
pffiffiffiffiffi 2
14 1 5
Pb ðBPSKÞ ¼ Q 2ρ f ρ ðρÞdρ ¼ 1 1 ð8:46Þ
2 1þρ
0
Based on Fig. 8.5, we conclude that the power penalty of EGC with respect to
MGC, for medium SNRs, when the outage probability is concerned for M ¼ 2 case,
is about 0.6 dB at Pout of 106. Interestingly enough, based on Fig. 8.6, the power
penalty of EGC for M ¼ 2 and BPSK, in Rayleigh fading, is also about 0.6 dB. On
the other hand, based on Fig. 8.5, we conclude that EGC scheme for M ¼ 2 (with
BPSK) outperforms the corresponding SC scheme for almost 0.9 dB at average bit
error probability of 106.
In transmit diversity multiple transmitters are used, wherein the transmit power is
divided among these transmitters. In optical communications, these transmitters are
either laser diodes or LEDs, while in wireless communications, these are transmit
antennas. Two relevant cases of transmitter diversity include (i) the case when the
channel state information (CSI) is available on transmitter side and (ii) using the
Alamouti-type scheme [10], when the CSI is not available on transmitter side.
592 8 Diversity and MIMO Techniques
Let us consider a transmit diversity system with M transmitters and one receiver. For
optical communications with coherent optical detection and wireless communications,
the CSI associated with the i-th transmitter (laser diode, antenna), given by ri exp( jθi),
is known at the transmitter side. The transmitted signal constellation point s is
pre-multiplied by a complex channel coefficient wi exp(jθi) (0 wi 1), before
being sent with the help of the i-th transmitter (laser diode, antenna). The corresponding
weight coefficients (in electrical domain) satisfy the condition Σi w2i ¼ 1. Clearly, the
co-phasing is performed on a transmitter side. The weights wi maximizing the SNR on a
receiver side are given by [1, 9]:
!1=2
X
M
wi ¼ r i = r 2i : ð8:47Þ
i¼1
Es X M XM
ρ ¼ r 2i ¼ ρi : ð8:48Þ
N 0 i¼1 i¼1
Clearly, the reviver side SNR is equal to the sum of SNRs originating from
different transmit branches; the result identical to that in MRC, indicating the
corresponding combiner PDF for Rayleigh fading, is given by Eq. (8.23). When
the sample originating from different transmitter are identical, ri ¼ r, the overall
SNR is ρ ¼ Mr2Es/N0, and the corresponding array gain is AG ¼ M.
The upper bound on symbol error probability for M-ary QAM, obtained by
employing the Chernoff bound, is given by:
pffiffiffiffiffiffiffiffiffiffiffi
Ps ρ ¼ αM Q βM ρ αM exp βM ρ =2
!
XM
¼ αM exp βM ρi =2 : ð8:49Þ
i¼1
ð
1
Y
M
1
Ps ¼ Ps ðρÞf ρ ðρÞdρ αM : ð8:50Þ
i¼1
1 þ β M ρi =2
0
When the average SNR values originating from different transmitter branches
are identical, ρi ¼ ρ, the average error probability is upper bounded by:
8.1 Diversity Techniques 593
M
Ps αM βM ρ=2 , ð8:51Þ
and the corresponding diversity gain is given by DG ¼ M, indicating that the full
diversity is possible, the same as for MRC scheme.
When the CSI is not available on transmitter side, we can employ the Alamouti
scheme [10], shown in Fig. 8.7, illustrated for wireless communication applications.
The code matrix of Alamouti code is given by:
x x∗
X¼ 1 2 , ð8:52Þ
x2 x∗
1
y ¼ h1 x1 þ h2 x2 þ z1 , y ¼ h1 x∗ ∗
2 þ h2 x 1 þ z 2 , ð8:53Þ
1 2
where h1 is the channel coefficient between receive antenna and transmit antenna
Tx1, while h2 is the channel coefficient between receive antenna and transmit
antenna Tx2. We use z1 and z2 to denote the zero-mean circularly symmetric
Gaussian noise samples at two consecutive channel uses.
The combiner shown in Fig. 8.8 operates as follows:
~x 1 ¼ h∗ ∗
x 2 ¼ h∗
1 y þ h2 y , ~
∗
2 y h1 y , ð8:54Þ
1 2 1 2
where ~x 1 and ~ x 2 are estimations of transmitted symbols x1 and x2. After the
substitutions of Eqs. (8.53) into (8.54), we obtain:
∗
x 1 ¼ h∗
~ 1 h1 x 1 þ h2 x
∗ ∗
2 þ z1 þ h2 h1 x2 þ h2 x1 þ z2
¼ j h1 j 2 þ j h2 j 2 x 1 þ h∗ ∗
1 z 1 þ h2 z 2 ð8:55Þ
x 2 ¼ j h1 j 2 þ j h2 j 2 x 2 þ h∗
~ ∗
2 z 1 h1 z 2 :
Clearly, after the combiner, the spatial interference is compensated for, while the
noise power is doubled. The receiver SNR is given by:
594 8 Diversity and MIMO Techniques
Tx1
h1
Rx x1
x1,x2
Transmitter h2 Combiner
x2
Tx2
Fig. 8.8 The Alamouti scheme for two transmit and one receive antennas
jh1 j2 þ jh2 j2 Es
ρ¼ ð8:56Þ
2 N0
and represents 1/2 of sum of SNRs from both transmitted branches. Clearly, the
array gain is 1. Since the spatial interference is compensated for (see Eq. 8.55), the
Alamouti schemes achieves the full diversity (DG ¼ 2).
In the rest of this section, we describe how this scheme can be used to compen-
sate for polarization-mode dispersion (PMD) and polarization-dependent loss
(PDL) in fiber-optics communications [11] (see also [5]). The polarization time
(PT)-encoder operates as follows [11]. In the first half of i-th time instance (“the
first channel use”), it sends symbol sx to be transmitted using x-polarization channel
and symbol sy to be transmitted using y-polarization channel, as illustrated in
Fig. 8.9(a). In the second half of i-th time instance (“the second channel use”), it
sends symbol –s*y to be transmitted using x-polarization channel and symbol s*x to
be transmitted using y-polarization. Therefore, the PT-coding procedure is similar
to the Alamouti scheme [10]. Notice that Alamouti-type PT-coding scheme has the
spectral efficiency comparable to coherent OFDM with polarization diversity
scheme. When the channel is used twice during the same symbol period, the
spectral efficiency of this scheme is twice higher than that of polarization diversity
OFDM. Notice that the hardware complexity of PT-encoder/decoder is trivial
compared to that of OFDM. The transmitter complexity is slightly higher than
that that of polarization-diversity receiver, as it requires additional PT-encoder, a
polarization beam splitter (PBS), and a polarization beam combiner (PBC). On the
receiver side, we have the option to use only one polarization or to use both
polarizations. The receiver architecture employing both polarizations is shown in
Fig. 8.9(b). The received symbol vectors in the i-th time instance for the first (ri,1)
and second channel use (ri,2) can be written, respectively, as follows:
ri, 1 ¼ Hsi, 1 ejðϕT ϕLO ÞþjϕCD ðkÞ þ ni, 1 , ri, 2 ¼ Hsi, 2 ejðϕT ϕLO ÞþjϕCD ðkÞ þ ni, 2 , ð8:57Þ
where the Jones (channel) matrix H, ri , 1(2) ¼ [rx , i , 1(2) ry , i , 1(2)]T denotes the
received symbol vector in the first (second) channel use of i-th time instance,
8.1 Diversity Techniques 595
Source
channels sx , –s*y
1 LDPC encoder
r1=k1/n
. . m MZM to fiber
. … . Interleaver Mapper PT-encoder DFB PBS PBC
. . mxn
MZM
m LDPC encoder
rm=km/n
sy , s*x
(a)
APP Demapper
From Coherent 1
PBS LDPC Decoder 1
PT-decoder
Calculation
SMF detector .
Bit LLRs
4
.
.
From Coherent
local laser
PBS
detector LDPC Decoder m m
(b)
Fig. 8.9 The architecture of PT coding scheme concatenated with LDPC coding for multilevel
modulations: (a) transmitter architecture and (b) receiver architecture
while ni , 1(2) ¼ [nx , i , 1(2) ny , i , 1(2)]T is the amplified spontaneous emission (ASE)
noise vector corresponding the first (second) channel use in the i-th time instance.
We use si , 1 ¼ [sx , i sy , i]T to denote the symbol transmitted in the first channel use of
i-th time instance and si , 2 ¼ [s∗y , i s∗x , i]T to denote the symbol transmitted in the
second channel use (of the same time instance). Because the symbol vectors
transmitted in the first and the second channel use of i-th time instance are
orthogonal, s+i , 1si , 2 ¼ 0, Eq. (8.57) can be rewritten by grouping separately x-
and y-polarizations as follows:
" # " #" # " #
r x, i , 1 hxx hxy s x, i n x, i , 1
¼ ejðϕT ϕLO ÞþjϕCD ðkÞ þ ,
r∗
x, i , 2 h∗
xy h∗
xx s y, i n∗
x, i , 2
" # " #" # " # ð8:58Þ
r y, i , 1 hyx hyy sx, i n y, i , 1
jðϕT ϕLO ÞþjϕCD ðkÞ
¼ e þ :
r∗
y, i , 2 h∗
yy h∗
yx sy, i n∗
y, i , 2
If only one polarization is to be used, we can solve either of Eq. (8.58). However,
the use of only one polarization results in 3 dB penalty with respect to the case when
both polarizations are used. Following the derivation similar to that performed by
Alamouti [10], it can be shown that the optimum estimates of transmitted symbols
at the output of PT-decoder, for ASE noise-dominated scenario, can be obtain as
follows:
~s x, i ¼ h∗ ∗ ∗ ∗
xx r x, 1 þ hxy r x, 2 þ hyx r y, 1 þ hyy r y, 2 ,
∗ ∗ ð8:59Þ
~s y, i ¼ hxy r x, 1 hxx r x, 2 þ hyy r y, 1 hyx r ∗
∗
y, 2 ,
where ~s x, i and ~s y, i denote the PT-decoder estimates of symbols sx,i and sy,i
transmitted in i-th time instance. In case that only one polarization is to be used,
596 8 Diversity and MIMO Techniques
say x-polarization, then the last two terms in Eq. (8.59) are to be omitted. For
additional details, an interested reader is referred to [11].
Multiple transmitters can be used to either to improve the performance though array
and diversity gains or to increase data rate through multiplexing of independent
data streams. In multiple-input multiple-output (MIMO) systems, the transmitters
and receivers can exploit the knowledge about the channel to determine the rank of
so-called channel matrix H, denoted as RH, which is related to the number of
independent data streams that can be simultaneously transmitted. In MIMO sys-
tems, we can define the multiplexing gain as the asymptotic slope in SNR of the
outage capacity:
Coutage, p ðρÞ
MG ¼ lim , ð8:60Þ
ρ!1 log2 ρ
X
MTx
yn ¼ hnm xm þ zn , ð8:61Þ
m¼1
where zn is the zero-mean Gaussian noise sample with variance σ 2 ¼ N0B, with N0/2
being the double-sided power spectral density and B being the channel bandwidth.
…
… hM Rx 2 hM Rx1
…
xM Tx hM RxM Tx yM Rx
y ¼ Hx þ z, ð8:62Þ
where x, y, and z represent the transmitted, received, and noise vectors defined as:
2 3 2 3 2 3
x1 y1 z1
6 x2 7 6 y2 7 6 z2 7
x¼6 7 6 7 6 7
4 . . . 5, y ¼ 4 . . . 5, z ¼ 4 . . . 5: ð8:63Þ
xMTx yMRx zMRx
As indicated above, channel noise samples zn are complex Gaussian with zero-
mean and covariance matrix σ2IMr, where σ2 ¼ N0B. If the noise variance is
normalized to one, the transmitted power P can be normalized as follows P/σ 2
¼ ρ, where ρ denotes the average SNR per receiver antenna, assuming
XMTx unity
channel gain. The total normalized transmitted power would be then m¼1
xi x∗
i
¼ ρ: The correlation matrix of transmitted vector x is given by Rx ¼ 〈xx{〉. The
trace of correlation matrix is clearly Tr(Rx) ¼ ρ. We use H ¼ ½hmn MTx MRx in
Eq. (8.63) to denote the so-called channel matrix:
2 3
h11 h12 . . . h1MTx
6 h21 h22 . . . h2MTx 7
H¼6
4 ...
7: ð8:64Þ
... ... ... 5
hMRx 1 hMRx 2 . . . hMRx MTx
On the other hand, in multimode fibers the light propagates in spatial modes, each
with different propagation constant and group velocity. The spatial mode excite-
ment at the fiber entrance depends on the launch conditions, while the conditions
during propagation depend on the initial conditions and the mode coupling, as
analyzed in Sect. 3.6.1. Since a single pulse of light that excites a number of spatial
modes, it arrives at the output of the multimode fiber as a sum of multiple pulses due
to the modal dispersion, an effect that resembles the multipath effect in wireless
communications. Therefore, different methods already in use in wireless commu-
nications are also applicable in this case including equalization (either in electrical
or optical domain), multicarrier modulation and OFDM, spread spectrum tech-
nique, diversity, and MIMO. Some of those methods have already been studied for
use in both point-to-point links and broadcasting/multicasting applications [14–
21]. The key disadvantage of MMF based MIMO is the problem of coupling
between too many modes, which makes it very complex to perform all calculations
needed when MIMO signal processing is applied. This is the reason why the
application of conventional MMFs is limited to short reach applications. However,
by using so-called few-mode fibers (FMF) and few-core fibers (FCF), the mode-
coupling-related calculations became simpler, which makes them as excellent
candidates for high-capacity long-haul transmission. An example of OFDM-
MIMO signal transmission over FMF/FCF, by employing both polarizations in
coherent detection scheme, is shown in Fig. 8.11. Figure 8.11a shows example of
MIMO system with MTx transmitters and MRx receivers, while for simplicity sake
we can assume that MTx ¼ MRx ¼ M. For FMF/FCF applications, we can interpret
this MIMO scheme as one employing M OAM modes. Since this system employs
both polarizations, it is able to carry 2 M independent two-dimensional (QAM) data
streams. The laser diode CW output signal is split among MRx branches, each
containing a transmitter, whose configuration is given in Fig. 5.45(b). Two inde-
pendent data streams are used as inputs to each branch OFDM transmitter. In fact,
we can assume that there exist two independent transmitters in each branch
(denoted as x and y), one aimed for transmission over x-polarization and the other
for transition over y-polarization. To convert OFDM signals to optical domain, I/Q
modulators are used. The optical OFDM signals from both polarizations are
combined by polarization beam combiner. The PDM data streams are further
mode-multiplexed, as illustrated in Fig. 8.11a, and transmitted over FMF/FCF-
based system of interest. At the receiver side, M different outputs from FMF/FCF
are used as inputs to M coherent receivers, after mode-demultiplexing is done. The
basic configuration of a coherent detector scheme is shown in Fig. 8.11c, with
additional details to be provided in OFDM chapter. One local laser oscillator is used
for all coherent receivers, to reduce the system cost. The in-phase (I) and quadrature
(Q) channel outputs from both polarizations are used as inputs to OFDM-MIMO
signal processing block. The use of OFDM elevates simultaneously the impacts of
chromatic dispersion, mode-coupling effects, and PMD. The scheme shown in
Fig. 8.11 can be used in both point-to-point and multipoint-to-multipoint applica-
tions. If optical MIMO system over FMF/FCF has MTx transmitters and MRx
receivers, the corresponding input-output relation can be expressed as:
8.2 MIMO Optical and Wireless Techniques 599
Data Data
1x 1y Output 1x
Coherent
Transmitter 1 receiver 1
Mode-demultiplexer
Mode-multiplexer
FMF/MMF Output 1y
(a)
Data ix RF OFDM transmitter x x-pol. state
I
Optical BD
I Q
From hybrid
I/Q Modulator ix PBS BD
FMF Q
From
transmit PBS PBC
laser From I
I/Q Modulator iy local PBS BD
Optical
laser
I Q hybrid
BD
Data iy RF OFDM transmitter y y-pol. state
Q
(b) (c)
Fig. 8.11 Coherent optical OFDM-MIMO over FMF/FCF: (a) system block diagram, (b) i-th
branch transmitter configuration, (c) coherent receiver configuration. PBS polarization beam
splitter, PBC polarization beam combiner, BD balanced detector. RF OFDM transmitter and
receiver configurations on the diagram are described in OFDM chapter
MTx X
X P
yn ðtÞ ¼ hmn ðkÞejωc ðtτp, k Þ xm t τg, k þ zn ðtÞ, ð8:65Þ
m¼1 k¼1
where yn(t) is the signal received by n-th receiver (n ¼ 1,2, ..., MRx), hmn(k) is the
channel gain from m-th transmitter through the k-th mode, while τp,k and τg,k denote
the phase and group delay associated with k-th mode, respectively. Also, ωc is the
optical carrier frequency, P is the number of spatial modes, zn presents the noise
process, while xm(t) denotes the transmitted signal originating from m-th transmit-
ter. We should notice that Eq. (8.65) deals with a single-polarization state. When
the group delay spread Δτg ¼ τg,Pτg,1 is small as compared to symbol duration, we
can assume that x(tτg,k) x(tτg), meaning that all paths arrive at approximately
the same time, which is valid if distance does not exceed a certain critical value.
The sampled baseband equivalent of function given by Eq. (8.65), with sampling
interval Ts, can be written in a matrix form as follows:
where
600 8 Diversity and MIMO Techniques
2 3 2 3
x1 ðlT s Þ y1 ðlT s Þ
6 7 6 7
xðlÞ ¼ 4 . . . 5 , yð l Þ ¼ 4 . . . 5,
xMTx ðlT s Þ yMRx ðlT s Þ
2 3 ð8:67Þ
z1 ðlT s Þ
6 7 XP
zðlÞ ¼ 4 . . . 5, ½ Hnm ¼ hnm ðkÞejωc τp, k :
zMR ðlT s Þ k¼1
We can assume that, based on previous results presented in [15], the number of
modes is large so that each transmitter/receiver launch/sample from sufficiently
different groups of modes and that the product of carrier frequency and phase-delay
spread is large enough to satisfy relationship ωcτp,k>>2π. In such a case, each
element in H structure can be considered as having a uniform distribution of phase.
Accordingly, the elements of H will have a complex Gaussian distribution, while
their amplitudes following Rayleigh distribution [1]. Accordingly, it is feasible
sending the estimated channel state information (CSI) back to transmitter since the
multimode channel transfer function varies at relatively slower rate as compared to
data rate that is being transmitted (Fig. 8.11a).
The group delays (GDs) among the spatial modes in FMFs is proportional to the
square root of link length if there is strong coupling among the spatial modes, which
is similar to dependence of the first-order PMD on the length of fiber link
[22, 23]. Accordingly, the model with optical fiber sections, used in analysis of
PMD coupling, can also be applied to FMF by presenting the total link length by the
number of independent fiber sections. By applying such a model, joint probability
density function (PDF) of GDs in FMF has been derived in [23]. The FMF is
divided into K sections, as shown in 8.12, and the coarse-step modeling method is
adopted, which is a standard technique for modeling the polarization effects in
single-mode fibers. The length of each section should be larger than the fiber
correlation length. Ideally, the section lengths should be randomly distributed, to
avoid periodic artifacts in the wavelength domain. Let us consider FMF operating
in strong mode-coupling regime. The propagation characteristics of k-th section of
FMF having D modes can be modeled by a D D channel matrix with terms Mk(ω)
given as [23, 24] (see also [7]):
X
MTx
yn ðlÞ ¼ xðlÞ I nm þ zn ðlÞ; n ¼ 1, . . . , MRx ; xðlÞ 2 f0; Ag, ð8:70Þ
m¼1
where A denotes the intensity of the pulse in the absence of scintillation and x(l )
denotes data symbol at the lth time slot. Inm represents the intensity channel
coefficient between the n-th photodetector (n ¼ 1,2,. . .,N ) and the m-th
(m ¼ 1,2,. . .,M ) optical source, which is described by the gamma-gamma
602 8 Diversity and MIMO Techniques
Optical Optical
transmitter 1 receiver 1
MIMO processing
…
…
Optical Optical
transmitter m receiver n
…
…
Optical Optical
transmitter MTx receiver MRx
Atmospheric turbulence
channel
(a)
The m-th data stream
EDFA
CL
Laser External
diode m modulator m OF
Expanding
telescope Light beam through
The m-th optical transmitter
turbulent channel
(b)
LO laser
diode n
I-channel
Optical BD
hybrid Q-channel
BD
Compressing
telescope The n-th optical receiver
(c)
Fig. 8.13 Optical MIMO scheme for FSO channels: (a) generic MIMO scheme, (b) m-th
transmitter configuration, and (c) n-th receiver configuration for coherent optical detection.
EDFA erbium-doped fiber amplifier, CL compressing lenses, OF optical fiber, BD balanced
detector
probability density function. The optical transmitters and receivers are positioned in
such a way that different transmitted symbols experience different atmospheric
turbulence conditions. In Eq. (8.70), zn denotes the n-th receiver TIA thermal noise
that is modeled as a zero-mean Gaussian process with double-side power spectral
density N0/2.
8.2 MIMO Optical and Wireless Techniques 603
The multiplexing gain of MIMO system, introduced by Eq. (8.60), originates from
the fact that a MIMO channel can be decomposed into a number of parallel
independent channels, so that the data rate can be increased RH-times, where RH
is the rank of the channel matrix H. Let us perform the singular value decomposi-
tion of channel matrix H given by Eqs. (8.64), (8.67), and (8.69). In singular value
decomposition of channel matrix, we have the following: (i) the ∑-matrix corre-
sponds to scaling operation; (ii) the columns of matrix U, obtained as eigenvectors
of the Wishart matrix HH{, correspond to the rotation operation; and (iii) the other
rotation matrix V has for columns of eigenvectors of H{H. The rank of matrix H
corresponds to the multiplexing gain. In FMF/FCF we can ensure the full rank of
channel matrix all the time by employing OAM eigenstates, which is not
guaranteed if regular multimode fiber links are employed.
The parallel decomposition of the optical channel, illustrated in Fig. 8.14, is
obtained by introducing the following two transformations to the channel input
vector x and channel output vector y: (i) transmit precoding, in which the input
vector of symbols x to transmitter is linearly transformed by pre-multiplying with
rotation matrix V, and (ii) receiver shaping, in which the receiver vector y, upon
optical coherent detection, is multiplied by rotation matrix U{. With these two
operations, we effectively performed the following manipulation:
y~ ¼ U{ ð|{z}
H x þ zÞ ¼ U{ UΣV{ V~
x þ U{ z ¼Σ~
x þ~z ð8:71Þ
|{z}
{
UΣV z~
and successfully decomposed the optical MIMO optical channel into RH ¼ rank(H)
parallel single-input single-output (SISO) channels. The equivalent optical channel
model is shown in Fig. 8.15.
If there is no concern about multiplexing gain, a simpler scheme known in
wireless communication literature as beam-forming [1–3] can be used instead. In
this scheme, illustrated in Fig. 8.16, the same symbol x, weighted by a complex
scale factor, is sent over all spatial modes. Therefore, by applying the beam-
forming strategy, the precoding and receiver matrices become just column vectors,
so it is V ¼ v and U ¼ u. The resulting received signal is now given by:
where with |||| we denoted the norm of a vector. When the optical channel matrix H
is known at the receiver side, the received SNR can be optimized by choosing u and
v as the principal left and right singular vectors of the channel matrix H, while the
corresponding SNR is given by σ 2maxρ, where σ max is the largest eigenvalue of the
Wishart matrix HH{. The channel capacity beam-forming scheme can be expressed
as C ¼ B log2(1 + σ 2maxSNR), which corresponds to the capacity of a single SISO
604 8 Diversity and MIMO Techniques
I/Q
Mode-demultiplexer
coherent
Mode-multiplexer
modulators
FMF/MMF detectors
Complex
x =V †x
…
…
y = U†y
…
symbols
x x y y
Fig. 8.14 The parallel decomposition of optical MIMO channel. The received vector y can be
written as y ¼ Hx + z (where we omitted the photodiode responsivity and load resistance terms for
simplicity of explanations), with z denoting the equivalent noise process
x2 y2
λ2 z2
…
…
xN yRH
λR zRH
H
channel having the channel power gain equal σ 2max. On the other hand, when the
channel matrix is not known, we will need to do maximization only with respect to
u. The array gain of beam-forming diversity is between max(MTx,MRx) and
MTxMRx, while the diversity gain equals MTxMRx.
The wireless MIMO channel can be parallelized in fashion similar to that shown
in Fig. 8.14, and this parallelization is illustrated in Fig. 8.17. Clearly, the parallel
wireless MIMO channel model is identical to that shown in Fig. 8.15. The
corresponding beam-forming strategy for wireless MIMO is shown in Fig. 8.18.
The symbol transmitted over the coherent MIMO optical channel with spatial
modes or over the wireless MIMO channel is rather a vector than a scalar since
8.2 MIMO Optical and Wireless Techniques 605
Transmitter Receiver
array Strong-coupling in FMFs/MMFs array
v1 u*1
Tx 1 Rx 1
h11
Mode-demultiplexer
h1M Tx
Mode-multiplexer
v2 u*2
x y
Tx 2 Rx 2
vM Tx uM* Rx
hM Rx 1
…
…
…
hM Rx M Tx
Tx MTx Rx MRx
Fig. 8.16 The beam-forming strategy in optical MIMO. Optical transmitter and receiver config-
urations are similar to those shown in Fig. 8.13(b, c)
Transmit
antennas Receive
I/Q antennas
mod.
…
Complex x =V †x y = U† y
…
…
…
symbols
x x y
y = Hx + z y
h11
v1 u*1
h1M Tx
v2 u*2
x y
hM Rx1 uM* Rx
…
vM Tx
hM RxM Tx
Y ¼ HX þ Z, ð8:73Þ
where
X ¼ ½x1 ; x2 ; . . . ; xNs ¼ Xij MTx Ns , Y ¼ y1 ; y2 ; . . . ; yNs ¼ Y ij MRx Ns ,
Z ¼ ½z1 ; z2 ; . . . ; zNs ¼ Zij MRx Ns :
ð8:74Þ
where R (MRx MRx) and T (MTx MTx) are Hermitian nonnegative definite
matrices. This model is applicable when the surrounding objects on transmitter and
receiver sides introduce the local antenna-elements correlations while not having
influence on the other end of the link [2, 26, 30, 37]. The channel matrix for
separately correlated model can be decomposed as:
X
Ns
X^ ¼ arg min
M N
kY HXk2F ¼ arg min
M N
kyi Hxi k2
X2X Tx s X2X Tx s
Ns 2
i¼1
ð8:78Þ
X
MRx X
XMTx
¼ arg min yni m¼1
h nm xmi ,
X2XMTx Ns
n¼1 i¼1
where the minimization is performed over all possible space-time input matrices X.
In Eq. (8.78), we use the operation kAkF to denote the Frobenius (Euclidean) norm
of matrix A ¼ [A]mn defined as:
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
X X
: pffiffiffiffiffiffiffiffiffiffiffiffiffi
kAkF ¼ ðA; AÞ ¼ Tr AA{ ¼ m
ja j2 ,
n mn
ð8:79Þ
where we use (A,B) to denote X the Xscalar product of matrices A ¼ [A]mn and
B ¼ [B]mn, defined as ðA; BÞ ¼ m
a b∗ . Because it is extremely difficult
n mn mn
to calculate the exact error probability, we employ the union bound [2]:
608 8 Diversity and MIMO Techniques
1 X X
^ ,
Pe P X ! X ð8:80Þ
j Xj X χ 6¼X
Y¼HXþZ
P X ! X^ ¼ Pr Y HX ^ 2 < kY HXk2 ¼
F
F
2
^
¼ Pr HX þ Z HX F < kHX þ Z HXk2F
0 2 1
B ^ þZ 2C
¼ Pr@H X X < kZkF A ¼ Pr kHD þ ZkF < kZkF ,
2 2
|fflfflfflffl{zfflfflfflffl}
D
F
ð8:81Þ
nX X
o2
¼ m n
½ H I mn ½ ZI nm þ HQ mn ZQ nm
XX D E D E
2 2
¼ ½HI 2mn ½ZI 2nm þ HQ nm ZQ nm
m n |fflfflfflfflffl{zfflfflfflfflffl} |fflfflfflfflfflffl{zfflfflfflfflfflffl}
N 0 =2 N 0 =2
N0 X X 2 N0
¼ ½HI 2mn þ HQ nm ¼ kHk2E ð8:83Þ
2 m n
2
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
kHk2E
By representing kHDk2F as kHDk2F ¼ Tr HDD{ H{ ¼ Tr H{ HDD{ , we can
conclude that after the spatial interference cancelation H{ H¼IMTx , and the PEP is
upper bounded by:
0sffiffiffiffiffiffiffiffiffiffiffi1
2
^ Q@ kDkF A:
P X!X ð8:85Þ
2N 0
Under Rayleigh fading assumption, in other words assuming that channel coef-
ficients are i.i.d. complex Gaussian Nc (0,1), the PEP will be upper bounded by:
0 1MRx
1
^ @
P X!X h iA : ð8:87Þ
{
det IMTx þ DD
4N 0
Given that the PDF of i.i.d. complex Gaussian entries of a random matrix A, of
size M N, is given by [2, 40]:
π MN exp Tr AA{ , ð8:88Þ
This result can be used to prove the following theorem [2, 41].
Theorem If A is a given M M Hermitian matrix such that IM + A > 0 and B is an
M N matrix whose entries are i.i.d. with Nc (0,1), then:
exp Tr ABB{ ¼ detðIM þ AÞN : ð8:89Þ
To prove this theorem, let us represent matrix B as follows: B ¼ [b1, b2, . . . , bN],
where bn denotes the n-th column of B. The expected value of exp[Tr(ABB{)] can
be determined with the help of Eq. (8.88) as follows:
Ð
exp Tr ABB{ ¼ π MN exp Tr ABB{ BB{ dB
Ð N ð8:90Þ
¼ π M exp Tr ðA þ IM Þbb{ db :
* " #+
^
Tr H{ HDD{
P X!X exp , ð8:91Þ
4N 0
and by directly applying (8.89), we derive Eq. (8.87). Because the determinant of a
matrix can be determined as the product of its eigenvalues, we can rewrite
Eq. (8.87) as:
!MRx
Y
MT x
1
^
P X!X , ð8:92Þ
λk
k¼1 1 þ 4N 0
where λk (k ¼ 1,2,. . .,MTx) are eigenvalues for DD{. Let us use K to denote the set of
nonzero eigenvalues, with the size of set corresponding to rank of DD{. For
sufficiently high SNR, defined as γ ¼ 1/4N0, the inequality (8.92) simplifies to:
!MRx
Y
jKj
^
P X!X λk γ MRx jKj : ð8:93Þ
k¼1
The first term in PEP upper bound is independent on SNR while dependent of
product of eigenvalues of DD{ as well as power MRx. Because this term is
independent of SNR, it does not change the slope of PEP but rather shifts the
PEP curve to the left; in similar fashion as channel code, it can be rated to the
coding gain of the space-time code. To improve the coding gain, we need to
maximize the minimum of the determinant of DD{ over all possible pairs X, X ^;
we refer to this criterion as the determinant criterion. On the other hand, the second
term is SNR dependent, and the cardinality of K affects the slope of PEP curve
indicating that diversity gain is given by MRx jKj. Thus, to maximize the diversity
gain, we have to design space-time code on such a way that the matrix DD{ is of full
rank equal to MTx, and we refer to this design criterion as the rank criterion. When
DD{ is of the full rank we can write:
Y
MTx
λk ¼ det DD{ , ð8:94Þ
k¼1
and the necessary condition for matrix DD{ to be of the full rank is that space-time
code block length must be equal or higher than the number of transmit antennas.
The determinant in Eq. (8.87) can be written as follows:
det IMTx þ γDD{ ¼ 1 þ γTr DD{ þ þ γ MTx det DD{ : ð8:95Þ
Clearly, for small SNRs with γ<<1, the determinant and consequently PEP
depend predominantly on Tr(DD{), in other words on Euclidean distance squared
between X and X.^ This is the reason why the space-time code design criterion based
8.2 MIMO Optical and Wireless Techniques 611
When the SNR increases at the same rate as the number of receive antennas, the
rank and determinant criteria are applicable. On the other hand, when SNR is fixed
and finite, the Euclidean distance criterion should be used instead.
in which, during the first time interval, symbol x1 is transmitted using spatial mode
(antenna 1) 1, while symbol x2 occupies the spatial mode (antenna) 2. In the second
time interval, the symbol x∗ 2 is transmitted by spatial mode (antenna) 1, while the
symbol x∗ 1 goes over spatial mode (antenna) 2. The corresponding spatial-mode/
antenna channel matrix for two transmit modes (antennas) and two receive modes
(antennas), as illustrated in Fig. 8.19, can be written as:
h11 h12
H¼ : ð8:100Þ
h21 h22
The received current signals after coherent optical detection as well as the
receive antenna outputs can be organized in matrix form as follows:
y11 y12 h h12 x1 x∗ z11 z12
¼ 11 2 þ
y21 y22 h21 h22 x2 x∗ z21 z22
1
ð8:101Þ
h11 x1 þ h12 x2 þ z11 h11 x∗ þ h12 x∗
1 þ z12 :
¼ 2
h21 x1 þ h22 x2 þ z21 h21 x∗ ∗
2 þ h22 x1 þ z22
h11
h21
x1
h12
x1,x2
Transmitter Combiner
h22 x2
Fig. 8.19 The Alamouti scheme for two transmit and two receive antennas
8.2 MIMO Optical and Wireless Techniques 613
The received signal in the Alamouti code with two transmitters and one receiver
can be rewritten in the following form:
y1 ¼ h1 x1 þ h2 x2 þ z1 ,
∗ ∗ ð8:103Þ
y∗
2 ¼ h1 x2 þ h2 x1 þ z2 :
∗
and the spatial interference is successfully compensated for. By using the Alamouti
design, we were able to determine the modified channel matrix H ~ orthogonal to the
2 2
channel matrix H up to the multiplication constant |h1| + |h2| . This is the reason
why the Alamouti code belongs to the class of orthogonal designs.
Another interesting example of orthogonal design for MTx ¼ 3, MRx ¼ 1, and
Ns ¼ 4 is given by the code matrix:
2 3
x1 x∗2 x∗3 0
X ¼ 4 x2 x1∗
0 x∗3
5: ð8:106Þ
x3 0 x∗
1
∗
x2
2 3 2 3 2 3 2 3
y1 h1 x 1 þ h2 x 2 þ h3 x 3 z1 h1 h2 h3 2 3
6 y∗ 7 6 ∗ ∗ 7 6 ∗7 6 ∗ ∗ 7 2 3 z1
6 2∗ 7¼6 h x þ h x z
7 6 2 7 6 2 h h 0 7 x1
4 y 5 4 h∗ x3 þ h∗ x1 5 þ 4 z∗ 5 ¼ 4 h∗
1 2 2 1 1
∗5 6 z∗ 7
0 h1 4 x2 5 þ 6 2∗ 7
3
∗
1
∗
3
∗
3
∗
3
∗ ∗ 4z 5
y4 h2 x3 þ h3 x2 z4 0 h h2 x3 3
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl3{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl
ffl} |fflffl{zfflffl} z∗
H~ x |fflfflffl{zfflffl
4
ffl}
^
z
~ þ ~z :
¼ Hx
ð8:108Þ
and the spatial interference is compensated for. Because three symbols are trans-
mitted in four symbol interval, the code rate of this space-time code is 3/4 signal per
channel use, which is smaller than in Alamouti scheme whose rate is 1. Moreover, it
has been shown in [42] that the code rate of orthogonal designs with the number of
transmit antennas larger than two cannot exceed 3/4. However, by concatenating a
linear encoder with a layered space-time mapper, it is possible simultaneously to
achieve the full diversity and full rate for any number of transmit and receive
antennas as shown in [43].
The Alamouti code belongs to the class of linear space-time block codes [12]. In
linear space-time codes, the L symbols x1,x2,..,xL are transmitted by using MTx
transmitters in Ns time intervals, and their code matrix has the form [2]:
X
L
X¼ ðal Al þ jbl Bl Þ, al ¼ Refxl g, bl ¼ Imfxl g, ð8:109Þ
l¼1
where Al and Bl are the complex matrices of dimension MTx Ns. For instance, the
Alamouti code can be expressed in the following form:
x1 x∗ a1 þ jb1 a2 þ jb2
X¼ 2 ¼
x2 x∗
1
a2 þ jb2 a1
jb1
ð8:110Þ
1 0 1 0 0 1 0 1
¼ a1 þ jb1 þ a2 þ jb2 :
0 1 0 1 1 0 1 0
~ ¼ ½ a1 b1 . . . aL bL T :
x ð8:111Þ
Let the noise vector ~z be obtained by stacking the columns of the noise matrix Z
on the top of each other, and we denote this manipulation by ~z ¼vectðZÞ. By using
the same manipulation, the received matrix Y can be then converted to received
vector y~ as follows:
X
L
y~ ¼ vecðYÞ ¼ vecðHXþZÞ ¼ ðal vecðHAl Þ þ bl vecðjHBl Þ Þ
l¼1
~x
¼H ~ þ ~z , ð8:112Þ
~ is defined as:
wherein L NsMRx, and the modified channel matrix H
~
We now perform the QR-factorization of H:
~ R,
~ ¼Q
H ~ ð8:114Þ
with Q~ being the unitary matrix and R~ being the upper triangular matrix. By
~ { form the left, we obtain:
multiplying both sides of MIMO Eq. (8.112) by Q
~ { y~¼R
Q ~x ~ { ~z ,
~þQ ð8:115Þ
~x
wherein the last entry in R ~ is proportional to bL and can be detected. The next-to-
last entry is a linear combination of aL and bL; since bL has already been detected,
the aL can be detected as well. The third from last entry is a linear combination of
bL-1, aL, and bL so that can be bL-1 detected. This iterative procedure is conducted
until all L symbols get detected. For the best performance, it is a good idea to
rearrange the received symbols according to SNRs so that the received symbol with
highest SNR is placed at the bottom. This approach has certain similarities with
so-called Bell Labs Layered Space-Time (BLAST) architecture [29].
Time instances
Input symbols: 0 1 2 3 t t+1 States
00 01 02 03 1
output symbols
Encoded
10 11 12 13 2
20 21 22 23 3
30 31 32 33 4
(a)
Input symbols: 0 1 2 3 t t+1 States
00 01 02 03 1
10 11 12 13 2
Encoded output symbols
20 21 22 23 3
30 31 32 33 4
22 23 20 21 5
32 33 30 31 6
02 03 00 01 7
12 13 10 11 8
(b)
Fig. 8.20 QPSK trellis space-time code with MTx ¼ 2 and diversity of 2MRx: (a) four-state STTC
and (b) eight-state STTC
8.2 MIMO Optical and Wireless Techniques 617
antenna and the second symbol on the second antenna. The trellis with larger
number of states for the same modulation format and the transmit antennas repre-
sents a stronger STTC in BER sense.
Assuming an ideal channel state information (CSI) and that the path gains hnm
(m ¼ 1, . . ., MTx; n ¼ 1, . . ., MRx) are known to the detector, the branch metric for a
transition labeled x1t x2t . . . xM
t
Tx
is given as:
2
MRx
X
n X
MTx
m
yt hnm xt , ð8:116Þ
n¼1
m¼1
where ytn is the received signal at n-th receiver at the time instance t. The Viterbi
algorithm [27] is further used to compute the path with the lowest accumulated
metric. Clearly, the trellis space-time codes can achieve higher code rates than
orthogonal designs and other linear space-time block codes; however, the receiver
complexity grows exponentially as the number of transmit antennas increases.
Rich-scattering
channel
1 h11 1
1 x1 x1 1
h1M Tx
(Serial-to-parallel converter)
(Parallel-to-serial converter)
STC 2 2 STC
encoder decoder
Demultiplexer 1:L
Multiplexer L:1
SDM detector
2 + x2 x2 + 2
Incoming
Channel hM Rx 1 Channel
…
…
data stream
encoder decoder
…
MTx MRx
+ +
L
Modulation hM Rx M Tx Demodulation
L
xM Tx xM Tx
shown in Figure), serving as an outer code. The encoded data stream is forwarded to
1: L demultiplexer, where serial-to-parallel conversation takes place. The key
transmitter performs simultaneously STC encoding, inner channel encoding, and
modulation process thus performing L to MTx mapping. The m-th (m ¼ 1,2, . . .,
MTx) transmit antenna emits the symbol xm. These MTx symbols are transmitted
over wireless MIMO channel of interest such as rich-scattering cannel, described by
the channel matrix H (see Eq. 8.64). The maximum number of independent streams
is determined by the rank of channel matrix RH ¼ rank(H), as described in Sect. 2.2,
which is upper bounded by RH min(MTx, MRx). In order to properly detect
independent data streams, typically the number of receive antennas must be larger
than the number of transmitted antennas so that the maximum possible number of
independent data streams is upper bounded by MTx. Let RTx denotes the code rate of
both outer and inner channel codes (obtained as a product of individual code rates),
and then the spectral efficiency (SE) of the SDM scheme is upper bounded by:
where M is the signal constellation size (assuming that all independent data streams
employ the same constellation size). At the receiver side, each receive antenna
detects the complex linear combination of signal from all transmit antennas, as
illustrated by Eq. (8.61). The purpose of SDM detector is to compensate for spatial
interference and provides accurate estimates of transmitted symbols. The SDM
detector configurations are subject of study in incoming sections, which are more
general and applicable not only SDM scheme but also STC and uncoded MIMO
schemes.
The main purpose of this section is to introduce relevant SDM schemes and
describe their transmitter configurations. After SDM detection, demodulation takes
place, followed by STC decoding and inner channel decoding. The L estimated data
streams are multiplexed together, and the corresponding output is passed to outer
channel decoder, which delivers estimated information sequence to the end users.
The corresponding SDM scheme relevant in optical communications has already
been described in Sects. 2.1 and 2.2; see, for example, Fig. 8.11, with details related
to STC and channel coding omitted. Here we briefly describe one of SDM schemes
introduced in [28]. Mode-multiplexed four-dimensional (4-D) coded modulation
system architecture is shown in Fig. 8.22a.
Given that this scheme is based on FMF, the full rank of channel matrix can
easily be achieved so that we can write MTx ¼ MRx ¼ N. The corresponding 4-D
modulator and 4-D receiver configurations are depicted in Fig. 8.22b, c. The
m ¼ log2(M )-independent streams of information are encoded using LDPC codes
of code rates ri ¼ ki/n (i ¼ 1, . . ., m) where ki and n represent the information block
length and codeword length, respectively. The codewords are written row-wise into
block-interleaver, while m bits at every symbol interval read column-wise from the
block-interleaver. These m-bits are used to determine four coordinates of the
corresponding signal constellation point stored inside the LUT. The N 4-D streams
are combined together using the mode-multiplexer and transmitted over FMF
8.2 MIMO Optical and Wireless Techniques 619
4DTx 1
2m-ary source
… 4D Tx/Rx: Four-dimensional transmitter/receiver
4-D mapper
m bits
4-D modulator 4-D Rx 1
Laser Power Mode- Mode-
…
…
…
diode splitter multiplexer demultiplexer
FMF
4D Tx MTx 4-D Rx MRx
m bits
(a)
Qx,i Ix,i
3 dB MZM
MZM π/2
From DFB/ to fiber/power
PBS PBC
power splitter combiner
MZM π/2
MZM: Mach-Zehnder modulator
MZM PBS(C): polarization-beam splitter
4D modulator (combiner)
Qy,i Iy,i
(b)
Extrinsic LLRs
Balanced ADC
Mode-
PBS coherent 1
Calculation
detector ADC
APP
…
Balanced ADC demapper
Local laser coherent LDPC Decoder m m
PBS
diode detector ADC
(c)
Fig. 8.22 Mode-multiplexed 4-D coded modulation scheme for FMF-based optical communica-
tion systems: (a) overall transmitter configuration, (b) 4-D modulator configuration, and (c)
receiver configuration
In the rest of this section, we will describe the family of Bell Laboratories Layered
Space-Time (BLAST) [29–32] architecture, followed by multigroup space-time
coding techniques. These techniques are applicable to both wireless MIMO
620 8 Diversity and MIMO Techniques
modulator 1
…
Demultiplexer 1:MTx
m
Incoming I/Q
TD encoder
data stream & symbol mapper modulator m
…
…
MTx
I/Q
modulator MTx
Antennas
H-BLAST encoding architecture
1
TD encoder 1 I/Q
& symbol mapper modulator 1
…
…
m
Incoming
Demultiplexer 1:MTx TD encoder m I/Q
data stream (Serial-to-parallel conv.) & symbol mapper modulator m
…
…
MTx
TD encoder MTx I/Q
& symbol mapper modulator MTx
Stream
Incoming
…
Demultiplexer 1:MTx TD encoder m I/Q rotator
MTx
data stream (Serial-to-parallel conv.) & symbol mapper modulator m
…
Fig. 8.25 The illustration of D-BLAST architecture of encoder. TD time domain (temporal)
Even though that D-BLAST scheme archives full diversity, for sufficiently long
codewords, there are many unused space-time dimensions, denoted by zeros in
622 8 Diversity and MIMO Techniques
Eq. (8.118). This problem can be solved by so-called threaded space-time archi-
tecture, in which the symbols are distributed in the codeword matrix on such a way
to achieve full spatial span MTx (to guarantee desired spatial diversity order) and
full temporal span Ns (to guarantee desired temporal diversity order to deal with fast
fading effects). The key idea is to properly fill symbols from previous and incoming
codewords so that there are no zero symbols in X.
X
g X
g
bi ¼ b, mi ¼ MTx : ð8:119Þ
i¼1 i¼1
m1
…
…
component
…
Demultiplexer 1:MTx
channel
data stream encoder bg mg
Space-time I/Q mod.
MTx
…
…
component
…
where the i-th (i ¼ 1,2,. . .,g) code Ci codeword matrix is given by:
2 3
xm1 þmi1 þ1, 1 xm1 þmi1 þ1, N s
X Ci ¼ 4 ⋮ ⋮ 5: ð8:121Þ
xm1 þmi1 þmi , 1 xm1 þmi1 þmi , Ns
where HCi is the submatrix corresponding to the i-th space-time component code of
dimensions MRx mi. The corresponding MIMO channel model is given by
Y ¼ HX + Z, as for STCs. The truncated channel matrix in which the first
m1 + . . . + mi columns are omitted can be defined as:
HCC1, 2..., i ¼ HCiþ1 HCiþ2 H Cg : ð8:123Þ
Based on Fig. 8.26, we conclude that the rank of HCC1 is upper bounded by
rankðHC1 Þ MTX m1 : The dimensionality of the null space of HCC1 ,
NullðHCC1 Þ, and rank of HC1 are related to [34, 35]:
Therefore, the dimensionality of the null space of HCC1 is lower bounded by:
Let the set of orthonormal vectors spanning the null space of HCC1 be denoted
as v1 ; v2 ; ; vMRx ðMTX m1 Þ : Let us arrange the vector as the rows of the Hermitian
matrix Θ, which reminds us to the parity-check matrix of a linear block code:
624 8 Diversity and MIMO Techniques
2 3
v1
:6 v2 7
ΘCC1 ¼6
4
7:
5 ð8:126Þ
⋮
vMRx ðMTX m1 Þ
Because vectors vi span the null space HCC1 , they are orthogonal to HCC1 , and
we can write:
Decoding at the receiver side is performed in an iterative fashion. The key idea
of decoding process is to decode each code separately while suppressing the spatial
interference from other component codes. Because space-time code C1 employs m1
antennas, the signals from remaining MTxm1 antennas represent the spatial inter-
ference in decoding process for C1. The zero-forcing (ZF) spatial interference
approaches described below can be employed. Let us multiply the received matrix
from the left by ΘCC1 to obtain:
ΘCC1 Y ¼ ΘCC1 ð H
|{z} X þZÞ ¼ ΘCC1 ðHX þ ZÞ
|{z}
HC1 HCC1 XC1
XCC1
~
¼ ΘCC1 HC1 XC1 þ Z, ð8:128Þ
and we have been able to successfully compensate for the spatial interference from
other groups of STCs, in other words the intergroup spatial interference. We can
~C ¼:
denoted this result by Y 1
ΘCC1 Y. The transmitted block can now be estimated to
minimize the Euclidean distance squared derived from (8.128):
2
^C
X ¼ arg min ΘCC1 Y ΘCC1 HC1 XC1
: ð8:129Þ
1
fX C 1 g |fflfflfflffl{zfflfflfflffl}
Y~ C
1 F
^C :
Y C1 ¼ Y H C1 X ð8:130Þ
1
8.2 MIMO Optical and Wireless Techniques 625
In similar fashion as for C1, we can now multiply YC1 by anther matrix whose
rows span null space of HCC1, 2 , denotes as ΘCC1 , to obtain:
0 1
B C
B C
B C
B C
~ : ^ B ^ C
Y H C1 X C1 ¼ ΘCC1, 2 B
Y C2 ¼ΘCC1, 2 YC2 ¼ ΘCC1,2 |{z} H
|{z} X
|{z} þZ HC1 X C1 C
B 2 3 C
HXþZ B H H H C
B C1 C2 CC1, 2 XC1 C
@ 4 XC2 5 A
XCC1, 2
^C
¼ ΘCC1, 2 HC1 XC1 þ ΘCC1,2 HC2 XC2 þΘCC1,2 HCC1, 2 XCC1,2 þ ΘCC1, 2 Z ΘCC1, 2 HC1 X
|fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl} 1
¼0
^ C þ ΘCC HC XC þ ΘCC Z,
¼ ΘCC1,2 HC1 XC1 X 1 1, 2 2 2 1, 2
ð8:131Þ
indicating that the spatial interference from other groups is canceled providing that
X C1 ’ X^ C . The ML estimate of X^ C can be determined as follows:
1 2
X^ C2 ¼ argmin Y ~ C ΘCC HC XC 2 :
2 1, 2 2 2 F
ð8:132Þ
fXC2 g
The i-th codeword (i > 2) is estimated by first canceling the spatial interference
originating from the (i-1)-st STC:
Then
we need
to determine the orthonormal basis vectors that span
Null HCC1, 2, ..., i , which are arranged as the rows of the matrix denoted by
ΘCC1, 2, ..., i . We now multiply YCi1 with ΘCC1, 2, ..., i from the left side to obtain:
:
~C ¼
Y ^C
ΘCC1, 2, ..., i YCi1 ¼ ΘCC1, 2, ..., i YCi2 HCi1 X ¼
i i1
X
i1
¼ ΘCC1, 2, ..., i HCi XCi þ ΘCC1, 2, ..., i HCj XCj X^ Cj þ ΘCC1, 2, ..., i Z,
j¼1
ð8:134Þ
which indicates that the spatial interference from all other previous groups
( j ¼ 1,2,. . .,i-1) is canceled out providing that the following is valid XCj X^ Cj¼0 .
The ML estimate of X^ Ci can be determined as follows:
2
^ C ¼ argmin Y
X ~ C ΘCC HCi XCi F ; i ¼ 2, 3, , g: ð8:135Þ
i i 1, 2, ..., i
fXCi g
626 8 Diversity and MIMO Techniques
We will now discuss several suboptimum strategies [2, 7, 26], in order to reduce the
ML detector complexity. We will start our discussion with linear and decision-
feedback receivers, applied to the schemes without space-time coding. The key idea
behind linear receivers is to perform certain linear processing operation on received
vector so that the transformed channel matrix does not have off-diagonal elements,
which is:
The union bound for the error probability in this case is given by:
1X X
Pe x ^
x
P x ! x^ , ð8:137Þ
M
where d¼x x, ^ while (a,b) denotes the dot-product of vectors a and b. Since
Var{(Az, d)} ¼ N0kA{dk2, the PEP becomes:
* 0v
u
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi1+
ukdk2 þ 2ððAH-IÞx; dÞ
^ ¼ Q@t
P X!X 2 A : ð8:139Þ
2N 0 A{ d
In the zero-forcing receiver, the linear matrix A is chosen to have the form:
8
< Σþ
V U{ , MRx MTx
A¼Hþ ¼ 0 , Σþ ¼ diag σ 1 1 1
1 ; σ 2 ; . . . ; σ p ; 0; . . . ; 0
:
V½ Σþ 0 U{ , MRx > MTx
pffiffiffiffi
H ¼ U½ Σ 0 V{ ; σ 1 σ 2 . . . 0, σ i ¼ λi , Σ ¼ diagðσ 1 ; σ 2 ; . . . ;Þ
U ¼ eigenvectors HH{ , V ¼ eigenvectors H{ H ,
ð8:140Þ
{ 1 1
H þ ðH þ Þ ¼ H { H ) Hþ ¼ H{ H H{ , ð8:141Þ
Hþ y ¼ x þ Hþ z: ð8:142Þ
N0 n { þ þ { o N0 n { þ 2 1 o
VarfðHþ z; dÞg ¼ Tr d H ðH Þ d ¼ Tr d ðH HÞ d , ð8:143Þ
2 2
where SNR ¼ E/N0 is the signal-to-noise ratio for the average energy E of one
component of vector x.
The last method to be described in this subsection is related to decision-feedback
receivers, which is similar to that described in section on linear space-time block
codes. The key idea is to perform preprocessing of H by QR-factorization H ¼ QR,
Q{ Q ¼ IMTx , so that we can transform the received vector as:
y~¼Q{ y ¼ Rx þ Q{ z, ð8:145Þ
wherein the transformed noise vector retains the properties of z. Since R is an upper
triangular matrix, we can perform the following optimization:
In this section we study linear detector strategies, such as zero-forcing and linear
MMSE (LMMSE) interfaces [2, 7, 26] but described in the context of space-time
coding.
Similarly as in previous section, the key idea behind linear receivers is to perform
linear transformation A(H) on received matrix so that the spatial interference is
canceled:
~
Y¼A ðHÞY ¼ AðHÞHX þ AðHÞZ: ð8:147Þ
Hþ Y ¼ X þ Hþ Z: ð8:149Þ
The Euclidean metrics is given by kHþ Y XkF , and based on Eq. (8.121), we
2
N0 n { þ 2 1 o
VarfðHþ Z; DÞg ¼ Tr D ðH HÞ D : ð8:151Þ
2
where the third line in above equation originates from the i.i.d. zero-mean assump-
tion of X, whose second moment is denoted by ρ. By setting the MSE variation with
respect to A to be zero [2], i.e.,
n h i
δðMSEÞ ¼ Tr δA ρHðAH IMTx Þ{ þ N 0 A{ þ ρðAH IMTx ÞH{ þ N 0 A δA{ ¼ 0,
ð8:153Þ
ð8:155Þ
When SNR tends to plus infinity, we obtain the same result as in zero-forcing
receiver, as it was expected.
When number transmitters is fixed and finite, while the number of receiver tends
to plus infinity, as discussed earlier, the spatial interference/mode coupling is
compensated for, and we can write H{ H ! IMTx . Therefore, in this case there is
no performance loss with respect to ML detector. On the other hand, when number
of both transmitters and receivers tends to plus infinity by their ratio is constant
MTx/MRx !c > 0, the corresponding PEP tends to [2]:
630 8 Diversity and MIMO Techniques
0sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi1
MTx !1, MRx !1 MRx kDk2 A
P X ! X^ ! Q@ j1 cj , ð8:156Þ
MTx =MRx !c 2N 0
indicating that there is a performance loss with respect to ML detector. For the same
PEP the SNR loss is 10log10|1-c|1 [dB].
For sufficiently high SNRs and when the level of spatial interference/mode
^ X so that we can use the
coupling is not to high, the following is valid X
{ { D E
following two approximations XX XX , X^ X
^ ^ { XX{ , and after
employing them in (8.137), we obtain:
D E
MSEðA; BÞ ¼ kðAH B IMTx ÞXk2F
D n oE
¼ Tr ðAH B IMTx Þ{ ðAH B IMTx ÞXX{ ð8:158Þ
{
XX ¼ N s ρIMTx D E
¼ N s ρ kAH B IMTx k2F :
By representing the channel matrix as H ¼ QR, the MSE becomes for the
following values for matrices A and B:
AZF V-BLAST ¼ diag1 ðRÞQ{ , BZF V-BLAST ¼ diag1 ðRÞR IMTx , ð8:159Þ
where matrix B is strictly upper triangular ([B]mn ¼ 0, m n). The soft estimate of
this receiver, based on Fig. 8.26, is given as:
~ ¼ diag1 fRgQ{ Y diag1 fRgR{ IM X
Y ^
Tx
ð8:160Þ
¼Xþ diag fRgR IMTx D þ diag fRgQ{ Z,
1 { 1
where the first term is useful term, the second term corresponds to remain mode-
coupling fractions from other modes to the observed mode, while the last term is the
colored Gaussian noise.
In MMSE V/H-BLAST, we minimize the MSE by taking into account the
presence of additive noise:
D E D E
MSEðA; BÞ ¼ Y ~ X2 ¼ kAY BX Xk2
F
n F
o
¼ E kðAH B IMTx ÞXþAZk2 ð8:161Þ
n o
¼ N s ρ kAH BX IMTx k2 þ SNR1 kAk2 , SNR ¼ ρ=N 0 :
The minimization of the MSE is performed into two steps. We first minimize
MSE with respect to A to obtain:
1
AMMSE ¼ ðB þ IMTx Þ H{ H þ SNR1 IMTx H{ : ð8:162Þ
In the second step, the remaining MSE is then minimized over MTx MTx
strictly upper triangular matrices ([B]mn ¼ 0, m n) by the Cholesky factorization
[2, 26] of
632 8 Diversity and MIMO Techniques
The minimum is obtained when ðB þ IMTx ÞS1 ¼ diag S1 : In conclusion, the
matrices A and B minimizing the MSE in the presence of noise are given as follows:
where the first term is a useful term, the second term corresponds to residual mode
coupling from other modes to the observed mode, and the last term is the colored
Gaussian noise.
Because in both cases, the matrix B is strictly upper diagonal, the steps in
V-BLAST algorithms can be summarized as follows [2]. We use [A]m to denote
the m-th row in A and [A]mn to denote
the m-th row and n-th column. We first solve
for the MTx-th row in X^ from Y ~ ¼ ½AYMTx : Then we solve (MTx1)-th row in
MTx
^ ~
X from Y MTx 1 ¼ ½AYMTx 1 ½BMTx 1, MTx X ^ : Since the MTx-th and
MTx
(MTx1)-th rows are known, the (M 2)-th row in X^ can now be determined
Tx
~ ¼ ½ ½ ^ ½ ^
from Y MTx 2
AY MTx 2 B MTx 2, MTx X Mt
B MTx 2, MTx 1 X MTx 1 : We
^
continue this iterative
procedure, until we reach the first row in X, which is
~ ^
determined from Y 1 ¼ ½AY1 ½B1, MTx X MTx . . . ½B1, 2 X 2 . ^
The receiver in D-BLAST architecture first detects x11 symbol that does not
suffer from spatial interference. Then symbol x12 is detected, which suffers from
spatial interference from symbol x21, which can be compensated for by a
zero-forcing equalizer. This procedure is continued until all symbols for codeword
x1 are detected. Once all symbols of codeword x1 get detected, their contributions
get subtracted from the next received word corresponding to codeword x2 and so
forth.
8.3 Iterative MIMO Receivers 633
Y(
l+1)
= Y ( ) − BXˆ
l
Y( ) +
l
- B = AH − diag ( AH )
X̂ Decision
B A = diag−1 ( R ) Q †
circuit
Yet another scheme of canceling out the spatial interference in wireless MIMO
systems and mode-coupling FMF/MMF links in an iterative fashion is illustrated in
Fig. 8.28. This scheme is suitable for compensation of spatial interference in fading
channels. A similar scheme has been proposed in [44] to deal with PMD effects in
polarization division multiplexing coherent optical systems. The key idea behind
this scheme is to cancel the spatial interference/mode coupling in an iterative
fashion. The iterative mode-coupling cancelation algorithm can be formulated as
follows.
~ ð0Þ ¼ 0, Y
Step 0 (initialization): Set A ¼ diag1 ðRÞQ{ , X ~ ð0Þ ¼ Y:
ðk Þ
Step 1 (horizontal update rule): X ^ ¼ arg min Y
ðk Þ ~ X2 :
X
Step 2 (vertical update rule): Y~ ðkþ1Þ ¼ Y
~ ðAH diagðAHÞÞX ^ ðkÞ :
We have to iterate the steps 1 and 2 until the convergence.
It can be shown that in the absence of nonlinearities and for moderate SNRs X^ ðkÞ
converges to transmitted X.
Factor graphs are suitable to describe the factorization of a global function as the
product of local function, with each local function being a product of subset of the
variables. As an illustration let us consider maximum a posteriori probability
(MAP) detection/decoding problem. Let x denote the transmitted sequence of
length N and y the received sequence. The optimum receiver (in symbol error
634 8 Diversity and MIMO Techniques
probability sense) assigns x^n to the value x from the signal set X that maximizes the
APP P(xn ¼ x|y) given the received sequence y as follows:
This maximization is easy to perform once the APP functions f(xn|y) are known.
Assuming that conditional PDF f(x|y) is known, the APP functions f(xn|y) can be
determined as follows:
X X X X X
f ðxn jyÞ ¼ x x
x x
x f ðxjyÞ: ð8:169Þ
1 2 n1 nþ1 N
Clearly, the summation in Eq. (8.169) is performed over all variables except
variable xn, and we can denote this summation as
xn so that we can rewrite
Eq. (8.169) as:
X
f ðxn jyÞ ¼
x
f ðxjyÞ: ð8:170Þ
n
x1 x1 x1,
x2 g1 g2 x3 x2 g1 = g2 x3
x1,,
g3 g3
x4 x4
(a) (b)
Fig. 8.29 The factor graph of f(x1, x4) ¼ g1(x1, x2)g2(x1, x3)g3(x1, x4): (a) non-normal form and
(b) normal form
The factor graph composed only of nodes, edges, and half-edges is known as
normal graph. The normal graph for graph shown in Fig. 8.29a is shown in
Fig. 8.29b. This normal graph contains the repetition node ¼ , which repeats the
same variable multiple times. This repetition node can be also represented in terms
of so-called Iversion function, denoted by [P] with value 1 when proposition P is
true, and zero otherwise:
: 1, P is true
½P¼ : ð8:173Þ
0, P is false
The repetition function for three arguments, denoted as f¼, can be now defined
as:
:
f ¼ x1 ; x,1, ; x,1, ¼ x1 ¼ x,1, ¼ x,1, : ð8:174Þ
Let us now observe the MIMO channel, given by Eq. (8.62), namely, y ¼ Hx + z.
Providing that the number of transmit antennas (optical transmitters) is MTx and the
number of receive antennas (optical receivers) is MRx, the output-input relationship
can be described in terms of conditional PDF:
636 8 Diversity and MIMO Techniques
h i Y
MRx Y
MRx
f ðyjxÞ ¼ Cexp ky Hxk2F =N 0 ¼ C exp jyn hn xj2 ¼ C f ðyn jxÞ,
n¼1 |fflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} n¼1
f ðyn jxÞ
ð8:176Þ
where C is the normalization constant and we use hn to denote the n-th row of H,
namely hn ¼ [H]n. The corresponding factor graph of this MIMO channel is shown
in Fig. 8.30.
In linear intersymbol interference (ISI) channel, the output (N+ μ)-component
vector y and the input N-component vector x are related to the discrete-time
convolution:
X
μ
yn ¼ hk xnk þ zn , ð8:177Þ
k¼0
where μ is the channel memory; h0, h1,..,hμ are channel coefficients; while zn is a
zero-mean Gaussian noise sample. The matrix representation of Eq. (8.177) is given
by:
y ¼ Hx þ z, ð8:178Þ
ð8:179Þ
which is very similar to Eq. (8.176), and not surprisingly the corresponding factor
graph shown in Fig. 8.31 is very similar to one shown in Fig. 8.30.
When the channel model is memoryless, μ ¼ 0, yn ¼ h0xn + zn, the conditional
PDF is simply:
Y
N
f ðyjxÞ ¼ C f ðyn jxn Þ: ð8:180Þ
n¼1
The factor graph of the memoryless channel is shown in Fig. 8.32, and it is
composed of N disconnected subgraphs.
8.3 Iterative MIMO Receivers 637
f(y1|x) f(y2|x) … f ( yM R | x )
and this rule is commonly referred to as the sum-product rule. In other words, μg!xn
ðxn Þ is the product of the local function g, and all messages associated with
incoming edges to g, except xn, summed over all variables except xn. The half-
edge message is considered to be 1, while for only one variable the product in
(8.181) does not exist, and we can write μg!xn ðxn Þ ¼ gðxn Þ. The message originat-
ing from the repetition node sent over edge xn is simply the product of incoming
messages, except xn:
Y
μf ¼ !xn ðxn Þ ¼ μg!xn0 ðxn0 Þ: ð8:182Þ
n0 6¼n
The SPA algorithm can also be applied when factor graphs has the cycles, by
specifying initial values of local nodes and a stopping criterion [2, 5, 50, 51]. How-
ever, in this case the SPA is a suboptimum algorithm, which performs well when
the length of the shortest cycle in the factor graph, so-called girth, is
sufficiently high.
638 8 Diversity and MIMO Techniques
f(y1|x) f(y2|x) … f ( yN + μ | x )
We return our attention now to the MAP detection problem, given by Eq. (8.168).
To calculate the f(x|y), we invoke Bayes’ rule:
f ðyjxÞf ðxÞ
f ðxjyÞ ¼ , ð8:183Þ
f ð yÞ
Let us define the prior information as the intrinsic message μ i (xn) ¼ f(xn) and the
extrinsic message (denoted by superscript e), from symbol demapper point of view,
related to edge symbol xn by:
X Y X Y
μe ðxn Þ ¼ f ðyjxÞ n0 6¼n f ðxn0 Þ ¼ f ðyjxÞ n0 6¼n μi ðxn0 Þ, ð8:185Þ
x
|ffl{zffl}
x
n n
μi ðxn0 Þ
8.3 Iterative MIMO Receivers 639
xn μ g → x ( xn ) = ∑ g ( x1 ,..., xN ) ∏ μ g → x
n n'
( xn ' )
~ xn n '≠ n
g(x1,…, xN)
…
x1 xN
μ x → g ( x1 )
1
μx N →g ( xN )
Fig. 8.33 The illustration of the sum-product rule
and then the corresponding sum-product for general channel with memory (includ-
ing ISI channel) is illustrated in Fig. 8.34.
Based on similarities of MAP detection problem for channel with memory and
MIMO channels, f(x|y) for MIMO channels can be factorized as follows:
x
zfflfflfflfflfflfflffl}|fflfflfflfflfflffl ffl{
f ðxjyÞ f ðyjxÞf ðxÞ ¼ f yj x1 , , xMTx
|fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl} YMTx
Y
MRx m¼1
f ðxm Þ,
f ðyn jxÞ
n¼1
Y
MRx YMTx
¼ f ðyn jxÞ m¼1
f ð x m Þ, f ð y n jx Þ ¼ exp j y n h n x j2
: ð8:186Þ
n¼1
The corresponding factor graph for MAP detection of uncoded signals at the
output of MIMO channel is shown in Fig. 8.35. Because of the existence of cycles,
the corresponding SPA is suboptimum. By increasing the number of antennas
sufficiently, the factor graph girth can be increased, and performance of
suboptimum iterative MIMO receiver based on SPA can be improved. However,
the complexity of computation would be high.
To reduce the complexity, we can perform pre-compensation of spatial interfer-
ence by employing suboptimum linear receivers (interfaces) described in Sects. 2.6
and 2.7. The key idea, given by Eq. (8.136), is to pre-multiply the received vector y
by a matrix being function of channel matrix H, denoted as A(H), to obtain
y~ ¼ AðHÞy, so that the spatial interference is either compensated for or reduced.
640 8 Diversity and MIMO Techniques
μ i ( xn ) = f ( xn )
μ i ( x1 ) μ e ( x1 ) μ ( xn )
i
μ ( xn )
e
μ ( xN )
i
μ e ( xN ) = ∑ f ( y | x) ∏ n '≠ N μ i ( xn ' )
~ xN
x1 xn xN
Fig. 8.34 The illustration of the sum-product algorithm for MAP detection (“equalization”) in
channels with memory
x1 x2 xMTx
= = … =
f(y1|x) f(y2|x) … (
f yM Rx | x )
Fig. 8.35 The illustration of factor graph for MAP detection of uncoded signals for MIMO
channels
f(x1) f(x2) f ( xM Tx )
x1 x2 xM Tx
f ( xMTx ) = = … =
f(x1) f(x2)
x1 x2 xM Tx
…
f ( y1 | x1 ) f ( y2 | x2 ) … (
f yM Tx | xMTx ) f ( y1 | x ) f ( y2 | x ) … (
f yM Tx | x )
(a) (b)
Fig. 8.36 The illustration of factor graphs for MIMO receivers with (a) ZF and (b) LMMSE
interfaces
In Fig. 8.36b we use thick edges to denote the diagonal terms after spatial
interference cancelation and thin edges to denote the remaining spatial interference
terms. When the spatial interference is well compensated, the following approxi-
mation can be used to further reduce the complexity of the factor graph:
f ~y n jx ¼ f ~y n jx1 ; ; xMTx ’ f ~y n jxn : ð8:187Þ
The linear block code (LBC) can be described as a K-dimensional subspace C of the
N-dimensional vector space of N-tuples, F2N , over the binary field F2 [55]. For this
K-dimensional subspace, we can find the basis B ¼ {g0, g1, . . ., gK1} that spans
C so that every codeword v can be written as a linear combination of basis vectors
642 8 Diversity and MIMO Techniques
f1 … f M Tx − 2 f M Tx −1 f M Tx
(
f n = f yn | xn , xn +1 , ... , xM Tx )
v ¼ m0 g0 + m1 g1 + . . . + mK1gK1 for message vector m ¼ (m0, m1, . . ., mK1); or
in compact form we can write v ¼ mG, where G is so-called generator matrix with
the i-th row being gi. The (N-K )-dimensional null space C⊥ of G comprises all
vectors x from F2N such that xGT ¼ 0, and it is spanned by the basis B⊥ ¼ {h0, h1,
. . ., hnk1}. Therefore, for each codeword v from C, vhiT ¼ 0 for every i; or in
compact form we can write vHT ¼ 0, where H is so-called parity-check matrix
whose i-th row is hi. Therefore, the parity-check matrix of LBC can be written as:
2 3
h0
6 h1 7
H¼6
4
7:
5 ð8:189Þ
⋮
hNK1
The codeword must satisfy all parity-check equations as discussed above, and
this condition can be represented with the help of Iverson function as follows:
Y
NK1
½v 2 C ¼ vh0T ¼ 0; ; vhNK1
T
¼0 ¼ vhnT ¼ 0 : ð8:190Þ
n¼0
The n-th factor in the right-hand side of Eq. (8.190) can be represented as mod-2
adder , connecting the edges involved in the n-th parity-check equation. A
bipartite (Tanner) graph is a graph whose nodes may be separated into two classes
(variable and check nodes) and where undirected edges may only connect two
nodes not residing in the same class. The Tanner graph of a code is drawn according
to the following rule: check (function) node c is connected to variable (bit) node
v whenever element hcv in a parity-check matrix H is a 1. In an (NK ) N parity-
check matrix, there are NK check nodes and N variable nodes. As an illustrative
example, consider the H matrix of the Hamming (7,4) code:
8.3 Iterative MIMO Receivers 643
v0 v1 v2 v3 v4 v5 v6
v0 v1 v2 v3 v4 v5 v6
= = = = = = =
bit-nodes
Check-nodes
c0 c1 c2 c0 c1 c2
(a) (b)
Fig. 8.38 Tanner graph of (7,4) Hamming code: (a) non-normal and (b) normal versions
2 3
1 0 0 1 0 1 1
H¼4 0 1 0 1 1 1 0 5:
0 0 1 0 1 1 1
For any valid codeword v ¼ [v0 v1. . .vn1], the checks used to decode the
codeword are written as:
• Equation (c0): v0 + v3 + v5 + v6 ¼ 0 (mod 2).
• Equation (c1): v1 + v3 + v4 + v5 ¼ 0 (mod 2).
• Equation (c2): v2 + v4 + v5 + v6 ¼ 0 (mod 2).
The bipartite graph (Tanner graph) representation of this code is shown in
Fig. 8.38. Both non-normal and normal versions of Tanner graph have been shown.
The circles represent the bit (variable) nodes while -nodes represent the check
(function) nodes. For example, the variable nodes v0, v3, v5, and v6 are involved in
(c0) and therefore connected to the check node c0. A closed path in a bipartite graph
comprising l edges that closes back on itself is called a cycle of length l. The
shortest cycle in the bipartite graph is called the girth. The shortest cycle in Tanner
graph in Hamming (7,4) code is 4, and therefore the girth is 4.
Codes described by trellis can also be described using the concept of normal
factor graphs. A trellis can be interpreted as a set of triples (sn1, vn, sn), describing
the transition from state sn-1 to state sn driven by the incoming channel symbol vn at
time instance n-1 (n ¼ 1,2,. . .,N ). Let the set of branch labels connecting the states
sn1 and sn be denoted by Tn. Then the local function corresponding to the n-th
trellis section, shown in Fig. 8.39, is given by:
½ðsn1 ; vi ; sn Þ 2 T n , ð8:191Þ
and the whole trellis can be described as a product of the corresponding Iverson
functions of individual trellis sections:
644 8 Diversity and MIMO Techniques
vn 0
β
1
0 α
sn-1 sn Tn={{0,β,0}, {0,α,3},
β 2 {1,α,1}, {1,β,2}}
1
α 3
sn-1 vn∈{α,β} sn
Y
N
½v 2 C ¼ ½ðsn1 ; vi ; sn Þ 2 T n : ð8:192Þ
n¼1
Y
Ns
f ðXjYÞ f ðYjXÞ½X 2 C ¼ ½X 2 C f ðyn jxn Þ, ð8:195Þ
n¼1
μ i ( x1,1 ) μ e ( x1,1 ) μ ( vn )
i
μ e ( vn ) μ ( vN )
i
μ e ( vN ) μ i ( vN ) μ e ( vN )
… … …
x1,1 xM Tx ,1 x1, N s xM Tx , N s
Interleaver
… …
… xM Tx , N s
x1,1 xM Tx ,1 x1, N s
f ( y1 | x1 ) … (
f yNs | xNs ) Symbol demapper
Fig. 8.42 The factor graph for space-time coded MIMO (with interleaver)
X Y
μe ðxm, n Þ ¼
xm, n
½X 2 C ðm0 ;n0 Þ6¼ðm;nÞ
μi ðxm0 , n0 Þ, ð8:196Þ
where μi(xm , n) are messages output by the functional nodes f(ym|xm) computed as:
X Y
μi ðxm, n Þ ¼
x
f ð y n jx n Þ m0 6¼m
μe ðxm, n Þ: ð8:197Þ
m, n
Once the above messages converge to exact values, the APPs can be computed
as follows:
This iterative SPA computes repeatedly the two-way messages associated with
the edges, after proper interleaving/deinterleaving, until a predetermined number of
iterations is reached or valid space-time codeword is obtained, after which APPs are
computed and used in MAP decoding as described earlier.
To reduce complexity, similarly as in Sect. 3.5, it might be a good idea to
perform preprocessing as follows:
~ ¼ AðHÞY ¼ AðHÞHX þ Z,
Y ð8:199Þ
The assumption in previous sections was that all frequency components will
experience the same channel coefficients. This is never correct assumption for
fiber-optics communications, because dispersion effects and mode-coupling effects
are frequency-dependent. On the other hand, most MIMO wireless communications
operate at data rates when flat-fading assumption is incorrect. Based on Chap. 2 we
know when the symbol rate Rs is larger than (channel) coherence bandwidth Bc, the
channel is frequency-selective; in other words, different frequency component will
see different channel coefficients. The 50% coherence bandwidth Bc , 50% is related
to the root-mean-squared (RMS) multipath delay spread σ τMDS by [57]:
Bc, 50% ’ ð5σ τMDS Þ1 .
We have to modify the MIMO channel model to take into account the number of
symbols over which the channel coefficients can be considered static. If we divide
the RMS multipath delay spread σ τMDS with the symbol duration Ts, we can
determine the number of symbols over which the channel coefficients can be
considered fixed, denoted as L, namely, L¼ σ τMDS /Ts. The quasi-static MIMO
channel model can be now described as [58]:
MTx X
X L1
yn ðk Þ ¼ hðnm
lÞ
xm ðk lÞ; n ¼ 1, , MRx ; k ¼ 1, , N sf , ð8:200Þ
m¼1 l¼0
where Nsf is number of symbols in frame (for which the channel can be considered
fixed).
To deal with frequency-selective fading, different techniques can be classified as
either single-carrier or multicarrier. The single-carrier systems typically employ the
equalization to deal with frequency selectivity, which was subject of investigation
in Chap. 6. On the other hand, the multicarrier techniques are typically based on
OFDM, which is subject of study in Chap. 7. In this section, we mainly deal with
relevant MIMO topics omitted in previous sections and Chaps. 6 and 7, which are
related on MIMO-OFDM and space-frequency block coding (SFBC) [58–60].
The frequency selectivity can be used as an additional degree of freedom,
frequency diversity, as discussed at the beginning of this chapter. The maximum
number of possible diversity channels, denoted as MD,max, can be summarized as
follows:
{ x ( n )}
t .d . 1
{ x ( k )}
1
RF 1
I/Q mod. 1
Optional OFDM Frequency
Serial-to-parallel converter
Tx 1
space-time -selective
…
Incoming Outer encoder
…
…
channel
channel
data stream +
{ }
encoder
x MTx ( n )
t .d . MTx model
Symbol {x ( k )}
M Tx
RF
OFDM I/Q mod. MTx
mapper Tx MTx
(a)
Receive
antennas
MIMO OFDM Rx architecture
{ y ( n )}
t .d .
1
RF { y ( k )}
1
Parallel-to-serial converter
OFDM STC
Rx 1 demodulator/
…
decoder Estimated
…
Channel
{y t .d .
M Rx
( n )} RF { y ( k )}
M Tx
decoder
OFDM
Rx MRx
(b)
Fig. 8.43 MIMO-OFDM system architecture for frequency-selective channels: (a) transmitter
and (b) receiver architectures. t.d. time domain
8.4 Broadband MIMO 649
be longer than RMS due to chromatic dispersion, plus RMS due to differential
group delay of two polarization states. Finally, in FMF-based optical applications,
we need to account for RMS of mode group delay. Further assuming that the
number of subcarriers is larger than or equal to the number of resolvable paths
due to selective fading (L ), the corresponding OFDM parallelization model we
developed can be extended as follows:
where x(k), y(k), and z(k) represent the transmitted, received, and noise vectors for
subcarrier index k:
2 3 2 3 2 3
x1 ðk Þ y 1 ðk Þ z1 ðkÞ
6 x2 ðk Þ 7 6 7 6 7
xðkÞ ¼ 6 7, yðkÞ ¼ 6 y2 ðkÞ 7, zðkÞ ¼ 6 z2 ðkÞ 7: ð8:203Þ
4... 5 4... 5 4... 5
xMTx ðkÞ yMRx ðkÞ zMRx ðkÞ
Tx antennas
1
IDFT Frequency
I/Q mod. 1
Space-frequency block 1
-selective
…
Incoming sequence block encoder
…
channel
of symbols + MTx
IDFT model
Symbol mapper I/Q mod. MTx
block MTx
1
DFT
block 1
…
Estimated
MRx … SFBC
decoder sequence of symbols
DFT
block MRx
Rx antennas
output is used as an input of inverse DFT (IDFT) block, composed of S/P converter,
IFFT, and P/S converter. In principle, RF OFDM transmitters can be used in similar
fashion as shown in Fig. 8.43. On receiver side, the n-th (n ¼ 1,2,. . .,MRx) receiver
antenna signal after A/D conversion undergoes S/P conversion, FFT, and P/S
conversion. Then SFBC decoding takes place, and the estimated sequence of
symbols is delivered to the end user. There are different options, single SFBC
decoder can be used, or MRx SFBC decoders can be used operating in parallel. The
SFBC principles can be combined with various BLAST architectures.
For additional details on SFBC systems, an interested reader is referred to
[59, 60].
The MIMO channel capacity for deterministic channel can be defined as the
following maximization problem:
where the maximization is performed over the multivariate PDF fX(x). Given that
the components of noise vector are independent on x and zero-mean Gaussian, we
can simplify the problem of estimation of entropy H(y|x) as follows: H(y| x) ¼ H
(Hx + z| x) ¼ H(z), so that the previous equation can rewritten as:
Given that components of noise vector are i.i.d. and complex circular symmetric
Gaussian, the corresponding distribution of z is a multivariate Gaussian [62]:
1 { 1
f Z ð zÞ ¼ eðzμz Þ Rz ðzμz Þ , ð8:208Þ
detðπRz Þ
:
whereD μz ¼ 〈z〉
and E Rz is the covariance matrix of z, defined as
{
:
Rz ¼ z μz z μz ¼ zz{ μz μ{z : The corresponding differential entropy
can be determined as:
P P
ðz∗m μ∗zm Þ½R1 z mn ðzn μzn Þ
* zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{ +
m n
{
H ðzÞ ¼ hlog2 f Z ðzÞi ¼ log2 detðπRz Þ þ z μz R1 z z μz log2 e
X X D E 1
∗ ∗
¼ log2 detðπRz Þ þ log2 e m n
z m μ zm z n μ zn
Rz mn
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
½Rz mn
This result is applicable to any complex Gaussian multivariate. For i.i.d. zero-
mean complex Gaussian multivariate, the following are valid μz ¼ 0, Rz ¼ σ 2 IMRx
so that the differential entropy becomes:
H ðzÞ ¼ log2 det eπσ 2 IMRx : ð8:210Þ
where λi are eigenvalues of the Wishart matrix HH{. As discussed in Sect. 2.2, we
can now decompose the MIMO channel into RH parallel channels, where RH is the
rank of channel matrix. The MIMO channel capacity would be then:
X
RH
Pi σ2P
C¼ P
max log2 1 þ SNRi , SNRi ¼ i 2 : ð8:215Þ
Pi : P P P σ
i i i¼1
where SNRc is the SNR cutoff value (we do not transmit when SNR is below the
cutoff value). By substituting (8.216) into (8.215), we obtain:
X
SNRi
C¼ log2 : ð8:217Þ
i:SNRi >SNRc
SNRc
When the CSI is not known on transmitter side, there is no reason to transmit on
one antenna with higher launch power that on the others, and there is no need to
introduce the correlation among transmit antennas. Therefore, it makes sense to
apply the uniform power allocation strategy. Assuming the rich-scattering scenario,
the input covariance matrix is a scaled version of the identity matrix
Rx ¼ ðP=MT x ÞIMTx , and after substitution into (8.213), we obtain:
P {
I ðx; yÞ ¼ log2 det IMTx þ HH : ð8:218Þ
MTx σ 2
In the limit, as the number of transmit antennas tends to plus infinity, we have
that HH{ =MTx ! IMTx , so that the mutual information tends to
C ¼ MRx log2 ð1 þ P=σ 2 Þ, and the capacity is a linear function in M ¼ min(MTx,
MRx). By performing the SVD of channel matrix, Eq. (8.218) can also be written
into following form:
X
RH
σ 2 P=σ 2
I ðx; yÞ ¼ log2 1 þ i , RH ¼ rankðHÞ minðMTx ; MRx Þ: ð8:219Þ
i¼1
MTx
When the transmitter does not know the channel matrix, it can select a fixed data
rate R to transmit, which might exceed the mutual information, and an outage will
occur. The probability that the actual data rate R exceeds mutual information I(x,y)
is known as the outage probability, defined as:
P=σ 2 {
Poutage ðRÞ ¼ Pr log2 det IMRx þ HH <R : ð8:220Þ
MTx
The maximum data rate that can be supported at a given outage probability is
commonly referred to as the outage capacity.
So far we assumed that the channel matrix is static, which is rarely true in optical
and wireless communication channels. The channel matrix describing the
654 8 Diversity and MIMO Techniques
When the receiver has the perfect knowledge of the CSI, the mutual information
between channel input x and channel output y, given the channel matrix H, can be
determined as [2, 63]:
When the CSI is known on transmitter side, assuming that the short-term power
constraint P is satisfied, we perform the SVD of the channel matrix so that based on
(8.215) and (8.222) we obtain:
* +
X
RH
Pi σ 2 P
C¼ P
max log2 1 þ SNRi , SNRi ¼ i 2 : ð8:223Þ
Pi : P P P σ
i i i¼1 H
PH
*zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{ +
XMTx
i¼1
xi ðHÞx∗ i ðH Þ P ð8:224Þ
H
For fixed number of receive antennas, and as number of transmit antennas tends
to infinity, we have that:
1 { P M
HH ! IMRx ) log2 det IMRx þ 2 IMRx ¼ log2 1 þ σP2 Rx
MTx MTx !1 σ
P
¼ MRx log2 1 þ 2 ,
σ
ð8:228Þ
D h 2
iE
{
C ¼ log2 det IMRx þ P=σ
MTx HH
H
ð8:229Þ
P=σ 2 {
log2 det IMRx þ HH H ¼ MRx log2 ð1 þ P=σ 2 Þ:
MTx
By recalling that HH{ and H{H have the same spectrum (the set of eigenvalues),
then the following is valid:
P=σ 2 { P=σ 2 {
det IMRx þ HH ¼ det IMRx þ H H , ð8:230Þ
MTx MTx
and after (8.230) substitution into (8.227), the Jensen’s inequality yields to:
D h 2
iE
{
C ¼ log2 det IMRx þ P=σ
MTx H H
H ð8:231Þ
P=σ 2 { MRx
log2 det IMRx þ H H H ¼ MTx log2 1 þ P=σ :
2
MTx MTx
By combining these two inequalities into one, we obtained the following upper
bound:
MRx
C min MRx log2 1 þ P=σ ; MTx log2
2
1þ P=σ 2 : ð8:232Þ
MTx
For the exact computation of (8.227), we can use Monte Carlo integration
approach. For semi-analytical computation, an interested reader is referred to [2].
and determine the outage probability as the probability that the transmission rate
exceeds instantaneous channel capacity C(H) [2]:
The maximum rate that can be supported by this channel, for the outage
probability Poutage, is called the outage capacity. More formally, the p-percent
outage capacity is defined as the data capacity that is guaranteed in
(1p) 100% of channel realizations [45]:
Pr CðHÞ Coutage, p ¼ p: ð8:235Þ
Given that Coutage,p occurs in (1p)% of channel uses, the throughput of the
system associated with, denoted as Rp, can be determined as [45]:
Rp ¼ ð1 pÞCoutage, p : ð8:236Þ
where b is the index of the block and n is the index of the symbol within that block.
Other assumptions for input, output, and noise vectors are the same as before.
Again, we can perform the SVD of channel matrix Hb in similar fashion to
Eq. (8.214):
Hb ¼ Ub Σb V{b , ð8:238Þ
U{b yb ½n ¼ U{b Ub Σb V{b xb ½n þ U{b zb ½n ¼ Σb V{b xb ½n þ U{b zb ½n:
|fflfflfflffl{zfflfflfflffl} ð8:239Þ
Hb
and this equation is similar to (8.223) so that for CSIT case, the optimum power
allocation strategy is water-filling.
When the number of blocks in block-fading model is finite, the channel capacity
calculation is more involved so that an interested reader is referred to specialized
books on MIMO communication principles, such as [2, 26].
658 8 Diversity and MIMO Techniques
In separately correlated MIMO model, introduced earlier, the H-entries are corre-
lated circularly symmetric complex zero-mean Gaussian random variables, and the
channel matrix can be decomposed as:
For high SNRs, when MTx ¼ MRx ¼ M, the following asymptotic approximation
is valid [64]:
P=σ 2
C Mlog2 þ logðM!Þ jlog2 detðTRÞj, ð8:243Þ
M
with the last term representing the loss due to local spatial correlation. Clearly, the
spatial correlation degrades the system performance, while the linear growth with
respect to the minimum number of transmit/receive antennas is preserved.
where Nsc is the number of subcarriers. The corresponding ergodic channel capacity
expressions given above can be generalized to OFDM-MIMO systems with Nsc
subcarriers as follows [13, 65]:
8.6 MIMO Channel Estimation 659
1 1 {
C¼ max log det IMRx Nsc þ 2 HΣH , ð8:245Þ
N sc TrðΣÞP 2 σ H
where Σ is the covariance matrix of the Gaussian input vector, defined as:
N c 1 P
Σ ¼ diagfΣk gk¼0 , Σk ¼ IM ; k ¼ 0, 1, . . . , N sc 1: ð8:246Þ
MRx N xc Rx
So far we assumed that CSI was perfect. In this section we discuss how to estimate
the MIMO channel coefficients. We have seen above that parallel MIMO channel
decomposition has similarities with parallel decomposition of OFDM channels. So
it is not surprising that similar methods can be used for channel estimation. Here we
describe three techniques to estimate MIMO channel matrix:
(i) Maximum likelihood (ML) MIMO channel estimation
(ii) Least squares (LS) MIMO channel estimation
(iii) Linear minimum MSE (LMMSE) MIMO channel estimation
The common denominator to all three channel estimation techniques is the
assumption of using a sequence of Np training symbols as a preamble. The transmit
pilot matrix Xp has the format MTx Np, the received matrix has Yp, and the noise
matrix has dimensions MRx Np. The channel matrix H dimensionality is the same
as before MTx MRx. We also assume that channel is quasi-static; in other words
660 8 Diversity and MIMO Techniques
the H does not change during transmission of pilot symbols. The corresponding
output-input relationship is given by:
Yp ¼ HXp þ Z: ð8:246Þ
Because the entries of noise matrix Z are ZMSW, from detection theory [66],
with basics provided in Chap. 6, we know that maximizing ML is equivalent to
minimizing the Euclidean (Frobenius) norm, the optimization problem can be
simplified to:
^ ML ¼ argmin Yp HXp 2 :
H ð8:248Þ
F
H
∂MSEðHÞ T T
¼ Xp Y{p þ Xp X{p H{ ¼ 0: ð8:250Þ
∂H
1
^ ML ¼ Yp X{ Xp X{
H : ð8:252Þ
p p
1
From matrix theory we know that in order Xp X{p to exist, the following
condition most be satisfied: Np MTx.
Clearly, this equation is almost identical to Eq. (8.248), and not surprisingly, the
^ is obtained after solving the equation: ∂Yp HX
same solution for H ^ p 2 =∂H¼0,
^
F
which is:
1
^ LS ¼ Yp X{ Xp X{
H : ð8:254Þ
p p
D E
^ LMMSE ¼ argmin H H
H ^ 2 : ð8:255Þ
F
^
H
^ is the linear
To simplify the solution, we assume that channel matrix estimate H
transformation of received signal Yp; in other words:
^
H¼Y p A, ð8:256Þ
As Telatar has shown [62], the expectation and trace operations commute, so
that we can rewrite the previous equation as follows:
hD { Ei
^ MMSE ¼ argmin Tr
H H Yp A H Yp A
A 2 3
D E D E
6 7
¼ argmin Tr4 HH{ HA{ Y{p Yp AH{ þ Yp AA{ Y{p 5,
A |fflfflffl{zfflfflffl}
RH
ð8:258Þ
∂MSEðAÞ
¼ Xp RH þ Xp A{ X{p RH þ A{ RZ ¼ 0, ð8:261Þ
∂A
8.6 MIMO Channel Estimation 663
and after solving for A, we obtained the optimum solution for transformation matrix
as:
1
Aoptimum ¼ RH X{p Xp þ RZ RH X{p : ð8:262Þ
Clearly, this result is applicable to any random channel matrix, not necessarily
ZMSW model as long as the following is valid 〈H〉 ¼ 0.
So far we have not put any restriction on pilot matrix, except that for the
corresponding matrix to invertible, we required that Np MTx. If we chose Xp X{p
to be scaled identity matrix:
Np
Xp X{p ¼ IM , ð8:264Þ
MTx Tx
1 1
H1 ¼ ½1, H2 ¼ , H2k ¼ H2 H2k1 , ð8:266Þ
1 1
where denotes the Kronecker product. Therefore, the simplest way to design the
pilot matrices satisfying Eq. (8.264), when MRx > MTx, is to start with the
Hadamard matrix of size MTx MTx and add additional MRxMTx rows that are
orthogonal to already existing rows in Hadamard matrix.
The purpose of this chapter has been to describe various diversity and MIMO
techniques capable of improving SISO system performance as well as the system
throughput. The various diversity and MIMO techniques that have been described
can be used not only in wireless MIMO communications but also in free-space
optical and fiber-optics communications with coherent optical detection.
Various diversity schemes including polarization diversity, spatial diversity, and
frequency diversity schemes are summarized in Sect. 1.1. The following receive
diversity schemes have been described in Sect. 1.2: selection combining, threshold
combining, maximum-ratio combining, and equal-gain combining schemes. In
Sect. 1.3, various transmit diversity schemes have been described, depending on
the availability of channel state information on transmitter side.
The most of the chapter has been devoted to wireless and optical MIMO
techniques. After description of various wireless and optical MIMO models in
Sect. 2.1, we describe the parallel decomposition of MIMO channels in Sect. 2.2,
followed by space-time coding (STC) principles in Sect. 2.3. The maximum
likelihood (ML) decoding for STC is described together with various design
criteria. The following relevant classes of STC have been described in Sect. 2.4:
Alamouti code, orthogonal designs, linear space-time block codes, and space-time
trellis codes. The corresponding STC decoding algorithms have been described as
well in the same section.
After that, the attention has moved to SDM principles in Sect. 2.5, where various
BLAST encoding architectures (Sect. 2.5.1) as well as multigroup space-time coded
modulation (Sect. 2.5.2) have been introduced. The following classes of linear and
feedback MIMO receiver for uncoded signals have been subsequently described in
Sect. 2.6: zero-forcing, linear minimum MSE, and decision-feedback receivers. The
next topic in the chapter has been related to the suboptimum MIMO receivers for
coded signals (see Sect. 2.7). Within this topic, the linear zero-forcing (ZF) and
linear MMSE recovers (interfaces) have been described in the context of STC.
Within decision-feedback and BLAST receivers, various H/V-BLAST architecture
including ZF and MMSE ones have been introduced. The topic on suboptimum
receivers has been concluded with diagonal- (D-)-BLAST and iterative receiver
interfaces.
References 665
The section on iterative MIMO receivers, Sect. 3, starts with brief introduction
of concept of factor graphs (Sect. 3.1), following with the description of factor
graphs for MIMO channel and channels with memory (Sect. 3.2). Then the
sum-product algorithm (SPA) operating on factor graphs has been described in
Sect. 3.3, followed by description of SPA for channels with memory (Sect. 3.4).
The following iterative MIMO receivers for uncoded signals have been described in
Sect. 3.5: ZF, MMSE, ZF H/V-BLAST, and LMMSE H/V-BLAST receivers. After
brief description of factor graphs for linear block and trellis codes in Sect. 3.6,
several iterative MIMO receivers for space-time coded signals have been described
in Sect. 3.7.
The section on broadband MIMO (Sect. 4) has been devoted to the description
how frequency selectivity can be used as an additional degree of freedom, followed
by description of MIMO-OFDM in Sect. 4.1 and space-frequency block coding
principles in Sect. 4.2.
The focus has been then moved to MIMO channel capacity calculations in Sect.
5 for various MIMO channel models including deterministic (Sect. 5.1), ergodic,
and non-ergodic random channels, as well as correlated channel models, described
in Sect. 5.2. The concepts of ergodic and outage channel capacity have been
introduced. The section on MIMO channel capacity ends with MIMO-OFDM
channel capacity description (Sect. 5.2.4).
In MIMO channel estimation section (Sect. 6), the following MIMO channel
estimation techniques have been described: ML MIMO channel estimation (Sect.
6.1), least squares (LS) MIMO channel estimation (Sect. 6.2), and linear minimum
MSE MIMO channel estimation (Sect. 6.3).
References
11. Djordjevic IB, Xu L, Wang T PMD compensation in coded-modulation schemes with coherent
detection using Alamouti-type polarization-time coding. Opt Express 16(18):14163–14172.
09/01/2008
12. Tarokh V, Seshadri N, Calderbank AR (1998) Space–time codes for high data rate wireless
communication: performance criterion and code construction. IEEE Trans Inf Theory 44
(2):744–765
13. Goldsmith A, Jafar SA, Jindal N, Vishwanath S (2003) Capacity limits of MIMO channels,
IEEE J. Selected Areas in Communications 21(5):684–702
14. Shah AR, Hsu RCJ, Sayed AH, Jalali B (2005) Coherent optical MIMO (COMIMO). J Lightw
Technol 23(8):2410–2419
15. Hsu RCJ, Tarighat A, Shah A, Sayed AH, Jalali B (2005) Capacity enhancement in coherent
optical MIMO (COMIMO) multimode fiber links. J Lightwave Technol 23(8):2410–2419
16. Tarighat A, Hsu RCJ, Sayed AH, Jalali B (2007) Fundamentals and challenges of optical
multiple-input multiple output multimode fiber links. IEEE Commun Mag 45:57–63
17. Bikhazi NW, Jensen MA, Anderson AL (2009) MIMO signaling over the MMF optical
broadcast channel with square-law detection. IEEE Trans Commun 57(3):614–617
18. Agmon A, Nazarathy M (2007) Broadcast MIMO over multimode optical interconnects by
modal beamforming. Opt Express 15(20):13123–13128
19. Alon E, Stojanovic V, Kahn JM, Boyd SP, Horowitz M (2004) Equalization of modal
dispersion in multimode fibers using spatial light modulators, In: Proceedings of IEEE Global
Telecommunication Conference 2004, Dallas, TX, Nov. 29-Dec. 3, 2004
20. Panicker RA, Kahn JM, Boyd SP (2008) Compensation of multimode fiber dispersion using
adaptive optics via convex optimization. J. Lightw. Technol. 26(10):1295–1303
21. Fan S, Kahn JM (2005) Principal modes in multi-mode waveguides. Opt Lett 30(2):135–137
22. Kogelnik H, Jopson RM, Nelson LE (2002) Polarization-mode dispersion. In: Kaminow I, Li T
(eds) Optical fiber telecommunications IVB: systems and impairments. Academic, San Diego,
CA
23. Ho K-P, Kahn JM (2011) Statistics of group delays in multimode fiber with strong mode
coupling. J. Lightw. Technol. 29(21):3119–3128
24. Zou D, Lin C, Djordjevic IB (2012) LDPC-coded mode-multiplexed CO-OFDM over 1000 km
of few-mode fiber. In: Proceedings of CLEO 2012, Paper no. CF3I.3, San Jose, CA, 6–11 May
2012
25. Djordjevic IB, Denic S, Anguita J, Vasic B, Neifeld MA (2008) LDPC-Coded MIMO optical
communication over the atmospheric turbulence channel. IEEE/OSA J Lightwave Technol 26
(5):478–487
26. Biglieri E, Calderbank R, Constantinides A, Goldsmith A, Paulraj A, Poor HV (2007) MIMO
wireless communications. Cambridge University Press, Cambridge
27. Proakis JG (2007) Digital communications, fifth edn. McGraw Hill, New York, NY
28. Djordjevic IB (2012) Spatial-domain-based hybrid multidimensional coded-modulation
schemes enabling Multi-Tb/s optical transport. IEEE/OSA J Lightwave Technol 30
(14):2315–2328
29. Foschini GJ (1996) Layered space-time architecture for wireless communication in a fading
environment when using multi-element antennas. Bell Labs Tech J 1:41–59
30. Wolniansky PW, Foschini GJ, Golden GD, Valenzuela RA V-BLAST: an architecture for
realizing very high data rates over the rich-scattering wireless channel. In: Proceedings of 1998
URSI International Symposium on Signals, Systems, and Electronics (ISSSE 98), pp 295–300,
Pisa, 29 Sep-02 Oct 1998
31. Li X, Huang H, Foschini GJ, Valenzuela RA (2000) Effects of iterative detection and decoding
on the performance of BLAST. In: Proceedings of IEEE Global Telecommunications Confer-
ence 2000. (GLOBECOM ’00), vol 2. San Francisco, CA, pp 1061–1066
32. Foschini GJ, Chizhik D, Gans MJ, Papadias C, Valenzuela RA (2003) Analysis and perfor-
mance of some basic space-time architectures. IEEE J Selec Areas Commun 21(3):303–320
References 667
33. Loyka S, Gagnon F (2004) Performance analysis of the V-BLAST algorithm: an analytical
approach. IEEE Trans Wirel Commun 3(4):1326–1337
34. Tarokh V, Naguib A, Seshadri N, Calderbank AR (1999) Combined array processing and
space-time coding. IEEE Trans Inf Theory 45(4):1121–1128
35. Horn RA, Johnson CR (1988) Matrix analysis. Cambridge Univ. Press, New York
36. Moustakas AL, Baranger HU, Balents L, Sengupta AM, Simon SH (2000) Communication
through a diffusive medium: coherence and capacity. Science 287:287–290
37. Da-Shan S, Foschini GJ, Gans MJ, Kahn JM (2000) Fading correlation and its effect on the
capacity of multielement antenna systems. IEEE Trans Commun 48(3):502–513
38. Wittneben A (1991) Base station modulation diversity for digital simulcast. In: 41st IEEE
Vehicular Technology Conference, 1991. Gateway to the Future Technology in Motion.
St. Louis, MO, pp 848–853, 19–22 May 1991
39. Seshadri N, Winters JH (1993) Two signaling schemes for improving the error performance of
frequency-division-duplex (FDD) transmission systems using transmitter antenna diversity.In:
43rd IEEE Vehicular Technology Conference, 1993, Secaucus, NJ, pp 508–511, 18–20 May
1993
40. Edelman A (1989) Eigen values and condition numbers of random matrices. PhD Dissertation,
MIT, Cambridge
41. James AT (1964) Distributions of matrix variates and latent roots derived from normal
samples. Ann Math Stat 35(2):475–501
42. Wang H, Xia X-G (2003) Upper bounds of rates of complex orthogonal space-time block
codes. IEEE Trans Inf Theory 49(10):2788–2796
43. Ma X, Giannakis GB (2003) Full-diversity full-rate complex-field space-time coding. IEEE
Trans Signal Process 51(11):2917–2930
44. Djordjevic IB, Xu L, Wang T (2008) PMD compensation in multilevel coded-modulation
schemes with coherent detection using BLAST algorithm and iterative polarization cancella-
tion. Opt Express 16(19):14845–14852
45. Hampton JR (2014) Introduction to MIMO communications. Cambridge University Press,
Cambridge, UK
46. Wiberg N, Loeliger HA, Kotter R (1995) Codes and iterative decoding on general graphs. In:
Proceedings of 1995 I.E. International Symposium on Information Theory, Whistler, BC, p
468
47. Kschischang FR, Frey BJ, Loeliger HA (2001) Factor graphs and the sum-product algorithm.
IEEE Trans Inf Theory 47(2):498–519
48. Loeliger HA (2004) An introduction to factor graphs. IEEE Signal Process Mag 21(1):28–41
49. Frey BJ, Kschischang FR, Loeliger H-A, Wiberg N (1997) Factor graphs and algorithms. In:
Proceedings of 35th Allerton Conf. Communications, Control, and Computing, Allerton
House, Monticello, IL, pp 666–680, Sept. 29–Oct. 1, 1997
50. Lin S, Costello DJ (2004) Error control coding: fundamentals and applications, 2nd edn.
Pearson Prentice Hall, Upper Saddle River, NJ
51. Ryan WE, Lin S (2009) Channel codes: classical and modern. Cambridge University Press
52. Biglieri E, Taricco G, Tulino A (2002) Performance of space-time codes for a large number of
antennas. IEEE Trans Inf Theory 48(7):1794–1803
53. Biglieri E, Taricco G, Tulino A (2002) Decoding space-time codes with BLAST architectures.
IEEE Trans Signal Process 50(10):2547–2552
54. Pulraj A, Nabar R, Gore D (2003) Introduction to space-time wireless communications.
Cambridge University Press, Cambridge, UK
55. Djordjevic IB (2016) On advanced FEC and coded modulation for ultra-high-speed optical
transmission. IEEE Commun Surv Tutorials PP(99):1–31. doi:10.1109/COMST.2016.
2536726
56. Ten Brink S (2001) Convergence behavior of iteratively decoded parallel concatenated codes.
IEEE Trans Commun 49(10):1727–1737
668 8 Diversity and MIMO Techniques
57. Rappaport TS (2002) Wireless communications: principles and practice, 2nd edn. Prentice
Hall
58. Zheng Z, Duman TM, Kurtas EM (2004) Achievable information rates and coding for MIMO
systems over ISI channels and frequency-selective fading channels. IEEE Trans Commun 52
(10):1698–1710
59. Schober R, Gerstacker WH, Lampe LHJ (2004) Performance analysis and design of STBCs for
frequency-selective fading channels. IEEE Trans Wirel Commun 3(3):734–744
60. Zhang W, Xia XG, Ching PC (2007) High-rate full-diversity space–time–frequency codes for
broadband MIMO block-fading channels. IEEE Trans Commun 55(1):25–34
61. Siheh W, Djordjevic IB (2009) OFDM for optical communications. Elsevier/Academic Press,
Amsterdam-Boston
62. Telatar E (1999) Capacity of Multi-antenna Gaussian Channels. Eur Trans Telecommun
10:585–595
63. Cover TM, Thomas JA (1991) Elements of information theory. Wiley, New York
64. Shin H, Lee JH (2003) Capacity of multiple-antenna fading channels: spatial fading correla-
tion, double scattering, and keyhole. IEEE Trans Inf Theory 49(10):2636–2647
65. B€olcskei H, Gesbert D, Paulraj AJ (2002) On the capacity of wireless systems employing
OFDM-based spatial multiplexing. IEEE Trans Commun 50:225–234
66. McDonough RN, Whalen AD (1995) Detection of signals in noise, 2nd edn. Academic Press,
San Diego
67. Hassibi B, Hochwald BM (2003) How much training is needed in multiple-antenna wireless
links? IEEE Trans Inf Theory 49(4):951–963
68. Lin C, Djordjevic IB, Zou D (2015) Achievable information rates calculation for optical
OFDM transmission over few-mode fiber long-haul transmission systems. Opt Express 23
(13):16846–16856
Chapter 9
Advanced Coding and Coded Modulation
Techniques
Abstract This chapter is devoted to advanced channel coding and coded modula-
tion techniques. After linear and BCH code fundamentals, we provide the trellis
description of linear block codes and describe the corresponding Viterbi decoding
algorithm. After describing the fundamentals of convolutional, RS, concatenated,
and product codes, we describe coding with interleaving as an efficient way to deal
with burst of errors and fading effects. Significant space in the chapter is devoted to
codes on graphs, in particular. Turbo, turbo product, and LDPC codes are described
together with corresponding decoding algorithms. Regarding LDPC codes, both
binary and nonbinary (NB) LDPC codes are introduced, and corresponding
decoding algorithms as well as their FPGA implementation are described. Addi-
tionally, LDPC codes design procedures are described, followed by rate adaptation.
Rate-adaptive FGPA implementations of LDPC and generalized LDPC codes are
described as well. The next portion of the chapter is devoted to coded modulation
(CM) and unequal error protection (UEP). After providing the coded modulation
fundamentals, we describe trellis-coded modulation (TCM, multilevel coding and
UEP, bit-interleaved coded modulation (BICM), turbo TCM, and various hybrid
multidimensional coded modulation schemes suitable for ultra-high-speed optical
transmission including multilevel nonbinary LDPC-coded modulation. After coded
modulation sections, the focus of the chapter is on multidimensional turbo equal-
ization. The following topics are described: nonlinear channels with memory,
nonbinary MAP detection, sliding-window multidimensional turbo equalization,
simulation study of multidimensional turbo equalization, and several experimental
demonstrations including time-domain 4-D-NB-LDPC-CM and quasi-single-mode
transmission over transoceanic distances. In section on optimized signal constella-
tion design and optimized bit-to-symbol mappings-based coded modulation, we
describe multidimensional optimized signal constellation design (OSCD), EXIT
chart analysis of OSCD mapping rules, nonlinear OSCD-based coded modulation,
and transoceanic multi-Tb/s transmission experiments enabled by OSCD. Finally,
in adaptive coding and adaptive coded modulation section, we describe adaptive
coded modulation, adaptive nonbinary LDPC-coded multidimensional modulation
suitable for high-speed optical communications, and adaptive hybrid free-space
optical (FSO)-RF-coded modulation.
The linear block code (n, k) satisfies a linearity property, which means that a linear
combination of arbitrary two codewords results in another codeword. If we use the
terminology of vector spaces, it can be defined as a subspace of a vector space over
finite (Galois) field, denoted as GF(q), with q being the prime power. Every space is
described by its basis – a set of linearly independent vectors. The number of vectors
in the basis determines the dimension of the space. Therefore, for an (n, k)
linear block code, the dimension of the space is n, and the dimension of the code
subspace is k.
Let m ¼ (m0 m1. . .mk1) denote the k-bit message vector. Any codeword x ¼ (x0
x1 . . . xn1) from the (n, k) linear block code can be represented as a linear
combination of k basis vectors gi (i ¼ 0,1,..,k1) as follows:
2 3 2 3
g0 g0
6 g1 7 6 g1 7
x ¼ m0 g0 þ m1 g1 þ . . . þ mk1 gk1 ¼ m6 7 6 7
4 . . . 5 ¼ mG; G¼4 . . . 5, ð9:1Þ
gk1 gk1
where G is the generator matrix (of dimensions k n), in which every row
represents basis vector from the coding subspace. Therefore, in order to be encoded,
the message vector m has to be multiplied with a generator matrix G to get the
codeword, namely, x ¼ mG.
The code may be transformed into a systematic form by elementary operations
on rows in the generator matrix, i.e.:
and has the structure as shown in Fig. 9.1. The message vector stays unaffected
during systematic encoding, while the vector of parity checks b is appended having
the bits that are algebraically related to the message bits as follows:
9.1 Linear Block Codes Fundamentals 671
where
(
1, if bi depends on mj
pij ¼
0, otherwise
The optical channel introduces the errors during transmission, and the received
vector r can be represented as r ¼ x + e, where e is the error vector (error pattern)
whose components are determined by:
(
1, if an error occured in the ith location
ei ¼
0, otherwise
x0 ¼ m0
x1 ¼ m1
...
xk1 ¼ mk1
ð9:5Þ
xk ¼ m0 p00 þ m1 p10 þ . . . þ mk1 pk1, 0
xkþ1 ¼ m0 p01 þ m1 p11 þ . . . þ mk1 pk1, 1
...
xn1 ¼ m0 p0, nk1 þ m1 p1, nk1 þ . . . þ mk1 pk1, nk1
By using the first k equalities, the last n k equations can be rewritten in terms
of the first k codeword elements as follows:
The equations presented above can be rewritten through matrix representation as:
2 3T
p00 p10 ... pk1, 0 1 0 ... 0
6 7
6 p01 p11 ... pk1, 1 0 1 ... 0 7
½x0 x1 . . . xn1 6 7 ¼0
|fflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflffl} 6
... 4 ... ... ...7 5
x
p0, nk1 p1, nk1 . . . pk1, nk1 0 0 . . . 1
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
HT
, xHT ¼ 0, H ¼ PT Ink ðnkÞxn
ð9:7Þ
The H-matrix in Eq. (9.7) is known as the parity-check one. We can easily verify
that G and H matrices satisfy equation:
P
GH ¼ ½ Ik
T
P ¼ P þ P ¼ 0, ð9:8Þ
Ink
meaning that the parity-check matrix H of an (n, k) linear block code has rank n k
and dimensions (n k) n whose null space is k-dimensional vector with basis
forming the generator matrix G.
Every (n, k) linear block code with generator matrix G and parity-check matrix
H has a dual code, this time having generator matrix H and parity-check matrix G.
As an example, (n, 1) repetition code and (n, n 1) single-parity-check code are
dual ones.
In order to determine the error-correction capability of the linear block code, we
have to introduce the concepts of Hamming distance and Hamming weight
[1, 2]. The Hamming distance d(x1, x2) between two codewords x1 and x2 is defined
as the number of locations in which these two vectors differ. The Hamming weight
wt(x) of a codeword vector x is defined as the number of nonzero elements in the
vector. The minimum distance dmin of a linear block code is defined as the smallest
Hamming distance between any pair of code vectors in the code space. Since the
zero vector is also a codeword, the minimum distance of a linear block code can be
defined as the smallest Hamming weight of the nonzero code vectors in the code.
We can write the parity-check matrix in a form H ¼ [h1 h2 . . . hn], where hi
presents the i-th column in the matrix structure. Since every codeword x must
satisfy the syndrome equation xHT ¼ 0, the minimum distance of a linear block
code is determined by the minimum number of columns in the H-matrix whose sum
is equal to zero vector. As an example, (7,4) Hamming code discussed above has a
minimum distance dmin ¼ 3 since the sum of first, fifth, and sixth columns leads to
zero vector.
The codewords can be represented as points in n-dimensional space, as shown in
Fig. 9.2. Decoding process can be visualized by creating the spheres of radius
t around codeword points. The received word vector r in Fig. 9.2a will be decoded
as a codeword xi because its Hamming distance d(xi,r) t is closest to the
9.1 Linear Block Codes Fundamentals 673
codeword xi. On the other hand, in example shown in Fig. 9.2b, the Hamming
distance satisfies relation d(xi,xj) 2 t, and the received vector r that falls in
intersection area of two spheres cannot be uniquely decoded. Therefore, (n, k)
linear block code of minimum distance dmin can correct up to t errors if, and only
if, t b1/2(dmin1)c or dmin 2 t + 1 (where bc denotes the largest integer smaller
or equal to the enclosed quantity). If we are only interested in detecting ed errors,
then the minimum distance should be dmin ed + 1. However, if we are interested in
detecting ed errors and correcting ec errors, then the minimum distance should be
dmin ed + ec + 1. Accordingly, the Hamming (7,4) code is a single-error-
correcting and double-error-detecting code. More generally, Hamming codes are
(n, k) linear block codes with following parameters:
• Block length: n ¼ 2m 1
• Number of message bits: k ¼ 2m m 1
• Number of parity bits: n k ¼ m
• dmin ¼ 3
where m 3. Hamming codes belong to the class of perfect codes, the codes that
satisfy the Hamming inequality given as [1–7]:
Xt
n
2 nk
: ð9:9Þ
i¼0
i
This bound gives how many errors t can be corrected with a specific (n, k) linear
block code.
The coding gain of a linear (n, k) block is defined as the relative saving in the
energy per information bit for a given bit error probability when coding is applied.
Since the total information word energy kEb must be the same as the total codeword
energy nEc (where Ec is the transmitted bit energy, while Eb is the information bit
energy), we can establish the following relationship:
where R defines the coding rate. As an example, the probability of error for BPSK
on an AWGN channel, when coherent hard-decision (bit-by-bit) demodulator is
used, can be obtained as:
rffiffiffiffiffiffi rffiffiffiffiffiffiffiffi
1 Ec 1 REb
p ¼ erfc ¼ erfc , ð9:11Þ
2 N0 2 N0
674 9 Advanced Coding and Coded Modulation Techniques
where erfc(x) function is defined in Chap. 2. By using the Chernoff bound [3], we
obtain the following expression for the coding gain when hard decision is applied in
decoding process:
ðEb =N 0 Þuncoded
Rðt þ 1Þ, ð9:12Þ
ðEb =N 0 Þcoded
ðEb =N 0 Þuncoded
Rdmin , ð9:13Þ
ðEb =N 0 Þcoded
By comparing Eqs. (9.12) and (9.13), we can see that the soft-decision coding gain
is about 3 dB better than hard-decision coding gain since the minimum distance
dmin 2 t + 1.
In fiber-optics communications, it is common to use the expression for BER on
an AWGN for on-off keying and express both coding gain (CG) and net coding gain
(NCG) as follows [1, 2, 6–12]:
CG ¼ 20log10 erfc1 ð2BERt Þ 20log10 erfc1 ð2BERin Þ ½dB ð9:14Þ
NCG ¼ CG þ 10log10 R ½dB ð9:15Þ
where BERin denotes the BER at the input of FEC decoder, BERout denotes the BER
at the output of FEC decoder, while BERt denotes the target BER (which is typically
1015).
In the rest of this section, we describe several important coding bounds including
Hamming, Plotkin, Gilbert-Varshamov, and Singleton ones [2, 3]. The Hamming
bound has already been introduced for binary linear block codes (LBC) and was
expressed by Eq. (9.9). The Hamming bound for q-ary (n, k) LBC is given as:
n n n n
1 þ ðq 1Þ þ ðq 1Þ2 þ . . . þ ðq 1Þi þ . . . þ ðq 1Þt qk qn ,
1 2 i t
ð9:16Þ
n
where t is the error-correction capability and ðq 1Þi is the number of
i
received words that differ from a given codeword in i symbols. The codes satisfying
the Hamming bound with equality sign are known as perfect codes. Hamming codes
are perfect codes since n ¼ 2n – k 1, which is equivalent to (1 + n)2k ¼ 2n, so that
the relationship between the right and left side of Eq. (9.16) is expressed by equality
sign. The (n, 1) repetition code is also example of a perfect code.
9.2 BCH Codes Fundamentals 675
The Plotkin bound is defined by the following relation for minimum distance:
n2k1
d min : ð9:17Þ
2k 1
Namely, if all codewords are written as the rows of a 2k n matrix, each column
will contain 2k 1 “zeros” and 2k 1 “ones,” with the total weight of all codewords
being equal to n2k 1.
Gilbert-Varshamov bound is based on the property that the minimum distance
dmin of a linear (n, k) block code can be determined as the minimum number of
columns in H-matrix that adds to zero, i.e.:
n1 n1 n1
þ þ ... þ < 2nk 1: ð9:18Þ
1 2 dmin 2
dmin n k þ 1: ð9:19Þ
This bound is straightforward to prove. Let only one bit of value 1 be present in
information vector. If it is involved in n k parity checks, the total number of ones
in codeword cannot be larger than n k + 1. The codes satisfying the Singleton
bound with equality sign are known as the maximum-distance separable (MDS)
codes (e.g., RS codes are MDS codes).
The BCH codes, the most famous cyclic codes, were discovered by Hocquenghem
in 1959 and by Bose and Chaudhuri in 1960 [2–5]. Among many different decoding
algorithms, the most important are Massey-Berlekamp algorithm and Chien’s
search algorithm. An important subclass of BCH is a class of Reed-Solomon
codes proposed in 1960.
Equipped with this knowledge of Galois fields, we can continue our description
of structure of BCH codes. Let the finite field GF(q) (symbol field) and extension
field GF(qm) (locator field), m 1, be given. For every m0 (m0 1) and Hamming
distance d, there exists a BCH code with the generating polynomial g(x), if and only
if it is of smallest degree with coefficients from GF(q) and the roots from the
extension field GF(qm) as follows [2, 5]:
where α is from GF(qm). The codeword length is determined as the least common
multiple of orders of roots. (The order of an element β from finite field is the
smallest positive integer j such that βj ¼1.)
676 9 Advanced Coding and Coded Modulation Techniques
It can be shown that for any positive integer m (m 3) and t (t < 2m 1), there
exists a binary BCH code having the following properties:
• Codeword length: n ¼ 2m 1
• Number of parity bits: n k mt
• Minimum Hamming distance: d 2 t + 1.
This code is able to correct up to t errors. The generator polynomial can be found
as the LCM of the minimal polynomials of αi:
where α is a primitive element in GF(2m) and Pαi ðxÞ is the minimal polynomial of αi.
Let c(x) ¼ c0 + c1x + c2x2 + . . . + cn 1xn 1 be the codeword polynomial, and let
the roots of generator polynomial be α, α2,. . ., α2t, where t is the error-correction
capability of BCH code. Because the generator polynomial g(x) is the factor of
codeword polynomial c(x), the roots of g(x) must also be the roots of c(x):
c αi ¼ c0 þ c1 αi þ . . . þ cn1 αðn1Þi ¼ 0; 1 i 2t ð9:22Þ
This equation can also be written as inner (scalar) product of codeword vector
c ¼ [c0 c1 . . . cn 1] and the following vector [1 αi α2i . . . α2(n 1)i]:
2 3
1
6 i 7
6α 7
½c0 c1 . . . cn1 6
6...
7 ¼ 0; 1 i 2t
7 ð9:23Þ
4 5
αðn1Þi
where H is the parity-check matrix of BCH code. Using the property 2 of GF(q)
from previous section, we conclude that αi and α2i are the roots of the same
minimum polynomial, so that the even rows in H can be omitted to get the final
version of the parity-check matrix of BCH codes:
9.2 BCH Codes Fundamentals 677
2 3
αn1 αn2 ... α 1
6 ðα 3 Þ
n1
ðα3 Þ
n2
... α3 1 7
6 7
6
5 n1
5 n2 7
H¼6
6 α α ... α5 1 7
7 ð9:25Þ
6 7
4 ... ... ... ... ...5
2t1 n1 2t1 n2
ðα Þ ðα Þ . . . α2t1 1
For example, (15,7) 2-error-correcting BCH code has the generator polynomial [6]:
wherein the primitive polynomial used to design this code is p(x) ¼ x4 + x + 1. The
corresponding parity-check matrix is given by:
α14 α13 α12 α 1
H¼ :
α42 α39 α36 α3 1
By using the GF(24) property α15 ¼ 1, we can rewrite the parity-check matrix as:
14
α α13 α12 α11 α10 α9 α8 α7 α6 α5 α4 α3 α2 α 1
H¼ :
α12 α9 α6 α3 1 α12 α9 α6 α3 1 α12 α9 α6 α3 1
The BCH code is able to correct up to t errors. Let us assume that error polynomial e
(x) does not have more than t errors, which can then be written as:
eðxÞ ¼ ej1 xj1 þ ej2 xj2 þ . . . þ ejl xjl þ . . . þ ejv xjv ; 0 v t ð9:26Þ
where ej1 is the error magnitude, αjl is the error-location number, while jl is the error
location. Notice that the error magnitudes are from symbol field, while the error-
location numbers are from extension field. The corresponding syndrome compo-
nents can be obtained from (9.26) and (9.24) as follows:
j
j
j
j
Si ¼ ej1 αi 1 þ ej2 αi 2 þ . . . þ ejl αi l þ . . . þ ejv αi v ; 0 v t ð9:27Þ
S1 ¼ Y 1 X 1 þ Y 2 X 2 þ . . . þ Y v X v
S2 ¼ Y 1 X21 þ Y 2 X22 þ . . . þ Y v X2v
ð9:28Þ
...
S2t ¼ Y 1 X2t
1 þ Y 2 X2 þ . . . þ Y v X v :
2t 2t
678 9 Advanced Coding and Coded Modulation Techniques
Y
v
σ ðxÞ ¼ ð1 þ Xi xÞ ¼ σ v xv þ σ v1 xv1 þ . . . þ σ 1 x þ 1, ð9:29Þ
i¼1
where the σ is, also known as elementary symmetric functions, are given by Viète’s
formulas:
σ 1 ¼ X1 þ X2 þ . . . þ Xv
X
σ2 ¼ Xi Xj
i<j
X
σ3 ¼ X i X j Xk ð9:30Þ
i<j<k
...
σ v ¼ X1 X2 . . . X v
Because {Xl} are the inverses of the roots of σ(x), σ(1/Xl) ¼ 0 8 l, and we can
write [2–7]:
Xlv σ X1
l ¼ Xlv þ σ 1 Xv1
l þ . . . þ σv: ð9:31Þ
By multiplying the previous equation by Xlj and performing summation over l for
fixed j, we obtain:
X
v
Svþj ¼ σ i Svþji ; j ¼ 1, 2, . . . , v ð9:33Þ
i¼1
where Sv + j represents the output of shift register as shown in Fig. 9.3. The Massey-
Berlekamp algorithm is summarized by the flowchart shown in Fig. 9.4, which is
self-explanatory.
Sv+j=-s 1Sv+j-1-s 2Sv+j-2-… -s vSv
-s 1 -s 2 -s v-1 - sv
SV+j-1 SV+j-2 Sj
Initialization:
γ =0, σ (x)=σ0=1, L =0, a(x)=1
γ =1, 2, …, 2t
L
Δ = ∑ σ i Sγ − i
i =0
Δ ≠ 0 No
Yes
σ ' ( x ) = σ ( x ) − Δxa ( x )
No
2L < γ
Yes
a ( x) = Δ σ ( x)
−1
a ( x ) ← xa ( x ) a ( x ) ← xa ( x )
L ←γ − L
σ ( x) = σ '( x)
Yes
deg [σ ( x ) ] ≠ L More than t errors
occurred
No
Once the locator polynomial is determined, we have to find the roots and invert
them to obtain the error locators. To determine the error magnitudes, we have to
define another polynomial, known as the error-evaluator polynomial, defined as
follows [6]:
l
: ð9:35Þ
1
1 þ Xi Xl
i¼1, i6¼l
For binary BCH codes, Yl ¼ 1 so that we do not need to evaluate the error
magnitudes.
Since the bits in codeword are statistically dependent, the encoding process can be
described by the finite state machine, with precisely determined initial and terminal
states. We can further describe the encoding by means of trellis [13] and perform
maximum likelihooddecoding using the Viterbi algorithm [2–7].
Let linear block code (n, k) be defined over GF(2). The corresponding parity-
check matrix of dimension (n k) n can be written as:
H ¼ ½h1 h2 . . . hn , ð9:36Þ
where hi denotes the i-th column of parity-check matrix. The codeword vector
c ¼ (c1c2. . .cn) satisfies the following equation:
cHT ¼ 0: ð9:37Þ
Let the code be systematic with the first k bits representing the information bits and
last n k bits representing the parity bits. The state at depth j is denoted by Sj. The
number of states in trellis is determined by 2n k, each represented in binary form as
a vector of length n k. Let the information vector be denoted by m ¼ (m1 m2. . .mk).
The new state at depth j, Sj, is related to the previous state Sj 1 by [13]
9.3 Trellis Description of Linear Block Codes and Viterbi Decoding Algorithm 681
j
Sj 0 1 2 3 4 5 6 7
(000)
(001)
(010)
(011)
(100)
(101)
(110)
(111)
Sj ¼ Sj1 þ cj hj , ð9:38Þ
where cj ¼ mj (for j k). For j ¼ k + 1,. . .,n, the corresponding parity bits are
obtained by generalized parity checks according to the generator matrix G. For
terminal state Sn to be equal to initial state S0, Eq. (9.37) is to be satisfied. Different
paths throughout the trellis correspond to 2k different codewords.
For example, the parity-check and generator matrices of Hamming (7,4) code are
given respectively as:
2 3
2 3 1 0 0 0 1 1 1
1 1 0 1 1 0 0 60 1 0 0 1 0 17
H ¼ 41 0 1 1 0 1 05 G¼6
40
7
0 1 0 0 1 15
1 1 1 0 0 0 1
0 0 0 1 1 1 0
The corresponding trellis is shown in Fig. 9.5. The solid edges correspond to cj ¼ 1,
while dashed edges to cj ¼ 0. There are 2n – k ¼ 8 states in trellis represented as
3-tuples. The total number of paths through trellis is 2k ¼ 16, and these paths
correspond to different codewords. This trellis is created based on Eq. (9.38). For
example, for j ¼ 1 and c1 ¼ 0, the terminal state is obtained by S1 ¼ S0 + 0
h1 ¼ (000) + 0(111) ¼ (000), while for c1 ¼ 1, the terminal state is obtained by
S1 ¼ S0 + 1 h1 ¼ (000) + 0(111) ¼ (111). For j ¼ 2, initial state S1 ¼ (111) and
c2 ¼ 1, we arrive at terminal state S2 ¼ S1 + 1 h2 ¼ (111) + 1(101) ¼ (010) and so
on. After j ¼ 3 we can see that trellis is fully developed, there exist 16 paths leading
to 8 nodes (with two edges reaching the terminal state). These 16 paths correspond
to 16 possible information sequences of length 4. The number of possible transi-
tions after j ¼ k reduces dramatically because the remaining bits c5, c6, and c7 are
parity bits, which are algebraically related to the previous information bits. For q-
ary linear block codes, once the trellis is fully developed, the every node will have
682 9 Advanced Coding and Coded Modulation Techniques
q outgoing and q incoming edges. It is interesting to notice that the trellis for liner-
block codes is time variant.
The decoding rule for choosing an estimate of the code vector C, given the
received vector r, is optimum when the probability of decoding error is minimized.
The maximum likelihood (ML) decoder decision rule can be formulated as follows:
Chose the estimate of C if the log-likelihood function logpRjC(r| c) is maximum.
The log-likelihood function, given the transmitted codeword c ¼ (c1c2. . .cn),
assuming that components of receiver word r ¼ (r1r2. . .rn) are statistically inde-
pendent and noise is additive can be written as follows:
X
n X
n
logpRjC ðrjcÞ ¼ log pNi ðr i jci Þ ¼ Mi ðr i ; ci Þ≜ MðCÞ, ð9:39Þ
i¼1 i¼1
where pR|C(r|c) is the joint probability density function (PDF), pNi ðr i jci Þ is the noise
PDF, and Mi is the branch metric. The ML decoder provides the codeword C that
minimizes the path metric M(C). Consider BPSK coherent optical communication
system with homodyne-balanced detection and amplified spontaneous emission
(ASE) noise-dominated scenario. The corresponding PDF function will be:
pffiffiffiffiffiffiffiffi
1 ðri ci 2RPD PS PLO Þ2
pNi ðr i jci Þ ¼ pffiffiffiffiffi e 2σ 2 , ð9:40Þ
σ 2π
where RPD is the photodiode responsivity, Ps and PLO are the average powers of
incoming and local laser respectively, and σ 2 is the variance of equivalent noise
process dominated by ASE noise. The corresponding log-likelihood function can be
obtained by
X pffiffiffiffiffiffiffiffiffiffiffiffiffi 2
n
ðr i ci 2RPD PS PLO Þ n
logpRjC ðrjcÞ ¼ 2
log πσ 2
2σ 2
i¼1
X n ð9:41Þ
¼ A r i ci þ B ¼ Aðr cÞ þ B,
i¼1
where A and B are constants independent on transmitted codeword. The path metric
is therefore the inner (scalar) product of the received word and transmitted
codeword.
The brute force decoding method would mean to try all possible codewords 2k
and select one that minimizes the path metric M(C) ¼ rc. The better option would
be to use Viterbi algorithm [2–7, 14], which is a recursive algorithm, whereby many
codewords can be discarded from consideration in determination of c that mini-
mizes the path metric. Alternatively, we can use the square Euclidean metric, which
is equivalent to the correlation metric as shown by Eq. (9.68). The square Euclidean
metric can also be used for ASK transmission, wherein ci2{0,1}. Below we provide
an illustrative example that employs the squared Euclidean metric and ASK. To
9.3 Trellis Description of Linear Block Codes and Viterbi Decoding Algorithm 683
Table 9.1 Illustrating the soft Viterbi decoding of Hamming (7,4) code
repeat the decoding procedure. The all-zero codeword will be detected again.
However, when two errors are introduced, the Viterbi decoder will fail to determine
the correct codeword. On the other hand, by checking the syndrome equation, we
can detect the double error.
If the probability of error is independent of the transmitted bit value, the
corresponding channel is called the binary symmetric channel (BSC). This channel
is completely described by transition (crossover) probability: P(ri ¼ 1| ci ¼ 0) ¼ P
(ri ¼ 0| ci ¼ 1) ¼ p. Because
p, r i 6¼ ci
pðr i jci Þ ¼ ,
1 p, r i ¼ ci
logpðrjcÞ ¼ d H logpþ ðn
dH Þlogð1 pÞ
p ð9:42Þ
¼ d H log þ nlogð1 pÞ,
1p
where dH is the Hamming distance between the received word r and transmitted
codeword c. Therefore, for p < 1/2, the ML rule for BSC can be formulated as:
Choose the estimate C that minimizes the Hamming distance between the
received vector r and codeword c.
For intensity modulation with direct detection (IM/DD), it was found in [15] that
distribution of PDF tails is exponential rather than Gaussian, so that square root
metric is more suitable than Euclidean metric. Some other metrics suitable for IM/
DD systems are discussed in [16]. For high-speed long-haul optical communication
system, such as those operating at 40 Gb/s and above, the influence of self-phase
modulation (intrachannel four-wave mixing in systems with direct detection and
nonlinear phase noise in systems with coherent detection) is important, and we have
to use the metric given by Eq. (9.66), providing that interleaving is used so that
neighboring symbols are independent of each other. The PDF has to be estimated by
histogram methods. An alternative would be to use the Edgeworth expansion
method as we described in [17].
So far we were concerned with different classes of linear block codes. Another
important class of codes is based on convolutional codes. Convolutional codes of
practical importance are commonly (n, 1) codes, whose code rate is low 1/n and as
such are not suitable for fiber-optics communication, because the penalty due to
chromatic dispersion is highly severe at high-data rates. The code rate can be
increased by puncturing, at the expense of performance degradation. On the other
hand, the recursive systematic convolutional (RSC) codes are usually employed as
component codes for turbo codes that are used in wireless and deep-space
communications.
9.4 Convolutional Codes 685
In a systematic (n, k) linear block code, information bits get unchanged during the
encoding process, only n k parity-check bits are added that are algebraically
related to the information bits. If the information bits are statistically independent,
the parity (redundant) bits will only be dependent on the information block of
current codeword, so that the codewords are statistically independent. On the other
hand in an (n, k, M ) convolutional code, the parity bits are not only the function of
current information k-tuple but also the function of previous m information k-tuples.
The statistical dependence is therefore introduced in a window of K ¼ n(M + 1)
symbols, which is known as the constraint length. The constrained length repre-
sents the number of coded symbols influenced by a single message symbol. The
general architecture of a convolutional code is shown in Fig. 9.6. The k information
bits are taken during encoding process from a serial-to-parallel converter (S/P) that
follows an information buffer as the input of the encoder memory of size k-by-M.
The same bits are also used as the input to the combinational logic, which deter-
mines the n-outputs based on current k-tuple and previous Mk bits. The logic
outputs are written in parallel to the output shift register, and the codeword is
transmitted in a serial fashion over the channel.
An example of nonsystematic convolutional (2,1,2) code is shown in Fig. 9.7.
This encoder has the code rate R ¼ 1/2 and has M ¼ 2 flip-flops as memory
elements. Let the input sequence to the encoder be denoted by m ¼ (m0 m1 . . . ml
. . .).
The corresponding
output
sequences are
denoted with
ð1Þ ð1Þ ð1Þ ð2Þ ð2Þ ð2Þ
cð1Þ ¼ c0 c1 . . . cl . . . and cð2Þ ¼ c0 c1 . . . cl . . . , respectively. The
encoder
sequence is obtained bymultiplexing two output sequences as follows:
ð1Þ ð2Þ ð1Þ ð2Þ ð1Þ ð2Þ
c ¼ c0 c0 c1 c1 . . . cl cl . . . . For convolutional (2,1,2) code shown in
Fig. 9.7, the output sequences are related to the input sequence by:
1 2 3 … M-1 M
1
2
Information S/P
… … …
buffer converter
k-1
k
…
… LOGIC
…
n-bit shift register
c(1)
c
m
c(2)
ð1Þ ð2Þ
cl ¼ ml þ ml2 , cl ¼ ml þ ml1 þ ml2 :
where the generator sequences are obtained as the response to the unit step
sequence (100. . .). The generator sequence, representing the impulse response of
corresponding input-output path, can also be determined as the sequence of con-
nections from the shift register to the pertinent adder, with 1 representing the
existence of connection and 0 representing the absence of connection.
The encoding process in convolutional encoder can also be represented in
similar fashion to that of the block codes, as matrix product of the input message
vector m and generator matrix G:
2 3
ð1Þ ð2Þ ð1Þ ð2Þ ð1Þ ð2Þ
g0 g0 g1 g1 g2 g2 0 0 0 0 ...
6 7
6 ð1Þ ð2Þ ð1Þ ð2Þ ð1Þ ð2Þ 7
6 0 0 g0 g0 g1 g1 g2 g2 0 0 ... 7
6 7
c ¼ mG, G ¼ 6
6 0 0 0 0 g0
ð1Þ ð2Þ
g0
ð1Þ
g1
ð2Þ
g1 g2
ð1Þ
g2
ð2Þ 7
. . . 7:
6 7
6 ⋮ ⋮ ⋱ ⋱ ⋮ ⋮ 7
4 5
ð1Þ ð2Þ ð1Þ ð2Þ ð1Þ ð2Þ
0 0 0 0 g0 g0 g1 g1 g2 g2
ð1Þ ð2Þ ðnÞ
where Gl ¼ gl gl . . . gl ; l ¼ 0, 1, . . . , M. Since the number of memory ele-
ments in shift register is M, there exist n generator sequences g(i) (i ¼ 1,2,. . .,n) of
length M + 1, and n output sequences c(l ) (l ¼ 1,..,n) are multiplexed before being
transmitted over the channel. The j-th output symbol and l-th input symbol are
related by the following convolution relationship:
ðjÞ
X
M
ðjÞ
cl ¼ mli gi : ð9:44Þ
i¼0
mðDÞ ¼ m0 þ m1 D þ m2 D2 þ . . .
ðjÞ ðjÞ ðjÞ
ð9:45Þ
cðjÞ ðDÞ ¼ c0 þ c1 D þ c2 D2 þ . . .
For (2,1,2) convolutional encoder shown in Fig. 9.7, the corresponding transform-
domain representations of generator polynomials can be written as:
g1 ðDÞ ¼ 1 þ D2 g2 ð D Þ ¼ 1 þ D þ D 2 :
For an arbitrary (n,k,M ) convolutional code, we have to split the input sequence
into k subsequences m ¼ [m1 m2 . . . mk] and define the generator matrix as:
2 3
G0 G1 GM
6 G0 G1 GM 7
G¼6
4
7, ð9:47AÞ
G0 G1 GM 5
⋱
where
2 3
ð11Þ ð12Þ ð1nÞ
g gl gl
6 lð21Þ ð22Þ ð2nÞ 7
6 gl gl gl 7
Gl ¼ 6 7,
4 ⋮ ⋮ ⋱ ⋮ 5
ðk1Þ ðk2Þ ðknÞ
gl gl gl
where
0 0 1 þ D þ D2
m ðDÞ¼mðDÞTðDÞ; T½D¼ 1 þ D , G ðDÞ ¼ 1
2
:
1 þ D2
Because both generator matrices, G(D) and G’(D), will generate the same output
sequence for the same input sequence, we can say that that these two matrices are
equivalent, which represents a necessary condition. For two generator matrices to
be equivalent, the T(D) matrix should be invertible, which represents the sufficient
condition. In previous example, m(D) can be obtained from m’(D) by:
9.4 Convolutional Codes 689
c(1)
c(2)
Fig. 9.8 The systematic encoder equivalent to the nonsystematic encoder shown in Fig. 9.7
0 1
mðDÞ¼m ðDÞT1 ðDÞ; T1 ½D¼ :
1 þ D2
Therefore, two generator matrices G(D) and G’(D) ¼ T(D)G(D) are equivalent if
the matrix T(D) is invertible. In the example above, G’(D) is in systematic form;
unfortunately its elements are not polynomials but rather rational functions. The
parity sequence can be generated by first multiplying the input sequence by
1 + D + D2 and then dividing by 1 + D2. One possible implementation is shown
in Fig. 9.8.
Similarly to the linear block codes, we can define the parity-check matrix in
transform domain H(D) (of size (n k) k) that satisfies the following equation:
For nonsystematic codes, the code sequence on receiver c(D) should be multi-
plied by G1(D) to determine the information sequence:
where the multiplication with Dl corresponds to the delay. Therefore, the generator
matrix must be invertible. If not, the corresponding convolutional code is cata-
strophic, that is, the finite number of channel errors will introduce infinite number
of decoding errors. The sufficient condition for the convolutional code to be
non-catastrophic is that the greatest common divisor (GCD) of all submatrices
of
n
size k k be equal to Dl. (The number of these submatrices is .) The
k
systematic codes cannot be catastrophic because their generator matrix is invertible.
Any non-catastrophic convolutional code can be transformed into systematic
equivalent. For our example shown in Fig. 9.8, the GCD can be found as:
GCD 1 þ D2 ; 1 þ D þ D2 ¼ 1 ¼ D0 :
Therefore, for the (n,1,M ) codes, it is sufficient not to have any common roots
among generator polynomials except probably one of the form Dl.
The convolutional codes can be considered as being a subclass of so-called
trellis codes. The trellis codes can be described as finite state machines, with the
output being the function of Mk previous bits and k current bits, which output can be
described in the form of trellis. If the trellis encoder is time invariant and linear, the
corresponding code is called the convolutional code.
Similarly as in block codes where the error-correction capability is related to the
minimum Hamming distance and decoding algorithm, the performance of
convolutional codes is determined by decoding algorithm and so-called free dis-
tance of the code, dfree. The free distance of convolutional codes is defined as the
minimum Hamming distance between any two codewords in the code. Because the
convolutional codes contain all-zero codeword and belong to the class of linear
codes, the free distance can be determined as the minimum weight output codeword
sequence caused by a certain nonzero input sequence. The following three algo-
rithms are commonly used in decoding of convolutional codes: (i) majority logic
decoding, (ii) sequential decoding, and (iii) decoding by Viterbi algorithm. The
Viterbi algorithm is the most popular, and it is already explained in the previous
section. The only difference is in trellis, which is in the case of convolutional codes
time invariant, so that Viterbi decoder of convolutional codes is simpler to imple-
ment than that of block codes. The description of other two decoding algorithms can
be found in any textbook on channel coding [3–7]. The calculation of free distance
of convolutional codes is described below.
9.4 Convolutional Codes 691
m c
(a)
10/1 10
11 11
d
01/1 01/0 01 01
10/0 10
10 01 b 10 01 c
00/1 00
11/1 11/0 11 11
a
00 00
00/0 00
(b) (c)
Fig. 9.9 Convolutional (2,1,2) code: (a) encoder, (b) state diagram, and (c) version 2 of state
diagram
692 9 Advanced Coding and Coded Modulation Techniques
D2LI DL D2L
a0 b c a1
Fig. 9.10 The modified state diagram of convolutional (2,1,2) code from Fig. 9.9a
the terminal state is 11. Another equivalent representation is given in Fig. 9.9c,
where dashed lines correspond to input bit 1 and the solid lines correspond to input
bit 0.
The state diagram can be used as an effective tool to determine the generating
function of the code. First of all, we have to modify the state diagram as shown in
Fig. 9.10. The all-zero state a is split into an initial state a0 and a final state a1.
The labels of edges are changed as well. The label of each edge is composed of
three letters with corresponding exponents. The exponent of I represents the
Hamming weight of input (for bit zero we obtain I0 ¼ 1), the exponent of L is the
branch length, and the exponent of D represents the Hamming weight of
the encoder output corresponding to the input of observed edge. With different
paths from initial to final state in modified state diagram, we associate the
corresponding label by concatenating the edge labels. For example, the path
a0bdca1 has the label D6L4I3. The path starting at a0 and ending at a1 is called
the fundamental path. If the number of paths starting at a0 and ending at a1 with
label DdLlIi is denoted by Td,l,i, the following generating function will represent the
complete path enumerator [2–7, 18]:
1 X
X 1 X
1
T ðD; L; I Þ ¼ T d, l, i Dd Ll I i : ð9:54Þ
d¼1 l¼1 i¼1
For the example shown in Fig. 9.10, we can determine the T(D,L,I ) by using the
Mason’s gain formula [19] from signal-flaw graph theory to obtain [18]:
D5 L3 I
T ðD; L; I Þ ¼
1 DLI ð1 þ LÞ
¼ D5 L3 I þ D6 L4 I 2 ð1 þ LÞ þ D7 L5 I 3 ð1 þ LÞ2 þ . . . ð9:55Þ
From Eq. (9.55) we conclude that there are no fundamental paths at distance 0, 1,
2, or 3 from the all-zero path; and there is a single fundamental path at distance
9.4 Convolutional Codes 693
All-zero path
Error events
5 from all-zero path meaning that the free distance of this convolutional code is
dfree ¼ 5. This implies that Viterbi decoder can correct up to two errors in decoded
sequence.
The modified state diagram can also be used to estimate the bit error ratios
(BERs). Without loss of generality, for an AWGN channel model, we will assume
that the all-zero codeword was transmitted (c ¼ 0). We will say that an error event
has occurred if a nonzero codeword survives at state 0, therefore eliminating the
correct path (all-zero codeword), which is illustrated in Fig. 9.11.
The probability that the first error event E of weight d occurs is given by [6]:
8 !
>
> Xd d i
>
> p ð1 pÞdi , d is odd
>
>
< i¼dþ1 i
PðE; d Þ ¼
2
! !
>
> 1 d Xd d i
>
> d=2
>
> p ð1 pÞ þ
d=2
p ð1 pÞdi , d is even
: 2 d=2 i
i¼ þ1
d
2
ð9:56Þ
which is always smaller than P(E, d) < 2dpd/2(1 p)d/2, where p is the crossover
probability of BSC. The event error probability upper bound can be determined by [6]:
X
1
PE < T d PðE; d Þ, ð9:57Þ
d¼dfree
1 X 1
BER βd PðE; dÞ ð9:59Þ
k d¼d
free
694 9 Advanced Coding and Coded Modulation Techniques
where βd denotes the number of nonzero data bits carried by all Td paths of weight
d. By setting L ¼ 1 in (9.55), we obtain:
1 X
X 1
T ðD; I Þ ¼ T d , i Dd I i : ð9:60Þ
d¼dfree i¼1
¼ iT d, i Dd ¼ β d Dd , βd ¼ iT d, i ð9:61Þ
∂I I¼1 d¼d i¼1 d¼d i¼1
free free
Finally, by comparing (9.59) and (9.61), we conclude that BER is upper bounded
by:
1 ∂T ðD; I Þ 1 X 1
BER ¼ β d Dd : ð9:62Þ
k ∂I I¼1 k d¼d free
where Eb/N0 is electrical bit energy per power spectral density ratio and the
parameter D from (9.62) can be estimated as:
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi Eb
D ¼ 4pð1 pÞ 1:06 exp : ð9:64Þ
N0
where R is the code rate. For high SNRs, only the first term in summation above
dominates:
1 dfree REb Eb
BER 1:06 βd exp
d free
for large ð9:65Þ
k 2N 0 N0
The corresponding expression for uncoded BER at high SNR can be estimated by:
Eb
BERunc 0:282 exp : ð9:66Þ
N0
9.5 RS Codes, Concatenated Codes, and Product Codes 695
For binary input AWGN channel, we can repeat the similar procedure and obtain
the following asymptotic coding gain for soft decoding:
The Reed-Solomon (RS) codes were discovered in 1960 and represent a special
class of nonbinary BCH codes [2–7, 20]. RS codes represent the most commonly
used nonbinary codes. Both the code symbols and the roots of generating polyno-
mial are from the locator field. In other words, the symbol field and locator field are
the same. The codeword length of RS codes is determined by n ¼ qm 1 ¼ q 1,
so that these codes are relatively short codes. The minimum polynomial for some
element β is Pβ (x) ¼ x β. If α is the primitive element of GF(q) (q is a prime or
prime power), the generator polynomial for t-error-correcting Reed-Solomon code
is given by:
gðxÞ ¼ ðx αÞ x α2 x α2t : ð9:69Þ
The generator polynomial degree is 2 t, and it is the same as the number of parity
symbols n k ¼ 2t, while the block length of the code is n ¼ q 1. Since the
minimum distance of BCH codes is 2 t + 1, the minimum distance of RS codes is
dmin ¼ n k + 1, satisfying therefore the Singleton bound (dmin n k + 1) with
equality, thus, belonging to the class of maximum-distance separable (MDS) codes.
When q ¼ 2m, the RS codes parameters are n ¼ m(2m 1), n k ¼ 2 mt, and
dmin ¼ 2 mt + 1. Therefore, the minimum distance of RS codes, when observed as
binary codes, is large. The RS codes may be considered as burst error-correcting
codes and as such are suitable for bursty-error-prone channels. This binary code is
able to correct up to t bursts of length m. Equivalently, this binary code will be able
to correct a single burst of length (t 1)m + 1.
The weight distribution of RS codes can be determined as [2, 5, 14]:
X
id
j i1
min
n
Ai ¼ ð q 1Þ ð1Þ qidmin j , ð9:70Þ
i j¼0
j
696 9 Advanced Coding and Coded Modulation Techniques
and by using this expression, we can evaluate the undetected error probability as
[2, 5, 14]
X
n
Pu ð e Þ ¼ Ai pi ð1 pÞni , ð9:71Þ
i¼1
Checks on
rows
k1k2 information
k2
symbols
n2
Checks
Checks on columns on
checks
AWGN:
-2
10 Uncoded
RS(255,239); R=0.94
-3 RS(255,223); R=0.87
10
RS(255,239)+RS(255,239); R=0.88
Bit-error rate, BER
-4 RS(255,223)+RS(255,223); R=0.76
10 RS(255,223)+RS(255,239); R=0.82
RS(255,239)+RS(255,223); R=0.82
-5
10
-6
10
-7
10
-8
10
-9
10
Fig. 9.14 BER performance of concatenated RS codes on an optical on-off keying channel
(n1,k1,d1) code, while each column is a codeword from another C2 (n2,k2,d2) code,
where ni, ki and di (i ¼ 1,2) are the codeword length, dimension, and minimum
distance of i-th component code, respectively. Turbo product codes were originally
proposed in [29]. Both binary (such as binary BCH codes) and nonbinary codes
(such as RS codes) may be arranged in a product code manner. It is possible to show
that the minimum distance of a product codes is the product of minimum distances
of component codes. Accordingly, it can be shown that the product code is able to
correct the burst error of length b ¼ max(n1b2,n2b1), where bi is the burst error
capability of component code i ¼ 1,2.
The results of Monte Carlo simulations for several RS concatenation schemes on
an optical on-off keying AWGN channel are shown in Fig. 9.14. The net coding
gain is measured by difference in Q-values for a specific BER. As we can see, the
concatenation scheme RS(255,239) + RS(255,223) of code rate R ¼ 0.82 out-
performs all other combinations.
698 9 Advanced Coding and Coded Modulation Techniques
Each new codeword completes one column of this array. In the example above, the
codeword xi completes the column (frame) xi,1,xi 1,2,. . .,xi(N 1),n. A generali-
zation of this scheme, in which the components of i-th codeword xi (say xi,j and
xi,j + 1) are spaced λ frames apart, is known as λ-frame delayed interleaving.
Interleaving is an efficient way to deal with error bursts introduced by fading
effects in wireless communication channels. In the presence of burst of errors, the
code designed for random error needs to deal with both random errors and burst
errors. By using coding with interleaving, we spread error bursts due to deep fades
over many codewords such that each received codeword only exhibits at most a few
simultaneous symbol errors, which can be corrected for. The interleaver depth must
be large enough so that fading is independent across a received codeword. Slowly
fading channels require large interleavers, which can introduce the large decoding
delays. In the block interleaver discussed above, During transmission, two neigh-
boring codeword symbols, originating the same codeword, are separated by L 1
symbols form other codewords, so that the symbols from the same codeword will
experience approximately independent fading conditions providing that their sep-
aration in time is greater than the channel coherence time Tc:
9.6 Coding with Interleaving 699
Modulator Channel
column-wise
Codewords
fashion
read in
Block interleaver
x11 x12 … x1k … x1n
Source Codewords written in
Block x21 x22 … x2k … x2n
bits encoder row-wise fashion
…
xL1 xL2 … xLk … xLn
k information bits n-k parity
bits
From
Demodulator
channel
deinterleaver
wise fashion
Written into
in column-
Fig. 9.15 Illustrating block coding with interleaving and deinterleaving principles
LT s T c 1=BD , ð9:72Þ
where Ts is the symbol duration and BD is the Doppler spread. The block coding
with interleaving is illustrated in Fig. 9.15.
The codewords from block encoder are written into block interleaver in column-
wise fashion. After L codewords are written, the modulator reads bits form the
interleaver in column-wise fashion, starting from the first column. On receiver side,
after demodulation, for hard decision, the bits upon hard decision are written into
deinterleaver in column-wise fashion. Once the deinterleaver is filled, the block
decoder reads the content of deinterleaver in row-wise fashion, and decoding
process takes place. On the other hand, for soft-decision decoding corresponding
samples are written into deinterleaver in column-wise fashion. For two-dimensional
signaling schemes, the two samples, corresponding to in-phase and quadrature
channel, are written in a column-wise fashion. The i-th row and j-th element of
deinterleaver is then represented as yij ¼ (yij,I, yij,Q), where the first component
corresponds to the sample in in-phase channel, while the second component
700 9 Advanced Coding and Coded Modulation Techniques
Buffering stage
Buffering stage
z −(L−1)
−1
…
Convolutional z Convolutional
Channel
decoder
…
encoder −1
z
z −(L−1)
Fig. 9.16 Illustration of convolutional coding with interleaving and deinterleaving principles
corresponds to the sample in quadrature channel. These channel samples are read in
row-wise fashion by soft-decision block decoder.
When convolutional code is used instead of block code, the corresponding
convolutional interleaver is provided in Fig. 9.16. The convolutional encoder
output is multiplexed into the stage of L buffers of increasing size, from zero
buffering size to the buffer of size (L – 1). We use z1 to denote one unit delay
of Ts seconds. The buffer stage output is multiplexed into the channel in a similar
fashion. On receiver side, the reverse operation is performed. Clearly, any two code
symbols are separated by LTs and providing that the buffering delay is larger than
the coherence time Tc, the interleaver is efficient in dealing with fading effects.
The total number of memory elements per buffering stage is 0.5 L(L 1).
A graph is typically defined as a set of nodes connected by edges. There are many
ways to describe a code by using graphical approach including the factor graph
approach [21]; one such approach is described below. We associate two types of
nodes to a given code: bit (variable) nodes and constraint (function) nodes. The bit
nodes can only be connected to the function nodes and vice versa. Such a graph,
which allows only the nodes of different type to be connected, is known as a bipartite
graph [1, 2, 4, 7, 22]. Two examples of bipartite graphs, corresponding to generalized
LPDC (GLDPC) codes and parallel concatenation of codes, are shown in Fig. 9.17. In
GLDPC coding, shown in Fig. 9.17a, each constraint node, also known as subcode,
represents an (ns, ks) (s ¼ 1,. . .,m) linear block code such as single-parity-check
(SPC) code, BCH code (including Hamming code), or Reed-Müller (RM) code.
There is one-to-one correspondence between the set of variable nodes and the set
of all bits in a codeword. However, we might allow certain number of variable nodes
to be punctured (corresponding bits are not transmitted), to adapt to time-varying
optical channel conditions. In parallel concatenation of codes (Fig. 9.17b), constraint
nodes are typically convolutional codes. Very often only two constraint nodes
(constituent codes) are used in conventional turbo codes [20, 23–27].
The codes on graphs of interest in wireless and optical communications include
turbo codes [20, 23–28], turbo product codes [2, 8, 9, 28, 30], and LDPC codes
[1, 2, 4, 5, 7, 10–12, 31–51]. As fiber-optics communications are affected by fiber
nonlinearities, the code rate should be kept sufficiently high (0.75).
9.8 Turbo Codes 701
Interleaver
Bit nodes
(a)
Constraint nodes
Interleaver
Bit nodes … … … … …
Parity bits Data bits Data bits Parity bits
(b)
Fig. 9.17 Bipartite graph examples: (a) bipartite graph for a generalized LDPC (GLDPC) code
and (b) bipartite graph for parallel concatenation of codes. The constraint node could be any
linear code
p
G2(D)/G1(D)
RSC1
p, q
Puncturer
K-bit interleaver
q
G2(D)/G1(D)
RSC2
(a)
u
K/R0-bit
p interleaver
G2(D)/G1(D) Punct. G2(D)/G1(D) Punct.
RSC1 RSC2
(b)
uk uk
ck
mod 2
Flip-flop
pk
(c)
ðinfoÞ ðparityÞ
where xk is k-th information bit (k ¼ 1,2,. . .,K ) and xk is the k-th parity bit.
ðinfoÞ
For antipodal signaling, we can represent the modulation process as uk ¼ ð1Þxk ,
ðparityÞ
xk
pk ¼ ð1Þ so that the transmitted word c is represented as:
The iterative (turbo) decoder, shown in Fig. 9.19, interleaves two soft-input/soft-
output (SISO) decoders, exchanging the extrinsic information iteratively and coop-
eratively. The role of iterative decoder is to iteratively estimate the a posteriori
probabilities (APPs) Pr(uk|y), where y is a received codeword plus noise n:
y ¼ c þ n ¼ ½y1 ; y2 ; . . . ; yK ¼ y1u ; y1p ; y2u ; y2p ; . . . ; yKu ; yKp , yk ¼ yku ; ykp ð9:75Þ
9.8 Turbo Codes 703
L1(uk) - Le12(u’k)
u u Interleaver u u
Lc(u Le12(uk)
k) - DEC2
M DEC1
c
U c -
Lc(pk) Le21(u’k) L2(u’k)
X Le21(uk)
Deinterleaver
-
Lc(uk) Interleaver M
U
Lc(qk) X
Fig. 9.19 Parallel turbo decoder configuration. MUX multiplexer, DEC decoder
with yku being the received sample corresponding to k-th data bit, while ykp being the
sample corresponding to the k-th parity bit.
In iterative decoders, each component decoder receives extrinsic or soft infor-
mation for each uk from its companion decoder, which provides “the prior” infor-
mation, as illustrated in Fig. 7.20. The key idea behind extrinsic information is that
decoder DEC2 provides the soft information to DEC1 for each uk by using only
information that is not available to DEC1. The knowledge of APPs allows the
optimum decisions for information bits uk to be made by the maximum a posteriori
probability (MAP) rule:
Pðuk ¼ þ1jyÞ >þ1 Pðuk ¼ þ1jyÞ
< 1 , u^k ¼ sign½Lðuk Þ, Lðuk Þ ¼ log Pðuk ¼ 1jyÞ , ð9:76Þ
Pðuk ¼ 1jyÞ 1
where L(uk) is the log-APP also known as log-likelihood ratio (LLR). By applying
the Bayes’ rule, we can write that:
Pðbk ¼ þ1jyÞ pðyÞ Pðyjbk ¼ þ1Þ Pðbk ¼ þ1Þ
Lðbk Þ ¼ log ¼ log
Pðbk ¼ 1jyÞ pðyÞ Pðyjbk ¼ 1Þ Pðbk ¼ 1Þ
ð9:77Þ
Pðyjbk ¼ þ1Þ Pðbk ¼ þ1Þ
¼ log þ log ,
Pðyjbk ¼ 1Þ Pðbk ¼ 1Þ
where bk 2 {uk, pk} and the second term represents a priori information. The first
term in Eq. (9.77) represents the extrinsic information for iterative decoders
obtained from corresponding companion decoder. Notice that for conventional
decoders we typically have P(bk ¼ +1) ¼ P(bk ¼ 1).
The key idea behind extrinsic information is to provide only soft information
about bk (that is not already available) to the companion decoder. Therefore,
although initially the prior information is zero, it becomes nonzero after the first
iteration. As shown in Fig. 7.20, the extrinsic information to be sent from DEC1
to DEC2, which is denoted as Le12(uk), can be calculated by subtracting from
DEC1 output LLR L1(uk) both the channel reliability Lc(uk) and extrinsic
704 9 Advanced Coding and Coded Modulation Techniques
s’1
γ(s0,s’ m)
…
s’m αk-1(s’m)
s’1 s1
γ(sl,s’ 0) …
βk-1(s’0)= γ (s0,s’ 0) βk(s0) +γ (sl,s’ 0) βk(sl) +… sl βk(sl)
(b)
Fig. 9.20 Illustration of forward (a) and backward (b) recursions in BCJR algorithm
information Le21(uk) already received from DEC2. On the other hand, the extrinsic
information Le21(uk), to be sent from DEC2 to DEC1, is obtained by subtracting
both the interleaved channel reliability Lc(uk) and interleaved extrinsic information
Le12(u’k) (already received from DEC1) from DEC2s output LLR L2(uk). Since the
DEC2 operates on interleaved sequence, this extrinsic information needs to be
de-interleaved before being sent to DEC1. This exchange of extrinsic information
is performed until the successful decoding is done or until the predetermined
number of iterations is reached. Decoders DECi (i ¼ 1, 2) operate on trellis
description of encoder, by employing the BCJR algorithm [13]. The BCJR algo-
rithm can also be used for MAP detection, and as such it will be described in section
on turbo equalization. Since the resulting code rate of parallel turbo encoder is low
(R ¼ 1/3), the puncturer deletes the selected bits in order to reduce the coding
overhead, as shown in Fig. 7.19a. The resulting code rate becomes R ¼ K/(K + P),
where P is the number of parity bits remained after puncturing. On the other hand,
9.8 Turbo Codes 705
the puncturing reduces the minimum distance of original code, which leads to
performance degradation and an early error floor as shown in [28]. Because of
low code rate and early error floor, the turbo codes are not widely used in fiber-
optics communications. However, they are widely used in wireless communication
systems as well as deep-space optical communications.
The details of the BCJR decoder are provided below. We assume that RSC is
represented using the trellis description, in similar fashion as described in Sect. 3.
The key difference with respect to the linear block codes is that trellis of RSC is
time invariant. Let s’ denote one of the states in current stage of the trellis, while
s denote the corresponding state in next stage of trellis. The transition from the state
s0 to state s can be represented as the pair (s0 , s). Let U+ (U) denote the set of pairs
(s0 , s) for the state transitions (sk 1 ¼ s0 ) ! (sk ¼ s) corresponding to uk ¼ +1
(uk ¼ 1). The LLR of the k-th data bit can be represented as:
P
pðsk1 ¼ s0 ; sk ¼ s; yÞ
þ
Lðuk Þ ¼ log P
U
: ð9:78Þ
pðsk1 ¼ s0 ; sk ¼ s; yÞ
U
Therefore, we have to compute p(s’,s,y) for all state transitions and then sum up
over appropriate transitions in nominator and denominator. The BCJR algorithm is
composed of two recursions, forward and backward recursion as illustrated in
Fig. 9.21. To efficiently compute LLRs, we factor p(s’,s,y) as follows:
where the state probabilities in forward recursion αk(s), the transition probabilities,
γ k(s0 ,s), and the state probabilities in backward recursion βk(s) are defined, respec-
tively, as:
αk ðsÞ ¼ p sk ¼ s; y1k , γ k ðs0 ; sÞ ¼ pðsk ¼ s; yk jsk1 ¼ s0 Þ,
K ð9:80Þ
βk ðsÞ ¼ p ykþ1 jsk ¼ s
where the summation is performed over all edges merging into state s, as illustrated
in Fig. 9.20a. The transition probabilities γ k(s0 ,s) are determined as:
Fig. 9.21 Log-domain BCJR algorithm steps: (a) forward recursion, (b) backward recursion, (c)
LLR calculation step
where p(s|s0 ) equals 1/2 for a valid (existing) transition, while p(yk|s0 ,s) is deter-
mined from channel conditional PDF. For an AWGN channel and antipodal
signaling, the transition probabilities are simply:
In the backward recursion, the state probabilities in the previous trellis stage are
determined by, as illustrated in Fig. 9.20b:
X
βk1 ðs0 Þ ¼ γ k ðs0 ; sÞβk ðsÞ, ð9:84Þ
s0
9.8 Turbo Codes 707
where the summation is performed over all incoming edges to state s’ in backward
direction. Clearly, the BCJR algorithm is composed of two Viterbi-like algorithms
running in opposite directions. Now we have to calculate the LLRs, as follows:
P
αk1 ðs0 Þ γ k ðs0 ; sÞ βk ðsÞ
þ
Lðuk Þ ¼ log P
U
, ð9:85Þ
αk1 ðs0 Þ γ k ðs0 ; sÞ βk ðsÞ
U
On the other hand, the forward recursion step (9.81) has been derived as follows:
X
0 X
0 k1
αk ðsÞ ¼ p sk ¼ s; y1k ¼ p s; y1k ¼ p s ; s; y1k ¼ p s; yk js0 ; yk1 1 p s ; y1
s0 s0 |fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflffl{zfflfflfflfflfflffl}
γ k ðs0 ;sÞ αk1 ðs0 Þ
X
¼ αk1 ðs0 Þγ k ðs0 ; sÞ:
s0
ð9:89Þ
ð9:92Þ
On the other hand, the backward metric in log domain is introduced by taking the
logarithm of probability-domain backward metric by:
" #
0
0 X
0
βek1 s ¼ log βk1 s ¼ log γ k s ; s β k ðsÞ
0
" s # ð9:93Þ
X
0
¼ log exp e e
γ k s ; s þ β k ðsÞ :
s0
For an AWGN channel and antipodal signaling, the branch metric gets simplified
to:
0
pffiffiffiffiffi ky c k2
k
e
γ k s ; s ¼ log 2σ 2π k 2 : ð9:95Þ
2σ
The LLRs can be expressed in terms of forward, backward, and branch metrics’
as follows:
X
0
0 8 9
αk1 s γ k s ; s βk ðsÞ > X
0
0 >
< αk1 s γk s ; s β k ðsÞ =
Uþ
Lðuk Þ ¼ log X
0
0 ¼ log Uþ |fflfflfflfflffl{zfflfflfflfflffl} |fflfflfflfflffl{zfflfflfflfflffl} |ffl{zffl}
αk1 s γ k s ; s βk ðsÞ >
: >
exp½β~ k ðsÞ;
exp½α
~ k1 ðs0 Þ exp½~γ k ðs0 ;sÞ
U
8 9
> X
0
0 >
< αk1 s γk s ; s β k ðsÞ =
log U |fflfflfflfflffl{zfflfflfflfflffl} |fflfflfflffl ffl{zfflfflfflfflffl} |ffl{zffl} ,
>
: >
exp½β~ k ðsÞ;
exp½α
~ k1 ðs Þ exp½~γ k ðs ;sÞ
0 0
ð9:96Þ
9.8 Turbo Codes 709
Clearly, in (9.35) we recognize the following operation log(ex + ey), which we can
denote as max*(x,y). The max*-operation can be efficiently calculated as:
logðex þ ey Þ ¼ max∗ ðx; yÞ ¼ maxðx; yÞ þ log 1 þ ejxyj , ð9:98Þ
where the second term is a correction term and can efficiently be implemented with
the help of a look-up table (LUT) in hardware. The max*-operator for more than
two terms can be applied recursively to terms at the time. For instance, for three
entries x, y, and z, the max*-operator is applied as:
Let x > y, and then the left side of equation is clearly x, while the right side of
previous equation becomes:
!
ex þ ey ex 1 þ eðxyÞ
log ¼ log ¼ logðex Þ ¼ x, ð9:101Þ
1 þ ejxyj 1 þ eðxyÞ
which proves the correctness of claim (9.98). With the introduction of max*-
operation, the forward recursion (metric) simplifies to:
" #
X
0
0 h
0
0 i
∗
ek ðsÞ ¼ log
α exp αek1 s þ e
γk s ; s ¼ max
0
αe k1 s þ e
γ k s ;s ,
s
s0
ð9:102Þ
and it is illustrated in Fig. 9.21a. On the other hand, the backward recursion (metric)
becomes:
" #
0 X
0 h
0 i
βek1 s ¼ log γ k s ; s þ βek ðsÞ ¼ max∗ β
exp e e k ðsÞ þ e
γk s ; s ,
s
s0
ð9:103Þ
710 9 Advanced Coding and Coded Modulation Techniques
and it is illustrated in Fig. 9.21b. Finally, the LLR computation step simplifies to:
h
0
0 i
Lðuk Þ ¼ max∗ α ek1 s þ e γ k s ; s þ βek ðsÞ
ðs ;sÞ: uk ¼0
0
h
0
0 i
0 max∗ α ek1 s þ e γ k s ; s þ βek ðsÞ ð9:104Þ
ðs ;sÞ: uk ¼1
A turbo product code (TPC), which is also known as block turbo code (BTC) [2, 8,
9, 29], is an (n1n2,k1k2,d1d2) code. The ni, ki, and di (i ¼ 1, 2) denote the codeword
length, dimension, and minimum distance, respectively, of the i-th component code
(i ¼ 1, 2). A TPC codeword, shown in Fig. 9.13, forms an n1 n2 array in which
each row represents a codeword from an (n1,k1,d1) code C1, while each column
represents a codeword from an (n2,k2,d2) code C2. The code rate of TPC is given by
R ¼ R1R2 ¼ (k1 k2)/(n1n2), where Ri is the code rate of the i-th (i ¼ 1, 2) component
code, namely, Ri ¼ ki/ni. The corresponding overhead (OH) of each component
code is defined as OHi ¼ (1/Ri 1)100%. The TPC can be considered as a
particular instance of serial concatenated block codes. In this interpretation, rows
belong to the outer code and columns to the inner code, and the interleaver is a
deterministic column-row interleaver. The corresponding TPC decoder is shown in
Fig. 9.22.
In soft-decision decoding, the extrinsic reliabilities are iterated between soft-
input soft-output (SISO) decoders for C1 and C2. The extrinsic information in
iterative decoders is obtained from the corresponding companion decoder. The
key idea behind extrinsic information is to provide to the companion decoder
only with soft information not already available to it. In fiber-optics communica-
tions, TPCs based on extended BCH (including extended Hamming) component
codes were intensively studied, e.g., [8, 9, 30]. The product codes were proposed by
Elias [52], but the term “turbo” is used when two SISO decoders exchange the
extrinsic information. As already mentioned above, the minimum distance of a
product code is the product of minimum distances of component codes, d ¼ d1d2.
The constituent codes are typically extended BCH codes, because with extended
Channel sample rk
Lrow Lrce
Interleaver
Row - Column
-
decoder Deinterleaver decoder
Lcre L column
BCH codes we can increase the minimum distance for d1 + d2 + 1 compared to the
nominal BCH codes. The expressions for bit error probability Pb and codeword
error probability Pcw under maximum likelihood (ML) decoding, for additive white
Gaussian noise (AWGN) channel, can be estimated as follows [2]:
rffiffiffiffiffiffiffiffiffiffiffi rffiffiffiffiffiffiffiffiffiffiffi
wmin RdEb Amin RdEb
Pb ’ erfc , Pcw ’ erfc , ð9:106Þ
2k1 k2 N0 2 N0
where wmin is the minimum weight of all Amin TPC codewords at the minimum
distance d. Notice that wmin and Amin are quite large, resulting in excellent bit error
rate (BER) performance of BTCs. Unfortunately, due to high complexity, maxi-
mum likelihood (ML) decoding is typically not used in BTC decoding, but simple
Chase II-like decoding algorithms have been used instead [2, 29]. One such
algorithm, which is independent of the channel model [2], is described below. Let
vi be i-th bit in a codeword v ¼ [v1. . .vn] and yi be the corresponding received
sample in a received vector of samples y ¼ [y1. . .yn]. The role of decoder is to
iteratively estimate the a posteriori probabilities (APPs) Pr(vi|yi). The knowledge of
APPs allows for optimum decisions on the bits vi by MAP rule:
The component SISO decoders for C1 and C2 calculate L(vi) and exchange extrinsic
information as explained above. The initial/channel bit LLRs, to be used in SISO
decoding including Chase II algorithm, can be calculated by:
Pðvi ¼ 0jyi Þ
Lch ðvi Þ ¼ log , ð9:110Þ
Pðvi ¼ 1jyi Þ
where σ 2 is the variance of the Gaussian distribution of the AWGN. It has been
shown in experimental study for beyond 100 Gb/s transmission [53, 54] that in the
links without in-line chromatic dispersion (CD) compensation, the distribution of
samples upon compensation of CD and nonlinear phase compensation is still
Gaussian-like, which justifies the use of the Gaussian assumption (9.112) in ampli-
fied spontaneous emission (ASE) noise-dominated scenario.
The constituent SISO decoding algorithms are based on modified Chase II
decoding algorithm [2]:
1. Determine p least reliable positions starting from either (9.110) or (9.112).
Generate 2p test patterns to be added to the hard-decision word obtained after (3).
2. Determine the i-th (i ¼ 1,. . .,2p) perturbed sequence by adding (modulo-2) the
test pattern to the hard-decision word (on least reliable positions).
3. Perform the algebraic or hard decoding to create the list of candidate codewords.
Simple syndrome decoding is suitable for high-speed transmission.
4. Calculate the k-th candidate codeword ck LLRs by:
X
n ð1vk ðiÞÞLðvk ðiÞÞ
e
L½vk ¼ðvk ð1Þ vk ðnÞÞ ¼ log , ð9:113Þ
i¼1
1 þ eLðvk ðiÞÞ
where vk(i) denotes the i-th bit in the k-th candidate codeword and L() is a
corresponding LLR.
5. Calculate the extrinsic bit reliabilities, denoted as Le(), for the next decoding
stage using:
0
Le ðvi Þ ¼ L ðvi Þ Lðvi Þ, ð9:114Þ
where
"P #
0 vk ðiÞ¼0 Lðvk Þ
L ðvi Þ ¼ log P ð9:115Þ
vk ðiÞ¼1 Lðvk Þ
The following “max-star” operator can be applied to (9.8) and (9.10) recursively as
follows:
max∗ ðx; yÞ≜logðex þ ey Þ ¼ maxðx; yÞ þ log 1 þ ejxyj ð9:116Þ
Given this description of SISO constituent decoding algorithm, the TPC decoder,
shown in Fig. 9.22, operates as follows. Let Lerc,j denote the extrinsic information to
be passed from row to column decoder, and let Lecr,j denote the extrinsic informa-
tion to be passed in opposite direction. Then, assuming that the column decoder
operates first, the TPC decoder performs the following steps:
0) Initialization: Lecr,i ¼ Lerc,i ¼ 0 for all i.
1) Column decoder: Run the SISO decoding algorithm described above with the
following inputs L(vj) + Lerc,j to obtain {Lcolumn(vi)} and {Lecr,i}, as shown in
Fig. 9.22. The extrinsic information is calculated by (9.9). Pass the extrinsic
information {Lecr,j} to companion row decoder.
2) Row decoder: Run the SISO decoding algorithm with the following
inputs L(vi) + Lecr,i to obtain {Lrow(vi)} and {Lerc,i}. Pass the extrinsic information
{Lerc,i} to companion column decoder.
3) Bit decisions: Repeat the steps 1–2 until a valid codeword is generated or a
predetermined number of iterations have been reached. Make the decisions on
bits by sign[Lrow(uk)].
Because LDPC codes belong to the class of linear block codes, they can be
described as a k-dimensional subspace C of the n-dimensional vector space of n-
tuples, F2n , over the binary field F2 ¼ GF(2). For this k-dimensional subspace, we
can find the basis B ¼ {g0, g1, . . ., gk 1} that spans C so that every codeword v can
be written as a linear combination of basis vectors v ¼ m0 g0 + m1 g1 + . . . + mk 1gk 1
for message vector m ¼ (m0, m1, . . ., mk 1), or in compact form, we can write
v ¼ mG, where G is so-called generator matrix with the i-th row being gi. The
(n k)-dimensional null space C⊥ of G comprises all vectors x from F2n such that
xGT ¼ 0 and it is spanned by the basis B⊥ ¼ {h0, h1, . . ., hn – k 1}. Therefore,
for each codeword v from C, vhiT ¼ 0 for every i or in compact form we can write
vHT ¼ 0, where H is so-called parity-check matrix whose i-th row is hi.
An LDPC code can now be defined as an (n, k) linear block code whose parity-
check matrix H has a low density of 1s. A regular LDPC code is a linear block code
whose H-matrix contains exactly wc 1s in each column and exactly wr ¼ wcn/
(n k) 1s in each row, where wc << n k. The code rate of the regular LDPC code
is determined by R ¼ k/n ¼ 1 wc/wr. The graphical representation of LDPC codes,
9.10 LDPC Codes 715
For any valid codeword v ¼ [v0 v1. . .vn 1], the checks used to decode the
codeword are written as:
• Equation (c0): v0 + v3 + v5 + v6 ¼ 0 (mod 2)
• Equation (c1): v1 + v3 + v4 + v5 ¼ 0 (mod 2)
• Equation (c2): v2 + v4 + v5 + v6 ¼ 0 (mod 2)
The bipartite graph (Tanner graph) representation of this code is given in
Fig. 9.23a.
The circles represent the bit (variable) nodes, while squares represent the check
(function) nodes. For example, the variable nodes v0, v3, v5, and v6 are involved in
(c0) and therefore connected to the check node c0. A closed path in a bipartite graph
comprising l edges that close back on itself is called a cycle of length l. The shortest
cycle in the bipartite graph is called the girth. The girth influences the minimum
distance of LDPC codes, correlates the extrinsic LLRs, and therefore affects the
decoding performance. The use of large (high) girth LDPC codes is preferable
because the large girth increases the minimum distance and prevents early corre-
lations in the extrinsic information during decoding process. To improve the
iterative decoding performance, we have to avoid cycles of length 4 and 6, which
are illustrated in Fig. 9.23b, c, respectively.
The code description can also be done by the degree distribution polynomials
μ(x) and ρ(x), for the variable node (v-node) and the check node (c-node), respec-
tively [2]:
X
dv X
dc
μðxÞ ¼ μd xd1 , ρð x Þ ¼ ρd xd1 , ð9:117Þ
d¼1 d¼1
where μd and ρd denote the fraction of the edges that are connected to degree-d v-
nodes and c-nodes, respectively, and dv and dc denote the maximum v-node and c-
node degrees, respectively.
716 9 Advanced Coding and Coded Modulation Techniques
Fig. 9.23 (a) Bipartite graph of Hamming (7,4) code described by H-matrix above. Cycles in a
Tanner graph: (b) cycle of length 4 and (c) cycle of length 6
c0 c0 c1 c2
v0
v0 v1 v4 v5 y0 (channel sample)
(a) (b)
Fig. 9.24 Illustration of half iterations of the SPA: (a) subgraph of bipartite graph corresponding
to the H-matrix with the 0th row [1 1 0 0 1 1 0. . .0], (b) subgraph of bipartite graph corresponding
to the H-matrix with the 0th column [1 1 1 0. . .0]
c c’
c
qvc(b) rc’v(b)
qv’c(b) v
rcv(b)
v v’ y
(a) (b)
Fig. 9.25 Illustration of calculation of: (a) extrinsic information to be passed from node c to
variable node v, (b) extrinsic information (message) to be passed from variable node v to check
node c regarding the probability that v ¼ b, b2{0,1}
(via y0), and extrinsic information node v0 had received from nodes c0 and c1 on a
previous half iteration. This procedure is performed for all v-node/c-node pairs.
The calculation of the probability that c-th parity-check equation is satisfied
given v ¼ b, b2{0,1}, denoted as rcv(b), is illustrated in Fig. 9.25a. On the other
hand, the calculation of the probability that v ¼ b given extrinsic information from
all check nodes, except node c, and given channel sample y, denoted as qvc(b), is
illustrated in Fig. 9.25b.
In the first half iteration, we calculate the extrinsic LLR to be passed from node
c to variable node v, denoted as Lvc ¼ L(rcv), as follows:
! 2 3
Y X
Lcv ¼ αv0 c ϕ4 ϕðβv0 c Þ5; αvc ¼ sign½Lvc , βvc ¼ jLvc j ð9:119Þ
v0 v0 2N ðcÞ\ v
x x
e þ1
ϕðxÞ ¼ log tanh ¼ log x , ð9:120Þ
2 e 1
which is plotted in Fig. 9.26. In the second half iteration, we calculate the extrinsic
LLR to be passed from variable node v to function node c regarding the probability
that v ¼ b, denoted as Lvc ¼ L(qvc), as:
X
Lvc ¼ Lðqvc Þ ¼ Lch ðvÞ þ Lðr c0 v Þ: ð9:121Þ
c0 2N ðvÞ\ c
where ϕ(x) ¼ log tanh(x/2). The box operator for jN(c)\{v}j components is
obtained by recursively applying 2-component version defined above.
P
2. v-node update rule: For v ¼ 0,1,. . .,n 1, set Lvc ¼ Lch ðvÞ þ Lcv for all
N ðvÞ\ fcg
c-nodes for which hcv ¼ 1. P
3. Bit decisions: Update L(v) (v ¼ 0,. . .,n 1) by LðvÞ ¼ Lch ðvÞ þ Lcv and set
N ðvÞ
v^ ¼ 1 when L(v) <0 (otherwise, v^ ¼ 0). If v^HT ¼ 0 or predetermined number of
iterations has been reached, then stop (otherwise go to step 1).
720 9 Advanced Coding and Coded Modulation Techniques
Because the c-node update rule involves log and tanh functions, it is computation-
ally intensive, and there exist many approximations. The very popular is the min-
sum-plus-correction-term approximation [39]. Namely, it can be shown that “box-
plus” operator þ can also be calculated by:
Y
2
L1 þ L2 ¼ signðLk Þ minðjL1 j; jL2 jÞ þ cðx; yÞ, ð9:122Þ
k¼1
commonly implemented as a look-up table (LUT). Given the fact that jc(x,y)j <
0.693, very often this term can be ignored. Alternatively, the following approxi-
mation can be used:
8
< d, j x y j< 2 \ j x þ y j> 2 j x y j
cðx; yÞ ’ d, j x þ y j< 2 \ j x y j> 2 j x þ y j ð9:124Þ
:
0, otherwise
Therefore, the min-sum algorithm is thus the log-domain algorithm with step
(1) replaced by:
0 1
Y
Lcv ¼ @ αc0 v A min
0
β v0 c : ð9:126Þ
v
v0 2N ðcÞ\ v
…
CNP 2 Mem2,1 Mem2,2 … Mem2,15
Mem3,1 Mem3,2 … Mem3,15
VNP 2
(a)
-1
10
CS-MS
10
-3 CS-MSS
CS-MSC
-5 FPGA-MS
10
FPGA-MSS
Bit-error rate, BER
FPGA-MSC
-7
10
-9
10
-11
10
-13
10
-15
10
1.6 2.0 2.4 2.8 3.2
Signal-to-noise ratio, SNR [dB] (per bit)
(b)
Fig. 9.27 (a) Implementation architecture of FPGA-based partial-parallel LDPC decoder and (b)
BER performance comparison of simulated and FPGA-based LDPC decoder. CS computer
simulations, FPGA FPGA results, MS min-sum algorithm, MSC min-sum with correction term
algorithm, MSS min-sum algorithm with scaling
have been implemented per single FPGA, resulting in total 16 LDPC decoders per
BEE4 system.
As shown in Fig. 9.27a, the implementation consists of three types of memories:
Mem, MemInit, and MemBit. The Wc Wr Mem units store the messages to be
722 9 Advanced Coding and Coded Modulation Techniques
interchanged between variable nodes and check nodes, Wr MemInit units store the
initial LLRs from the channel, and Wr MemBit units store the decoded bits. There
are Wr variable node processors (VNPs) and Wc check node processors (CNPs) in
our implementation. While the VNPs read the extrinsic information from Mem and
prior information from MemInit and write the updated information to the
corresponding addresses of Mem and MemBit in the first half iteration, the CNPs
read the information from Mem and MemBit and write the updated extrinsic
information to the corresponding addresses of Mem in the second half iteration.
Decoding stops when either the predefined maximum number of iterations has been
reached or decoder outputs a codeword.
With above-described architecture, the lowest decoding throughput per decoder
and FPGA can be expressed as follows:
N f clock
Throughput ¼ ’ 143 Mb=s
B þ ðB þ B þ δÞ Iter
where N ¼ 34635 is the codeword length, fclock ¼ 200 MHz is the clock frequency,
B ¼ 2309 is the size of the submatrix, Iter ¼ 20 is the maximum number of
iterations, and δ ¼ 6 is the critical path delay of the processing unit. The first
B clock cycles used to initialize the MemInit, Wr VNPs need B clock cycles to
process Wr B variable nodes, while Wc CNPs need B clock cycles to process
Wc B check nodes in each iteration. The aggregate minimum throughput of
16 LDPC decoders implemented on BEE4 system is ffi143 Mb/s 4 4 ¼ 2.288
Gb/s. Since the average number of iterations until a valid codeword is reached is
8.8, the average total throughput is actually higher.
Figure 9.27b presents the BER performances of the FPGA-based min-sum
algorithm (MS), min-sum with scaling factor (MSS), and min-sum with correction
term (MSC). The computer simulation (CS) results are provided as well for
verification. In practice, it is also possible to implement other decoding algorithms
to reduce the complexity, described above. Here, the input LLRs and extrinsic
information are represented by 8 soft-decision bits (1 sign bit, 5 integer bits, and
2 fractional bits). It can be observed that there is no error floor down to 1015, which
is consistent with ref. [55], which claims that girth-10 LDPC codes do not exhibit
error floor phenomenon in the region of interest for optical communications (down
to 1015). The net coding gain (NCG) at BER of 1015 is 11.8 dB. The good BER
performance of our QC-LDPC code is contributed to the large minimum distance
and large girth. For short LDPC codes, error floor can be suppressed by (i) BCH
with corresponding interleaver or RS codes [56, 57] as outer code in concatenation
fashion or (ii) post-processing techniques [58].
The q-ary sum-product algorithm (qSPA), where q is the cardinality of the finite
field, and a low-complexity version via fast Fourier transformation (FFT-qSPA)
9.10 LDPC Codes 723
were proposed for decoding nonbinary LDPC codes [59, 60]. Log-domain qSPA
(Log-qSPA) was presented in [61] where multiplication is replaced by addition.
Later, a mixed-domain version of the FFT-qPSA (MD-FFT-qSPA) decoder was
proposed [62], where large size look-up tables are required for the purpose of
domain conversion. To avoid the complicated operations involved in the aforemen-
tioned decoding algorithms, extended min-sum algorithm [63] and min-max algo-
rithm [64, 65] were widely adopted.
Following the same notation used in previous section, let Lch , v(a), Lvc(a),Lcv(a),
Lkcv, l , and Lv(a) represent the prior information of v-node v, the message from v-node
v to c-node c, the message from c-node c to v-node v, and the APP value concerning
symbol a 2 GF(q), respectively. The nonbinary min-max algorithm can be summa-
rized as follows:
0. Initialization: For v ¼ 0,1,. . .,n 1, initialize the messages Lvc(a) to be sent from
v-node v to c-node c to channel LLRs Lch , v(a), namely,Lvc(a) ¼ Lch , v(a).
1. c-node update rule: For c ¼ 0,1,. . .,n – k 1, compute Lcv ðaÞ ¼ mina0 0 2Iðcjav Þ
v
maxv0 2NðcÞ\ v Lvc a0v0 , where I(c| av) denotes the set of codewords such that
∑v ’ 2 N(c)\vhcv’a’v’ ¼ hcvav. Here hcv denotes the c-th row, v-th column element of
the parity-check matrix.
2. v-node update rule: For v ¼ 0,1,. . .,n 1, set Lvc(a) ¼ Lch , v(a) + ∑N(v)\cLcv(a) for
all c-nodes for which hcv 6¼ 0.
3. Post processing: Lvc(a) ¼ Lvc(a) mina ’ 2 GF(q)Lvc(a’), it is necessary for numer-
ical reasons to ensure the nondivergence of the algorithm.
4. Symbol decisions: Update Lv(a) (v ¼ 0,. . .,n 1) by Lv(a) ¼
Lch , v(a) + ∑N(v) Lcv(a) and set v^ ¼ argmina2GFðqÞ ðLv ðaÞÞ: If v^HT ¼ 0 or
predetermined number of iterations has been reached, then stop (otherwise go
to step 1).
The BER vs. SNR performances of the decoding algorithms are presented in
Fig. 9.28.
All the decoders have been simulated with floating point precision for GF
(4) (8430, 6744) nonbinary LDPC code over binary input AWGN channel. The
maximum number of iteration Imax is set to 20. The two decoding algorithms,
Log-QSPA and MD-FFT-qSPA, achieve the best performance as they are based
on theoretical derivations, while the reduced-complexity decoding algorithms,
Min-Max, Max-Log, and Min-Sum algorithms, face the performance degradation
at BER of 107 by ~0.13 dB, ~0.27 dB, and ~0.31 dB, respectively.
The details of corresponding FGPA implementation of nonbinary LDPC
decoders can be found in [66, 67]. In the same papers, the FPGA resource utilization
has been discussed in detail. For instance, the reduced-complexity nonbinary
decoding algorithms and finite precision introduce the error floor phenomenon,
which has been successfully eliminated by an outer RS code.
724 9 Advanced Coding and Coded Modulation Techniques
The most obvious way to design LDPC codes is to construct a low-density parity-
check matrix with prescribed properties. Some important designs among others
include (i) Gallager codes (semi-random construction) [31], (ii) MacKay codes
(semi-random construction) [32], (iii) finite-geometry-based LDPC codes [68–70],
(iv) combinatorial-design-based LDPC codes [34], (v) quasi-cyclic (array, block-
circulant) LDPC codes [2, 41], (vi) irregular LDPC codes [71], and (vii) Tanner
codes [22]. In this section, we describe briefly several classes of LDPC codes
including Gallager, Tanner, MacKay, and quasi-cyclic LDPC codes.
The H-matrix for Gallager code has the following general form:
Interleaver
Bit nodes
In Tanner codes [22], each bit node is associated with a code bit, and each check
node is associated with a subcode whose length is equal to the degree of node,
which is illustrated in Fig. 9.29. Notice that so-called generalized LDPC codes
[72–78] were inspired by Tanner codes.
Let us consider the following example:
The Tanner code design in this example is performed in two stages. We first
design the global code by starting from an identity matrix Im/2 and replace the every
nonzero element with n1 ones and every zero element by n1 zeros. The lower
submatrix is obtained by concatenating the identity matrices In1. In the second
stage, we substitute all-one row vectors (of length n1) by the parity-check matrix of
local linear block code (n1,k1), such as Hamming, BCH, or RM code. The resulting
parity-check matrix is used as the parity-check matrix of an LDPC code.
The GLDPC codes can be constructed in a similar fashion. To construct a
GLDPC code, one can replace each single parity-check equation of a global
LDPC code by the parity-check matrix of a simple linear block code, known as
the constituent (local) code, and this construction is proposed by Lentmaier and
726 9 Advanced Coding and Coded Modulation Techniques
Zigangirov [77], and we will refer to this construction as LZ-GLDPC code con-
struction. One illustrative example is shown in Fig. 9.30. In another construction
proposed by Boutros et al. in [76], referred here as B-GLDPC code construction, the
parity-check matrix, H, is a sparse matrix partitioned into W submatrices H1,. . .,
HW. The H1 submatrix is a block-diagonal matrix generated from an identity matrix
by replacing the ones by a parity-check matrix H0 of a local code of codeword
length n and dimension k:
2 3
H0 0
T 6 H0 7
H ¼ H1T H2T . . . HWT , H1 ¼ 6
4
7
5 ð9:128Þ
...
0 H0
where K and N denote the dimension and the codeword length of a GLDPC code,
W is the column weight of a global LDPC code, and k/n is the code rate of a local
code (k and n denote the dimension and the codeword length of a local code). The
GLDPC codes can be classified as follows [72]: (i) GLDPC codes with algebraic
local codes of short length, such as Hamming codes, BCH codes, RS codes, or
Reed-Muller codes, (ii) GLDPC codes for which the local codes are high-rate
regular or irregular LDPC codes with large minimum distance, and (iii) fractal
GLDPC codes in which the local code is in fact another GLDPC code. For more
details on LZ-GLDPC- and B-GLDPC-like codes, and their generalization-fractal
GLDPC codes (a local code is another GLDPC code), an interested reader is
referred to [33, 37] (and references therein).
9.10 LDPC Codes 727
Following MacKay (1999) [32] below are listed several ways to generate the sparse
matrices in order of increasing algorithm complexity (not necessarily improved
performance):
1. H-matrix is generated by starting from an all-zero matrix and randomly
inverting wc (not necessarily distinct bits) in each column. The resulting LDPC
code is an irregular code.
2. H-matrix is generated by randomly creating weight-wc columns.
3. H-matrix is generated with weight-wc columns and uniform row weight (as near
as possible).
4. H-matrix is generated with weight-wc columns, weight-wr rows, and no two
columns having overlap larger than one.
5. H-matrix is generated as in (4), and short cycles are avoided.
6. H-matrix is generated as in (5) and can be represented H ¼ [H1|H2], where H2 is
invertible or at least has a full rank.
The construction via (5) may lead to an H-matrix that is not of full rank. Never-
theless, it can be put in the following form by column swapping and Gauss-Jordan
elimination:
PT I
H¼ , ð9:129Þ
0 0
Among various construction algorithms listed above, the construction (5) will be
described with more details.
Outline of Construction Algorithm (5)
1. Chose code parameters n, k, wc, wr, and g (minimum cycle length girth). The
resulting H-matrix will be an m n (m ¼ n k) matrix with wc ones per column
and wr ones per row.
2. Set the column counter to ic ¼ 0.
3. Generate a weight-wc column vector and place it in ic-th column of H-matrix.
4. If the weight of each row wr, the overlap between any two columns 1, and if
all cycle-lengths are g, then increment the counter ic ¼ ic + 1.
5. If ic ¼ n, stop; else go to step 3.
This algorithm could take hours to run with no guarantee of regularity of H-
matrix. Moreover, it may not finish at all, and we need to restart the search with
728 9 Advanced Coding and Coded Modulation Techniques
another set of parameters. Richard and Urbanke (in 2001) proposed a linear
complexity in length technique based on H-matrix [33].
An alternative approach to simplify encoding is to design the codes via alge-
braic, geometric, or combinatoric methods. The H-matrix of those designs can be
put in cyclic or quasi-cyclic form, leading to implementations based on shift
registers and mod-2 adders.
Based on Tanner’s bound for the minimum distance of an LDPC code [22]
8
> wc
<1þ ðwc 1Þbðg2Þ=4c 1 , g=2 ¼ 2m þ 1
d wc 2
> wc
:1þ ðwc 1Þbðg2Þ=4c 1 þ ðwc 1Þbðg2Þ=4c , g=2 ¼ 2m
wc 2
ð9:131Þ
(where g and wc denote the girth of the code graph and the column weight,
respectively, and where d stands for the minimum distance of the code), it follows
that large girth leads to an exponential increase in the minimum distance, provided
that the column weight is at least 3. (bc denotes the largest integer less than or equal
to the enclosed quantity.) For example, the minimum distance of girth-10 codes
with column weight r ¼ 3 is at least 10. The parity-check matrix of regular
QC-LDPC codes [2, 10, 12] can be represented by:
2 3
I I I ... I
6 I P S½1
PS½2 ... PS½c1 7
6 7
H¼6
6 I P2S½1 P2S½2 ... P2S½c1 7,
7 ð9:132Þ
4... ... ... ... ... 5
I Pðr1ÞS½1 Pðr1ÞS½2 ... Pðr1ÞS½c1
S½i1 j1 þ S½i2 j2 þ . . . þ S½ik jk ¼ S½i1 j2 þ S½i2 j3 þ . . . þ S½ik j1 mod B, ð9:133Þ
where the closed path is defined by (i1,j1), (i1,j2), (i2,j2), (i2,j3), . . ., (ik,jk), (ik,j1) with
the pair of indices denoting row-column indices of permutation blocks in (9.2) such
that lm 6¼ lm + 1, lk 6¼ l1 (m ¼ 1,2,..,k; l2{i,j}). Therefore, we have to identify the
9.10 LDPC Codes 729
jSjB rB
R ¼ 1 r=jSj, ð9:134Þ
jSjB
and the codeword length is |S|B, where |S| denotes the cardinality of set S. For a
given code rate R0, the number of elements from S to be used is br/(1 R0)c. With
this algorithm, LDPC codes of arbitrary rate can be designed.
As an illustration, by setting B ¼ 2311, the set of integers to be used in (9.2) is
obtained as S ¼ {1, 2, 7, 14, 30, 51, 78, 104, 129, 212, 223, 318, 427, 600, 808}. The
corresponding LDPC code has rate R0 ¼ 1–3/15 ¼ 0.8, column weight 3, girth-10,
and length |S|B ¼ 15∙2311 ¼ 34,665. In the example above, the initial set of integers
was S ¼ {1,2,7}, and the set of row to be used in (6.25) is {1,3,6}. The use of a
different initial set will result in a different set from that obtained above)).
In this section, we first describe the nonbinary (NB) irregular QC-LDPC code
design derived from PBDs, introduced in [48], defined over GF(q). Let a set V of
size v represent a set of elements (points), with any subset being called a block.
Then, a pairwise-balanced design (PBD) (v,K,δ) is defined as a collection of blocks
of different sizes taken from set K, such that every pair of points is contained in δ of
the blocks. For additional details on PBDs, an interested reader is referred to
[79]. The parity-check matrix of irregular NB-QC-LDPC codes based on PBDs is
given by [48]:
2 3
α0 I ðb00 ÞI α1 I ðb10 ÞI αc1 I ðbc-1, 0 ÞI
6 7
6 αc1 I ðb01 ÞI α0 I ðb11 ÞPS½1 αc2 I ðbc-1, 1 ÞPS½c1 7
6 7
6 7
H¼6 αc2 I ðb02 ÞI αc1 I ðb12 ÞP2S½1 αc3 I ðbc-1, 2 ÞP2S½c1 7,
6 7
6 ⋮ ⋮ ⋱ ⋮ 7
4 5
ðr1ÞS½1
α cðr1Þ
I ðb0, r-1 ÞI α crþ2
I ðb1, r-1 ÞP α cr
I ðbc-1, r-1 ÞPðr1ÞS½c1
ð9:135Þ
c represent the number of block rows and block columns in (9.135), respectively. In
(9.135), {bij} are points of the i-th block in PBD(r,K,δ), with the largest size of
block k in set of sizes K satisfying the inequality k r. αi are nonzero elements of
Galois field of size q, denoted as GF(q). Finally, the I (bij) denotes the indicator
function, which has the value 1 for the existing point within the i-th block and 0 for
the nonexisting point. Therefore, only those submatrices for which indicator func-
tion is 1 will be preserved from template, regular, QC-LDPC code design. Notice
the repetition of PBD blocks in (9.135) is allowed. Given the fact that PBDs have
regular mathematical structure that can be algebraically described, the irregular
NB-QC-LDPC codes derived from PBDs have the complexity comparable or lower
to that of regular NB-QC-LDPC code design. As an illustration, the irregular NB-
QC-LDPC code derived from PBD(5, {3,2,1}, 1) ¼ {{0,1,3}, {1,2,4}, {1,2}, {0,4},
{3,4}, {0}, {1}} has the following form:
2 3
α0 I 0 0 α3 I 0 α5 I 0
6 6 0 S½1 1 S½2 7
6α I α P αP 0 0 0 α5 PS½5 7
6 7
H¼6
6 0 α6 P2S½1 α0 P2S½2 0 0 0 0 7 7:
6 4 1 3S½4 7
4α I 0 0 0 α P 0 0 5
0 α4 P4S½1 0 α6 P4S½3 α0 P4S½4 0 0
Since both the identity matrix and the power of permutation matrix have a single
1 per row, the block size of the i-th block from PBD determines i-th block-column
weight. In the example above, the first two block columns have column-weight
3, the third, fourth, and fifth have the column-weight 2, and the last two block
columns have weight 1. Notice that for GF(4) ¼ {0,1,α,α2}, we have that α3 ¼ 1, α4
¼ α, α5 ¼ α2, and α6 ¼ α3.
We now describe how to derive different classes of codes proposed for next
generation of optical networks from (9.135). Let the template H-matrix of (4,8)
irregular QC code be given as:
2 3
α0 I ðb00 ÞI α1 I ðb10 ÞI α7 I ðb70 ÞI
6 7 7
6 α I ðb01 ÞI α0 I ðb11 ÞPS½1 α6 I ðb71 ÞPS½7 7
H¼6
6 α6 I ðb ÞI
7:
4 02 α7 I ðb12 ÞP2S½1 α5 I ðb72 ÞP2S½7 7
5
α5 I ðb03 ÞI α6 I ðb13 ÞP3S½1 α I ðb73 ÞP
4 3S½7
2nd codeword M
3rd codeword M
The basic rate adaptation via either shortening or puncturing is widely used
everywhere in communication systems and can be introduced in both block and
convolutional codes. In this subsection, we use shortening to achieve rate-adaptive
LDPC coding since it can allow a wide range of rate adjustment with unified
9.10 LDPC Codes 733
-1
10
NB-LDPC (12128,K) coded
-2
10 8-QAM:
R=0.906
-3
10 R'=0.875
R'=0.833
Bit-error rate, BER
-4
10
-5
10
-6
10
-7
10
-8
10
-9
10
Fig. 9.33 Architecture of rate-adaptive binary LDPC decoder: (a) overall schematic diagram, (b)
schematic diagram of CNU
Fig. 9.34 Architecture of rate-adaptive nonbinary LDPC decoder: (a) overall schematic diagram,
(b) schematic diagram of CNU
the information from check nodes to variable nodes, memory for Lv with size of
n q WL stores the initial log-likelihood ratios, memory for c^ with size n log2q
stores the decoded bits, and memories inside each CNU store the intermediate
values. The same notations are borrowed from previous subsection except that
q denotes the size of Galois field. As shown in Fig. 9.34b, it is obvious that CNU is
9.10 LDPC Codes 735
the most complex part of the decoding algorithm, which consists of r inverse
permutators, r BCJR-based min-max processors and r permutators, and two types
of the first-in-first-out (FIFO) registers. The inverse permutator block shifts the
incoming message vector cyclically. The first FIFO is used to perform the parallel-
to-serial conversion. After the min-max processor, which is implemented by
low-latency bidirectional BCJR algorithm, the processed data is fed into another
FIFO block performing serial-to-parallel conversion, followed by the permutator
block. Because of high complexity of CNU design and high memory requirements
of nonbinary decoder than that of binary decoder, reduced-complexity architectures
and selective version of MMA can be further exploited.
We compare three rate-adaptive schemes based on binary LDPC codes and
nonbinary LDPC codes. These three architectures can be software-defined by
initializing configurable registers in FPGA. The resource utilization is summarized
in Table 9.2. One can clearly notice that the LMMA-based nonbinary LDPC codes
consume 3.6 times larger memory size than the binary one because of large field
size and high quantization precision, while the occupied number of slices is five
times larger than that in binary case because of higher complexity of CNU.
The BER vs. Q-factor performances of the rate-adaptive binary and nonbinary
LDPC code are presented in Figs. 9.35 and 9.36. The FPGA-based emulation was
conducted over binary (BI)-AWGN channel, and 6 and 8 bits precision are used in
binary and nonbinary LDPC decoder, respectively. A set of column weight and row
weight configurations of {(3, 15), (3, 14), (3, 13), (3, 12), (3, 11), (3, 10)}, which
corresponds to the code rates of {0.8, 0.786, 0.77, 0.75, 0.727, 0.7}, can be achieved
by software-based reconfiguration of specific register in FPGA. The girth-10
regular (34635, 27710, 0.8) binary and nonbinary mother code can achieve a
Q-limit of 5.2 dB and 5.14 dB at BER of 1015, which corresponds to NCG of
11.83 and 11.89 dB. The rate-adaptive nonbinary LDPC codes outperform the
binary LDPC codes by approximated 0.06 dB in all range of rate from 0.7 to 0.8.
In addition, we believe this gap will be larger when combined with higher modu-
lation schemes enabling 100Gbits/s (with QPSK) 400Gbits/s (with 16QAM) optical
communication systems.
The key idea behind the GLDPC codes [72–78], as discussed earlier, is to replace
the parity-check equations in a parity-check matrix of a global LDPC code by a
linear block code. The decoding is based on several low-complexity soft-input-soft-
736 9 Advanced Coding and Coded Modulation Techniques
Fig. 9.35 BER performance of rate-adaptive binary LDPC decoder implemented in FPGA
Fig. 9.36 BER performance of rate-adaptive nonbinary LDPC decoder implemented in FPGA
9.10 LDPC Codes 737
output (SISO) linear block decoders operating in parallel. The SISO decoders are
commonly implemented based on maximum a posteriori probability (MAP)
decoders, and as such they provide accurate estimates of bit reliabilities for a global
LDPC decoder after small number of iterations. Due to high complexity of the
BCJR decoder, the GLDPC coding is limited to simple linear block component
codes such as Hamming, binary BCH, and Reed-Muller (RM). To keep the code
rate reasonably high, the global code of GLDPC must be of column-weight
(variable node degree) 2. Unfortunately, the global codes with parity-check matrix
of column-weight 2 are known as weak LDPC codes as they exhibit an early error
floor phenomenon. In principle, multiple local codes can be used instead of parity
checks of a global code. The proper selection of these local codes can lead to further
improvement of BER performance. However, the high-code rate requirement
problem important for certain applications, such as optical communications and
magnetic recording, will not be solved. As solution to high-code rate requirement,
while employing global codes of column weight 3, instead of 2 used in [72, 73],
here we describe the possibility not to replace all parity checks by local codes, but
only certain, selected, number of parity checks. Such obtained GLDPC codes will
contain two types of so-called super nodes, simple parity-check equations for which
MAP decoders are trivial and selected number of reasonable-complexity linear
block codes (not necessary identical ones) [74]. This type of GLDPC codes shows
remarkable flexibility for code-rate adaptation as it will be shown later in the
subsection.
For instance, if only single-parity-check codes and (n,k) local code are used in
regular GLDPC code design, the corresponding code rate R can be bounded as
follows [74]:
W W kþ1
1 1 R RG , ð9:136Þ
n d n
where W is the column weight of the global regular code and parameter d denotes
that every d-th row in a global code is replaced by (n,k) local code, while the
remaining rows from the global code are interpreted as single-parity-check codes in
GLDPC code. In (9.136), RG denotes the code rate of the global regular code, which
is RG ¼ 1 W/n. In this subsection, for global code we chose large-girth quasi-
cyclic LDPC code, thanks to its simplicity for FGPA implementation.
For the sake of completeness of the presentation, we provide the layered
decoding algorithm of the GLDPC codes [75], which is suitable for hardware
implementations. This algorithm is applicable to any linear block code to be used
as the local code. Let Rðck;l Þ ðk;lÞ
, v , Lv, c , Lv represent the check c to variable v extrinsic
information, the variable v to check c at k-th iteration and l-th layer extrinsic
information, and the log-likelihood ratio (LLR) from the channel of variable (bit)
node v, respectively, where k ¼ 1,2,. . .,Imax and l ¼ 1,2,. . .,c. The layered min-max
algorithm is adopted for FPGA implementation, whose data flow can be summa-
rized as follows:
738 9 Advanced Coding and Coded Modulation Techniques
0. Initialization step:
Rðcvk;lÞ ¼ 0, k ¼ 1; l ¼ 1, 2, , c ð9:137Þ
X 0
ðk;l Þ 0, Lðvk;lÞ 0
Lðvk;lÞ ¼ Lv þ Rcv , c^v ¼ ð9:138Þ
l0 1, Lðvk;lÞ < 0
X 0 0
0
ðk ;l Þ 0 k 1, l < l
Lðvck;lÞ ¼ Lv þ l0 6¼l
Rcv , k ¼ 0 ð9:139Þ
k, l l
Y
ðk;lÞ ðk;lÞ
Rðck;l Þ
,v ¼ a v0 6¼v
sign Lv0 , c min
0
Lv , c ,
0 ð9:141Þ
v 6¼v
Sum-Max
Forward Forward
Selector Recursion
Mem Combiner
Sum-Max
Forward Forward
Selector Recursion
α0 α1 α2 α3 α4 α5 α6 α7 α8 α9 α 10 α 11 α 12 α 13 α 14
β 15 β 14 β 13 β 12 β 11 β 10 β9 β8 β7 β6 β5 β4 β3 β2 β1
O7 O6 O5 O4 O3 O2 O1 O0
Fig. 9.38 Timing diagram of the BCJR processor for Hamming local code
that, each cycle will generate two outputs, one is obtained by combining current α
with β from memory blocks, while the other one is obtained by combining the
current β with α from the memory. This technique reduces the total latency to the
length of local codes plus the latency due to parallel-to-serial conversion of the
input and serial-to-parallel conversion of the output. In summary, the complexity of
MAP decoder is reasonably low and thus makes the proposed GLDPC code very
promising.
To prove the advantages of the proposed rate-adaptive GLDPC codes, we start
from a well-designed LDPC code, which is a quasi-cyclic (3, 15)-regular, girth-10
(34635, 27710, 0.8) binary LDPC code, and choose a simple (15, 11) Hamming
code as component code. For the purpose of ease of implementation, we sweep
different parameters d in the rage of {1, 127, 63, 31, 15}, which corresponds to the
code rates of {0.8, 0.7953, 0.7906, 0.7807, 0.7601}. The precision of LLRs,
variable-to-check message, and check-to-variable message is set to 5-bit, 5-bit,
and 6-bit, respectively; and the maximum number of iterations is set to either 10 or
15. The bit error rate (BER) performances vs. Q factor are present in Fig. 9.39 with
10 iterations and Fig. 9.40 with 15 iterations. The net coding gain of the designed
mother is 11.61 dB and 11.71 dB for 10 and 15 iterations, which demonstrates its
fast convergence. One can clearly observe for the figure that the BER performance
is enhanced as d decreases; thus, fine-tuning of code rate can be achieved.
740 9 Advanced Coding and Coded Modulation Techniques
Fig. 9.39 BER performance vs. Q factor with maximum number of iterations set to 10
Fig. 9.40 BER performance vs. Q factor with maximum number of iterations set to 15
9.11 Coded Modulation and Unequal Error Protection 741
Let dunc denote the minimum Euclidean distance in original, uncoded signal
constellation diagram, and let dmin denote the minimum distance in sequence of
symbols after coding. When the uncoded normalized average energy, denoted as
Eunc, is different from the normalized average energy after coding, denoted as
Ecoded, the asymptotic coding gain can be defined as follows:
One point
selected
One point out of
Additional n-k selected out of
2(n+r) / (N/2) Two-
info bits Signal point 2n+r possible To channel
Constellation possible dimensional
selection mapper modulator
from coset (MQAM,
One coset selected Modulation stage MPSK, …)
k+r
out of 2 possible
illustrated in Fig. 9.41, which is based on Forney’s interpretation [94, 95] (see also
[96]). Two-dimensional (2-D) modulator such as M-ary QAM (I/Q) modulator or
M-ray PSK modulator is used to impose the sequence of symbols to be transmitted.
The N-dimensional lattice is used for code design. A lattice represents a discrete set
of vectors in real Euclidean N-dimensional space, which forms a group under
ordinary vector addition, so the sum or difference of any two vectors in the lattice
is also in the lattice. A sublattice is a subset of a lattice that is itself a lattice. The
sequence space of uncoded signal is a sequence of points from N-cube, obtained as
a Cartesian product of 2-D rectangular lattices with points located at odd integers.
Once the densest lattice is determined, we create its decomposition into partition
subsets known as cosets. The k information bits are used as input to binary encoder,
be it block or convolutional. The binary encoder generates the codeword of
length k + r, where r is number of redundant bits. With k + r bits, we can select
one out of 2k + r possible cosets. Each coset contains 2n – k points, and therefore,
n k additional information bits are needed to select a point within the coset. Given
that the lattice is defined in N-dimensional space while 2-D modulator imposes the
data in 2-D space, N/2 consecutive transmissions are needed to transmit a point
from the coset. Therefore, information bits are conveyed in two ways: (i) through
the sequence of cosets from which constellation points are selected and (ii) through
the points selected within each coset. Let dpoints denote the minimum distance of
points within the coset and dseq denote the minimum distance among coset
sequences, and then the minimum distance of the code can be determined as
dmin ¼ min(dpoints,dseq). Since the fundamental volume per N dimensions is 2r,
where r is the number
pffiffiffiffi
ffi of redundant bits, the normalized volume per two dimensions
would be N=2 2r ¼ 22r=N , and the coding gain of this coded modulation scheme can
be estimated as:
d2min
G¼ ¼ 22r=N d 2min : ð9:143Þ
22r=N
9.11 Coded Modulation and Unequal Error Protection 743
Clearly, the normalized redundancy per two dimensions is equal to r/(N/2) ¼ 2r/N.
When the constellation is chosen to be N-sphere-like to reduce the average energy,
we need to account for an additional gain, often called the shaping gain, denoted
with Gs, which measures the reduction in energy. Calderbank and Sloane have
shown that the shaping gain of an N-sphere over N-cube, when N is even, is given
by [97]:
π ðN=2Þ þ 1
Gs ¼ : ð9:144Þ
6 ½ðN=2Þ!1=ðN=2Þ
For instance, for N ¼ 2 and 4, the shaping gains are π/3 (0.2 dB) and π/23/2
(0.456 dB), respectively. The shaping gain in limiting case, as N tends to infinity,
is πe/6 (1.533 dB).
Based on Forney’s guidelines [94], it is possible to generate maximum-density
N-dimensional lattices by using a simple partition of a 2-D lattice with
corresponding block/convolutional code, when N ¼ 4, 8, 16, and 24, by applying
the subset partition rules as shown in Fig. 9.42. The 4-D lattice is obtained by taking
all sequences of pair of points from the same subset, such as (A,A) or (B,B). The 8-D
lattice is obtained by taking all sequences of four points of either type-A or type-B.
Each point in subset has a single subscript. Within each of four-point subset, the
point subscripts satisfy the parity-check equation i1 + i2 + i3 + i4 ¼ 0, so that the
sequence subscripts must be codewords in the (4,3) parity-check code, which has a
minimum Hamming distance of two. Therefore, three information bits and one
parity bit are used to determine the lattice subset. The 16-D lattice is obtained by
taking all sequences of eight points of either type-A or type-B. Each point has two
subscripts. The subscripts in the subset belong to a codeword from extended
. . . . . . . . . . . . . . . .
⋅ ⋅ ⋅ B000 A000 B110 A110 B000 A000 B110 A110 B000 A000 ⋅ ⋅ ⋅
⋅ ⋅ ⋅ A101 B010 A010 B101 A101 B010 A010 B101 A101 B010 ⋅ ⋅ ⋅
⋅ ⋅ ⋅ B111 A111 B001 A001 B111 A111 B001 A001 B111 A111 ⋅ ⋅ ⋅
⋅ ⋅ ⋅ A011 B100 A100 B011 A011 B100 A100 B011 A011 B100 ⋅ ⋅ ⋅
⋅ ⋅ ⋅ B000 A000 B110 A110 B000 A000 B110 A110 B000 A000 ⋅ ⋅ ⋅
⋅ ⋅ ⋅ A101 B010 A010 B101 A101 B010 A010 B101 A101 B010 ⋅ ⋅ ⋅
⋅ ⋅ ⋅ B111 A111 B001 A001 B111 A111 B001 A001 B111 A111 ⋅ ⋅ ⋅
⋅ ⋅ ⋅ A011 B100 A100 B011 A011 B100 A100 B011 A011 B100 ⋅ ⋅ ⋅
⋅ ⋅ ⋅ B000 A000 B110 A110 B000 A000 B110 A110 B000 A000 ⋅ ⋅ ⋅
⋅ ⋅ ⋅ A101 B010 A010 B101 A101 B010 A010 B101 A101 B010 ⋅ ⋅ ⋅
. . . . . . . . . . . . . . . .
Fig. 9.42 Subset partition for up to 24-dimensional lattice
744 9 Advanced Coding and Coded Modulation Techniques
Hamming code (16,11) of min Hamming distance 4. Finally, the 24-D lattice is
obtained by taking all sequences of 12 points of either type-A or type-B. Each point
has three subscripts (i,j,k). The subscripts (i,j) in 12-point subset form a codeword
from Golay (24,12) code of minimum Hamming distance 8. The third subscript
k represents overall parity check; for B-points even parity check is used, and for
A-points odd parity check is used (or vice versa). The corresponding coding gains
are 1.5 dB, 3 dB, 4.5 dB, and 6 dB for lattice codes of dimensionalities 3, 8, 16, and
24, respectively [94].
Q
s0 s2
s3
Seven s1
s4 Seven dmin
s6 s5 s4 s0 I
s1 s2
s3
Sodd Sodd s5 s7
s7
s6
(a) (b)
Fig. 9.43 Illustration of the two-state TCM trellis section for 8-ary signal constellation S ¼ (s0,
s1,..,s7) (a) and corresponding 8-PSK signal constellation (b)
9.11 Coded Modulation and Unequal Error Protection 745
Euclidean distance between any two codewords in the code. The path
corresponding to the minimum distance from (s0,s0)qpath is (s2,s1) path.ffi
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
Therefore, the free distance of this TCM scheme is dfree ¼ d2E ðs2 ; s0 Þ þ d2E ðs1 ; s0 Þ
pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
¼ 2 þ 4sin 2 ðπ=8Þ, where dE(si, sj) is the Euclidean distance between signal
constellation points si and sj. By using Eq. (9.7), we can calculate the asymptotic
coding gain as follows:
To increase the coding gain, we can use trellis with larger number of states. For
instance, the 4-state TCM trellis is shown in Fig. 9.44. Two shortest paths require
three steps to return back to the state s0. The shortest path with respect to the
all-zero path is (s4,s0,s0) path, and the corresponding Euclidean distance square is
4. The asymptotic coding gain for 4-state TCM scheme is determined as follows:
Ga ¼ d2free =d2unc ¼ 4=2 ¼ 2 ð3 dBÞ:
The mapping of constellation points should be achieved on such a way to
maximize the asymptotic coding gain; in other words, to maximize the free
S1 s1
s0
s7 s4
s5
S2
s7
s3 s3
s1
S3
746 9 Advanced Coding and Coded Modulation Techniques
010
011 001=c2c1c0
d0=
2sin(π/8)
100 000
c0=0 c0=1
101 111
110
d1=√2
c2=0
c2=0 c2=0
c2=0
c2=1
d2=2
c2=1 c2=1
c2=1
Fig. 9.45 The set partitioning of 8-PSK with natural mapping rule
Euclidean distance. One popular way to achieve so is through the so-called set
partitioning. A 2m-ary signal constellation set is partitioned into m-levels. At the i-th
partition level (0 i m 1), the signal Si is split into two subsets Si(0) and
Si(1) so that the intra-set-squared Euclidean distance d2i is maximized. With each
subset choice Si(ci), we associate a bit label ci. The end result of this process is
unique m-label c0c1. . .cm 1 associated with each constellation point s
(c0c1. . .cm 1). By employing this Ungerboeck (standard) set partitioning of 2m-
ary signal constellation, the intra-set distances per levels are arranged in
nondecreasing order as level index increases; in other words: d 20 d 21 d2m1 :
As an illustration, the set partitioning of 8-PSK with natural mapping rule is shown
in Fig. 9.45. Clearly, in level three there are four subsets (cosets) with each subset
containing two points. To select a given coset, two bits are needed. Rate ½
convolutional code can be used for this purposes as illustrated in Fig. 9.46a. To
select a point within a given subset (coset), one information bit is needed. The
overall code rate of this trellis-coded 8-PSK modulation scheme is ¾. The
corresponding trellis diagram is shown in Fig. 9.46b. The current state is defined
by the content of shift register (D0D1), while the next state by (u0D1). The first two
bits (c0c1) are used to select the coset, while the information bit u1 (code bit c2) is
used to select a point within that coset.
The general encoder for (m 1)/m TCM scheme is shown in Fig. 9.47. The
k information bits are used as input to rate k/(k + 1) convolutional code, whose
codeword (c0c1. . .ck) is used to select a coset (signal constellation subset). Addi-
tional m (k + 1) information bits are used to select a point within the coset.
9.11 Coded Modulation and Unequal Error Protection 747
8-PSK signal
mapping
c0
00111100
u0
D0 D1
Partition label
c1
00110011
u1 c2
01010101
04371526
Signal index
(a)
000
00 00
011 100 011
111
111
01 111 01
001
101
10 100 10
010 010
110 001 110
11 11
101
(b)
Fig. 9.46 Encoder for four-state rate 2/3 trellis-coded 8-PSK modulation (a) and corresponding
trellis diagram (b)
To decode the most likely TCM sequence, the Viterbi algorithm can be used, in
similar fashion as described in Sect. 3. For the branch metric, either correlation
metric or Euclidean distance can be used. The survivor path memory path must
include the m (k + 1) information (uncoded) bits. Because of the parallel edges,
748 9 Advanced Coding and Coded Modulation Techniques
k info bits Rate k/(k+1) (k+1) coded bits Select the coset
convolutional (signal constellation
code subset)
Information c1
Encoder 1
sequence 1,u1
c2 Bits-to- s(c) M-ary To channel
u2 Encoder 2 symbol 2-D
…
mapping modulator
um cm
Encoder m
With this interpretation, the symbol at j-th time instance ( j ¼ 1,2,. . .,n) is obtained
after the mapping sj ¼ s(cj), where cj ¼ (ci,j ci,2 . . . ci,m) and s() is corresponding
mapping rule. The 2m-ary 2-D modulator, such as I/Q
and PSK modulators, is used
to impose the selected signal constellation point si ¼ si, I ; si, Q , where si , I and si , Q
are corresponding in-phase and quadrature components, on corresponding carrier
signal. For instance, the signal index can be used as the address for look-up table
(LUT) where the coordinates are stored. Once the coordinates are selected, the
in-phase and quadrature components are used as inputs of corresponding pulse
shapers, followed by driver amplifiers. For optical communications, the optical I/Q
modulator is further used to perform electrical-to-optical conversion. For wireless
applications, after the I/Q modulator, the corresponding signal is after power
amplifier is used as input to the transmit antenna.
The overall code rate (spectral efficiency) of this MCM scheme, expressed in
bits/symbol, is given by:
Xm Xm Pm
i¼1 k i
R¼ R ¼
i¼1 i
k =n ¼
i¼1 i
: ð9:145Þ
n
The minimum squared Euclidean distance (MSED) of this scheme is lower bounded
by [85]:
n o
ðH Þ
MSED min di di , ð9:146Þ
1im
coding gain with respect to uncoded QPSK is at least 3 dB. When properly designed
LDPC codes are used as component codes, the capacity achieving performance can
be obtained [99, 100].
Each component code can be represented as trellis diagram as described in
Sect. 3. By taking the Cartesian product of individual trellises and then performing
mapping based on set partitioning, we obtain a trellis description of this MCM
scheme. Now we can apply either Viterbi algorithm or BCJR algorithm to perform
decoding on such trellis. Unfortunately, the complexity of such decoding is too high
to be of practical importance. Instead, the decoding is typically based on the
so-called multistage decoding (MSD) algorithm [7] in which the decisions from
prior (lower) decoding stage are passed to the next (higher) stage, which is
illustrated in Fig. 9.49.
The i-th decoder operation (i ¼ 2,. . .,m) is delayed until the (i 1)-th decoder
completes the decoding algorithm. Further, after the decoding, the i-th decoder
(i ¼ 1,. . .,m 1) output is delayed until the m-th decoder decoding algorithm is
750 9 Advanced Coding and Coded Modulation Techniques
û 1
Decoder 1 Delay 1
û 2
Received Decoder 2 Delay 2
Delay TD1
samples, r
…
…
From Decoder m-1
uˆ m
Delay TDm Decoder m
Extrinsic LLRs
û 1
LDPC decoder 1
APP
Received Symbol LLRs- û 2
demapper LDPC decoder 2
samples
to-bit LLRs
rl=(rl,I, rl,Q) (Symbol LLRs
…
calculation
calculation)
LDPC decoder m uˆ m
where with La(si) we denote the prior reliability of symbol si. Let us denote by sij the
j-th level of the transmitted symbol si represented as si ¼ (si1,. . .,sim), where
sij2{0,1}. The prior symbol LLRs for the next iteration are determined by
Ym
P sij ¼ 0
P s j¼1
La si ¼ log
i ¼ log Ym
¼
P s0
P sij ¼ 0 ð9:150Þ
j¼1
X
m
P sij Xm
P sij
¼ log
¼ La sij , La sij ¼ log
j¼1 P sij ¼ 0 j¼1 P sij ¼ 0
X m
La s^i ¼ LD, e s^ij , ð9:151Þ
j¼1
where
752 9 Advanced Coding and Coded Modulation Techniques
ðtÞ ðt1Þ
LD, e s^ij ¼ L sij L sij ð9:152Þ
In (9.152), we use L(s(t)ij) to denote the LDPC decoder output in current iteration
(iteration t). The symbol LLRs corresponding to the j-th decoder L(sij) are deter-
mined from symbol LLRs (9.149) by
P
P
si :sij ¼1 exp L si exp si :sik ¼0, k6¼j La sik
L s^ij ¼ log P
P
: ð9:153Þ
s :sij ¼0 exp L si exp
i
s :sik ¼0, k6¼j La sik
i
Therefore, the j-th position reliability in (9.153) is calculated as the logarithm of the
ratio of a probability that sij ¼ 1 and probability that sij ¼ 0. In the nominator, the
summation is done over all symbols si having 1 at the position j, while in the
denominator over all symbols si having 0 at the position j. With La(sik) we denoted
the prior (extrinsic) information determined from the APP demapper. The inner
summation in (9.153) is performed over all positions of symbol si, selected in the
outer summation, for which sik ¼ 0, k 6¼ j. The j-th position LLRs are forwarded to
corresponding binary LDPC decoders. The iteration between the APP demapper
and LDPC decoders is performed until the maximum number of iterations is
reached or the valid codewords are obtained.
Clearly, in MLC different bits transmitted over the channel are differently
protected, and such the MLC is suitable for unequal error protection (UEP). The
MLC channel encoder consists of m different binary error-correcting codes C1, . . . ,
Cm with decreasing codeword distances. The i-th priority bit stream is used as the
input to the i-th encoder, which generates the coded bits Ci. The rest is the same as
described above. As an illustration, in image compression, one type of channel code
can be used for bits corresponding to the low-resolution reproduction of the image,
whereas high-resolution bits that simply refine the image can be protected by a
different channel code. This is particularly important in JPEG 2000 image com-
pression standard, in which the image is decomposed into a multiple resolution
representation. The JPEG 2000 provides efficient code-stream organizations that
are progressive by pixel accuracy and by image resolution. Thanks to such organi-
zation, after a smaller portion of the whole file has been received, the viewer can see
a lower-quality version of the picture. The quality of the picture then gets improved
progressively through downloading additional data bits from the source.
For UEP, the nested coding can also be used. Nested coding can be interpreted as
follows. Let us consider m different information vectors ui (i ¼ 1, . . ., m) of length
km. We would like to jointly encode these information vectors in such a way that
each information vector is associated with a codeword from a different subcode.
The i-th subcode C i is represented by the generator matrix Gi of rate Ri ¼ ki/n. The
overall generator matrix is given by:
9.11 Coded Modulation and Unequal Error Protection 753
2 3
G1
6 G2 7
G¼6 7
4 ⋮ 5: ð9:154Þ
Gm
where we use
to denote the bitwise XOR operation. If we are interested in
unequal error correction, by setting ui ¼ u, by varying the number of generator
matrices Gi we can achieve different levels of protection. The lowest level of
protection would be to use only one generator matrix. The highest level of protec-
tion, corresponding to high priority bits, will be achieved by encoding the same
information vector u m-times.
To improve the spectral efficiency of MLC scheme, the time-multiplexed-coded
modulation can be used. The key idea is to use different coded modulation schemes
for different priority classes of information bits. Let Ti be the fraction of time in
which the i-th priority code Ci is employed and let Rs,i denote the corresponding
symbol rate. The overall symbol rate Rs of this scheme would be
P
i Rs , i T i
Rs ¼ P : ð9:156Þ
iTi
When all component codes in MCM scheme have the same rate, the
corresponding scheme in [12], and related papers, is called as block-interleaved
coded modulation, as it contains the block interleaver. This particular version, when
combined with optimum signal constellation and optimum mapping rule designs
[12, 123, 124, 125], performs comparable to MLC, but has even lower complexity.
At the same time, it is suitable for implementation in hardware at high speed, as
m LDPC decoders operate in parallel at bit rate equal to symbol rate Rs. In
conventional bit-interleaved coded modulation (BICM) scheme [89], described in
next section, a single LDPC decoder is required operating at rate m Rs, which can
exceed the speed of existing electronics for fiber-optics communications, where the
information symbol rate is typically 25 GS/s.
For convergence behavior analysis of the block-interleaved coded modulation
for optical communication applications, the EXIT chart analysis should be
performed. In order to determine the mutual information (MI) transfer characteris-
tics of the demapper, we model the a priori input LLR, LM,a, as a conditional
Gaussian random variable [101]. The MI between c and LM,a is determined
754 9 Advanced Coding and Coded Modulation Techniques
numerically as explained in [101] (see also [90, 91, 99, 100, 102, 103]). Similarly,
the MI IL M,e between c and LM,e is calculated numerically, but with the p.d.f. of
c and LM,e determined from histogram obtained by Monte Carlo simulation, as
explained in [101]. By observing the IL M,e as a function of the MI of IL M,a and
optical signal-to-noise ratio, OSNR, in dB, the demapper EXIT characteristic
(denoted as TM) is given by:
IL M, e ¼ T M ðI L M, a ; OSNRÞ: ð9:157Þ
IL D, e ¼ T D ðI L D, a Þ: ð9:158Þ
IL M, e ¼ IL D, a , ð9:159Þ
are fed to LDPC decoder. The LDPC decoder output LLRs, described by
IL D, e ¼ IL M, a , ð9:160Þ
are fed to the APP demaper. The iterative procedure is repeated until the conver-
gence or the maximum number of iterations has been reached. This procedure is
illustrated in Fig. 9.51, where the APP demapper and LDPC decoder EXIT charts
are shown together on the same graph. Three modulation formats (8-PSK, 16-PSK,
16-QAM) are observed, as well as the following mappings: natural, gray, and anti-
gray. The EXIT curves have different slopes for different mappings. The existence
of “tunnel” between corresponding demapping and decoder curves indicates that
iteration between demapper and decoder will be successful. The smallest OSNR, at
which iterative scheme starts to converge, is known as threshold (pinch-off) limit
[101]. The threshold limit in the case of 16-PSK (Fig. 9.51b) is about 3 dB worse as
compared to 8-PSK (Fig. 9.51a). The 16-QAM mapping curve is well above the
16-PSK curve (see Fig. 9.1b), indicating that 16-QAM scheme is going to signif-
icantly outperform the 16-PSK one.
IM,e->ID,a
0.6
Decoder:
LDPC(4320,3242,0.75)
8-PSK, OSNR=8 dB / 0.1nm:
0.4 Demapper:
Gray
Natural
Anti-Gray
0.2
0.0 0.2 0.4 0.6 0.8 1.0
ID,e->IM,a
(a)
1.0
0.8
IM,e->ID,a
Decoder:
0.6 LDPC(4320,3242,0.75)
16-PSK, OSNR=11 dB / 0.1nm:
Demapper:
Gray
0.4 Natural
16-QAM, OSNR=11 dB / 0.1nm:
Demapper:
Gray
0.2
0.0 0.2 0.4 0.6 0.8 1.0
ID,e->IM,a
(b)
interleaver is grouped in block of m bits, and during signaling interval, these m bits
are used as input of corresponding mapper, such as gray, anti-gray, and natural
mapping, and after the mapper, m bits from mapper are used to select a point from a
2m-ary signal constellation. The rest of the transmitter is similar to that for MLC
scheme. On receiver side, the configurations of demodulator, APP demapper, and
symbol LLRs-to-bit LLRs calculation block are similar to those for MLC scheme.
After the deinterleaving of bit LLRs, corresponding bit reliabilities are forwarded to
a single binary decoder. For this scheme, the choice of mapping rule is of high
importance. For iterative decoding and demapping, the gray mapping rule is not
necessarily the best mapping rule. The EXIT chart analysis should be used to match
the APP demapper and LDPC decoder choice.
756 9 Advanced Coding and Coded Modulation Techniques
m
Pseudorandom bits Bits-to- s(c) 2m-ary To
Information Binary c
bit interleaver symbol 2-D
sequence u encoder channel
π mapping modulator
(a)
(b)
Fig. 9.52 Bit-interleaved coded modulation (BICM) scheme: (a) BICM encoder and (b) BICM
decoder configurations
m−k bits
Information Store and
Turbo Interleaver
sequence u distribute
encoder Puncturer Π
m−k bits
m−k k
bits bits
There exist different approaches to coded modulation based on turbo codes such as
pragmatic coded modulation [104], turbo TCM with symbol interleaving
[105, 106], and turbo TCM with beat interleaving [88].
In the so-called pragmatic coded modulation [104], encoders and decoders are
binary, as shown in Fig. 9.53. Therefore, this scheme has certain similarities with
BICM scheme. Turbo encoder sequence is split into blocks of m k bits each,
which are then used as input to storage and distribution block.
The m k bits at the output of this block are forwarded directly to interleaver,
while at the same time m k bits are puncture down to k bits and then forwarded
to the interleaver Π. Therefore, the interleaver collects m bits at the time.
9.11 Coded Modulation and Unequal Error Protection 757
Mapping
RSC 1
(a)
Symbol
Decoder 1 interleaver
Πs
Decision
step block
Symbol
interleaver Decoder 2
Πs
(b)
Fig. 9.54 Symbol-interleaved turbo TCM: (a) encoder and (b) decoder architectures
After interleaving, m bits are taken from interleaver to select a point from
corresponding 2m-ary signal constellation. The rest of the transmitter is similar to
that of BICM scheme.
The symbol interleaving TCM scheme is shown in Fig. 9.54. The encoder
architecture is shown in Fig. 9.54a. Clearly, the interleaver operates on symbol
level, each symbol contains m bits, even positions in interleaver get mapped to even
positions, and odd positions get mapped to odd positions. Tow TCM encoders are
coupled by the symbol interleaver. The RSC codes have the rate k/(k + 1). The
alternate selector selects the upper and lower branches in an alternative fashion. The
m (k + 1)-uncoded bits and k + 1-coded bits from RSC are used to select a point in
a signal constellation diagram. Given the existence of two alternative modulation
branches, the careful puncturing of the redundant symbols is needed.
The symbol-interleaved TCM decoder architecture is shown in Fig. 9.54b.
Clearly, the symbol-interleaved TCM decoding principle is very similar to that of
758 9 Advanced Coding and Coded Modulation Techniques
(m−k−1)/2 bits
m/2 bits
RSC 1 Bits-to-
(m−k−1)/2 bits
symbol
To
mapping
channel
+
Interleaver Interleaver
2-D
Π1 Π2
modulator
m/2 bits
RSC 2
turbo decoding principle, and the key difference is that interleavers operate on a
symbol level. Additional details on this scheme can be found in [105, 106].
The bit-interleaved turbo TCM, shown in Fig. 9.55, was introduced by
Benedetto et al. in 1996 [88]. In this scheme, instead of symbol interleaving and
puncturing of redundant symbols, multiple bit interleavers are employed. After
RSC 1, we select m/2 systematic bits and puncture the remaining ones. In RSC2 we
select the bits positions punctured in RSC1 as the output and puncture the
remaining ones. The permutation block Π1 permutes the bits selected by RSC1.
On the other hand, the permutation block Π2 permutes the bits punctured by RSC1.
The remaining m/2 bits from RSC1 and m/2 bits from RSC2 are used to select a
point form 2m-ary signal constellation.
It has been shown that multilevel coding with parallel independent decoding
(MLC/PID) and iterative detection and decoding (IDD) perform very well under
diverse optical fiber transmission scenarios [2, 10–12]. Recently, nonbinary LDPC-
coded modulation (NB-LDPC-CM) has been shown to outperform its corresponding
MLC/PID + IDD scheme with performance gaps increasing as the underlying signal
constellation size increases [82]. NB-LDPC-CM employs a single component code
defined over an alphabet that matches in size to the underlying constellation size,
which in return eliminates the need for iterative demapping-decoding but increases
the decoding complexity. In this section, we described alternative, hybrid
multidimensional LDPC-coded modulation scheme, which represents the generali-
zation of hybrid coded modulation scheme introduced in [50] that lies essentially in
between the two extremes described in [10], employing only binary LDPC codes,
and [82], employing a single nonbinary LDPC code over a large finite field, in terms
9.12 Hybrid Multidimensional Coded Modulation Scheme for High-Speed Optical. . . 759
D-dimensional
D-dimensional
GF(2b1)−Level 1
modulator
mapper
Source To SDM
…
channels fiber
bm bm
NB LDPC encoder
GF(2b1)−Level m
(a)
Extrinsic LLRs
…
calculation
D-dim. const.
samples NB LDPC
pol. diversity Rx
decoder
D-dimensional
Mode demux +
APP demapper
LLRs calculation
D-dimensional
demodulator
Extrinsic level
GF(2b1)−Level 1
From SDM
…
…
…
fiber
NB LDPC
decoder
GF(2bm)−Level m
(b)
Content of spatial mode 1
DAC
DAC
DAC
DAC
DAC
DAC
DAC
DAC
LDN1
LD1
…
QN1x
IN1x
Q1x
Q1y
I1x
I1y
QN1y
IN1y
modulator
…
modulator
4-D E/O
4-D E/O
Power-
combiner
Spatial division
multiplexer
D-dimensional modulator
SDM fiber
(c)
SDM fiber
D-dimensional demodulator
Spatial division
demultiplexer
Power-
splitter 4N1-dimensional
… demodulator 1 …
(d)
Fig. 9.56 Hybrid multidimensional coded modulation: (a) transmitter configuration, (b) receiver
configuration, (c) configuration of D-dimensional modulator, and (d) D-dimensional demodulator
configuration. SDM spatial division multiplexing. SDM fibers could be FMF, FCF, FMFCF, or
SMF. The corresponding signal space is D ¼ 4N1N2-dimensional, where N1 is number of
sub-bands in a supperchannel with orthogonal center frequencies and N2 is number of spatial
modes. The factor 4 originates from 2 polarization states and in-phase and quadrature channels
9.12 Hybrid Multidimensional Coded Modulation Scheme for High-Speed Optical. . . 761
D-dim.
constellation
BI LDPC encoder 1,
D-dimensional
D-dimensional
Interleaver or
R1=k1/n
n ×m block-
interleaver
modulator
Source m
mapper
… To SMF /
…
channels
…
SDM fiber
BI LDPC encoder m,
Rm=km/n
(a)
D-dim. const.
samples
D
APP
LDPC decoder 1
demapper 1
D-dimensional
pol. diversity Rx
demodulator
Mode demux +
D
APP LDPC
From SDM
demapper 2 decoder 2
…
fiber
…
…
D
APP
LDPC decoder m
demapper m
(b)
Fig. 9.57 MLC-based multidimensional coded modulation: (a) transmitter configuration of MLC
and block-interleaved coded modulation schemes and (b) the multistage decoding principle
m interleavers, one per LDPC encoder, decomposing, therefore, the BICM scheme
from Fig. 9.56a into m parallel conventional bit-interleaved coded modulation
schemes due to Caire et al. [89]. The corresponding schemes perform comparable
under AWGN channel assumption.
On the other hand, the NB-LDPC-CM of [82], whose generalization to
D-dimensional space is shown later in Fig. 9.87, is a particular instance of hybrid
CM scheme employing a single level with an M-ary LDPC code and performing just
a single pass through the detector and the decoder without any feedback. In hybrid
multidimensional CM scheme, the number of levels is between 1 and log2(M
).
The hybrid CM approach combines component codes defined over GF 2bi , 1
i m in a way that the condition b1 + . . . + bm ¼ log2(M ) is satisfied. Thus, the
resulting NB-LDPC-coded modulation schemes are not homogenous in the field
orders of their component codes, but are rather heterogeneous. They enable the
interaction of component codes over various fields and hence the name hybrid
LDPC-coded modulation scheme.
The configuration of D-dimensional modulator is shown in Fig. 9.56c. Clearly,
conventional PDM scheme is just a special case corresponding to fundamental
mode only by setting N1 ¼ N2 ¼ 1. Transmitter side DSP provides coordinates for
D-dimensional signaling. The 4-D modulator is composed of polarization beam
splitter, two I/Q modulators corresponding to x- and y-polarizations, and polariza-
tion beam combiners.
One spatial mode contains the data streams of N1 power-combined 4-D data
streams. The N2 data streams, corresponding to N2 spatial modes, are combined into
762 9 Advanced Coding and Coded Modulation Techniques
a signal data stream by spatial division multiplexer and transmitted over SDM fiber.
On the other hand, the D-dimensional demodulator, shown in Fig. 9.56d, provides
the samples corresponding to signal constellation estimates.
The LLRs of symbols si (i ¼ 1,. . ., M ) are calculated in an APP demapper block
as follows:
Pðsi jrÞ
Lðsi Þ ¼ log , ð9:161Þ
Pðs0 jrÞ
Pðrjsi ÞPðsi Þ
Pðsi jrÞ ¼ P 0 0 : ð9:162Þ
s0 Pðrjs ÞPðs Þ
Notice that si is the transmitted signal constellation point at time instance i and rij
( j ¼ 1,2,. . .,D) are corresponding samples obtained at the output of D-dimensional
demodulator, shown in Fig. 9.56d. In the presence of fiber nonlinearities, P(r|si) in
(9.36) needs to be estimated evaluating the histograms, by propagating a sufficiently
long training sequence. With P(si) we denote the a priori probability of symbol si,
while s0 is a reference symbol. By substituting (9.36) into (9.35), we obtain:
Pðri jsi ÞPðsi Þ Pðri jsi Þ Pð s i Þ
Lðsi Þ ¼ log ¼ log þ log
Pðri js0 ÞPðs0 Þ Pðri js0 Þ Pð s 0 Þ
ð9:163Þ
Pðri jsi Þ Pðsi Þ
¼ log þ La ðsi Þ, La ðsi Þ ¼ log ,
Pðri js0 Þ Pð s 0 Þ
where with La(si) we denote the prior reliability of symbol si. Let us denote by sij the
j-th component of the transmitted symbol si represented as si ¼ (si1,. . .,sim), where
sij2GF(2mi). The prior symbol LLRs for the next iteration are determined by:
Y
m
P sij
Pð s i Þ j¼1
La ðsi Þ ¼ log ¼ log Y
m
¼
Pð s 0 Þ
P sij ¼ 0 ð9:164Þ
j¼1
X
m
P sij Xm
P sij
¼ log
¼ La sij , La sij ¼ log
j¼1 P sij ¼ 0 j¼1 P sij ¼ 0
X m
La s^i ¼ LD, e s^ij , ð9:165Þ
j¼1
where
ðtÞ ðt1Þ
LD, e s^ij ¼ L sij L sij ð9:166Þ
In (9.166), we use L(s(t)ij) to denote the LDPC decoder output in current iteration
(iteration t).
The symbol LLRs corresponding to the j-th decoder L(sij) are determined from
symbol LLRs (9.163) by
P
P
si :sij ¼s exp ½ L ð s i Þ exp si :sik ¼0, k6¼j La ð s ik Þ
L s^ij ¼ log P
P : ð9:167Þ
si :sij ¼0 exp ½ L ð s i Þ exp si :sik ¼0, k6¼j L a ð s ik Þ
Therefore, the j-th position reliability in (9.167) is calculated as the logarithm of the
ratio of a probability that sij ¼ s, s2GF(2mi)\{0} and probability that sij ¼ 0. In the
nominator, the summation is done over all symbols si having s2GF(2mi)\{0} at the
position j, while in the denominator over all symbols si having 0 at the position j.
With La(sik) we denoted the prior (extrinsic) information determined from the
APP demapper. The inner summation in (9.41) is performed over all positions of
symbol si, selected in the outer summation, for which sik ¼ 0, k 6¼ j. The j-th position
LLRs are forwarded to corresponding LDPC decoders operating over GF(2mj). The
iteration between the D-dimensional APP demapper and NB-LDPC decoders is
performed until the maximum number of iterations is reached, or the valid
codewords are obtained.
Instead of parallel independent decoding (PID) fashion, described above, itera-
tive demapping and decoding can be performed in a multistage decoding fashion, in
which the reliabilities from the higher i-th (i ¼ 1,2,. . .,m 1) decoding stage are
forwarded to the lower (i + 1)-th decoding stage, as shown in Fig. 5.57b. In this
scheme, the code rates of LDPC codes are arranged in increasing order:
R1 < R2 < . . . < Rm. However, this decoding scheme exhibits higher decoding
complexity and higher latency compared to PID.
764 9 Advanced Coding and Coded Modulation Techniques
2m-ary LDPC
LDPC Encoder
Optical I/Q
Modulator
Encoder
Optical I/Q
m I
Mapper
Modulator
m I m
Mapper
mxN
LDPC Encoder
…
Q Q
LDPC Encoder
LDPC Decoder
2m-ary LDPC
Demapper
Demapper
Coherent
Coherent
I’
Calculate
Detector
Detector
Decoder
Bit LLR
I’
LDPC Decoder
… Q’
Q’
LDPC Decoder
(a) (b)
q q
Block-interleaver
q I
m/q x N
Mapper
q m
2q-ary LDPC Encoder
…
Q
q q
2q-ary LDPC Encoder
q
2q-ary LDPC Encoder
Symbol LLR
Demapper
Converter
Coherent
Detector
I’ q
2q-ary LDPC Encoder
Q’ …
q
2q-ary LDPC Encoder
(c)
Fig. 9.58 Transmitter and receiver structures of (a) BI-LDPC-CM, (b) NB-LDPC-CM, and (c)
multilevel NB-LDPC-CM. These are particular instances of hybrid multidimensional coded
modulation scheme shown in Fig. 9.56 applied to 2-D signaling schemes
9.12 Hybrid Multidimensional Coded Modulation Scheme for High-Speed Optical. . . 765
components which are further modulated onto the optical carrier through the optical
I/Q modulator. For NB-LDPC-CM in Fig. 9.58, the m parallel binary information
streams can be regarded as a single nonbinary stream over an alphabet of Q ¼ 2m
symbols. This Q-ary information stream of length K is encapsulated into a
codeword of length N symbols by a single Q-ary LDPC encoder of code rate
R ¼ K/N. The mapper then maps each Q-ary codeword symbol to a Q-ary (or 2m-
ary) constellation point s ¼ (Ix, Qx, Iy, Qy). The following optical modulator
operates in the same way as described before. As shown in Fig. 9.58c, different
from NB-LDPC-CM, the multilevel NB-LDPC-CM employs nonbinary LDPC
code with smaller Q, i.e., Q ¼ 2q, while 1 < q < m. The m parallel information
bit streams are first grouped into L ¼ m/q sets of bit streams, while L represents the
number of decoding levels.
Each set of bit streams is considered as a stream of 2q-ary symbols. The L 2q-ary
information streams of length K are then encoded into codewords of length
N separately by L 2q-ary LDPC encoders and later are block-interleaved through
an L N block interleaver, similar to that for BI-LDPC-CM. Then each tuple of L 2
q
-ary symbols are mapped to a 2m-ary constellation point followed with the optical
I/Q modulation. We have noticed that BI-LDPC-CM and NB-LDPC-CM are in fact
two special cases of the proposed multilevel NB-LDPC-CM for q ¼ 1 and q ¼ m,
respectively. Obviously, the selection of q becomes a tradeoff between performance
and complexity.
At the receiver, the demapper first calculates the symbol LLRs L(s) for each
received symbol with s2{0,1,...,M 1} indicating the log-likelihood of sending a
symbol on the constellation map. Since L-level Q-ary symbols have been used, it is
natural to represent a symbol s by a tuple of L Q-ary symbols as S ¼ {s0,s1,...,sL 1}
with si2{0,1,...,Q 1} for any i 2{0,1,...,L 1}. Corresponding to the configura-
tion of the transmitter, L(s) with s2{0,1,...,M 1} are then converted into L parallel
Q-ary symbol LLRs L(si) with si2{0,1,...,Q 1} and i 2{0,1,...,L 1} according to
the following equation:
!
X
M1
LðsÞ
Lðsi Þ ¼ log e ð9:168Þ
s¼0, si 2S
Each GF(Q) decoder then performs decoding separately after which L Q-ary
symbol estimates are converted into the one M-ary symbol and later m bits to count
bit errors. As noticed in our previous analysis, the BI-LDPC-CM and NB-LDPC-
CM schemes serve as two special cases of multilevel NB-LPDC-CM, and the above
receiver side processing can also be applied to BI-LDPC-CM and NB-LDPC-CM
by setting q ¼ 1 and q ¼ m, respectively. Notice that for BI-LDPC-CM, iterative
decoding between demapper and LDPC decoder can be applied.
Coded modulation with the adoption of nonbinary LDPC codes achieves prom-
ising net coding gain (NCG) performance at the expense of very high complexity in
both hardware and computation. As hardware complexity analysis is affected by
many practical tradeoff factors like throughput and parallelization and hence not
766 9 Advanced Coding and Coded Modulation Techniques
CR
10
0
2 3 4 5 6 7
m
where ρ is the number of nonzero elements in the row of the parity-check matrix.
For detailed derivation of the decoding complexity computation, we refer readers to
[82]. We adopt the expression to analyze the complexity reduction of the proposed
scheme over the conventional NB-LDPC-CM. Hence, the complexity ratio (CR) of
the conventional NB-LDPC-CM over that of the proposed scheme is given as
2ρ2m ðN K Þ m þ 1 2ρ
1
CR ¼
ð9:170Þ
q 2ρ2 ðN K Þ q þ 1 2ρ
m q 1
Figure 9.59 plots the complexity ratio with ρ¼ 24, q ¼ 2, m ¼ 2,3,...,7 and shows
the potential of the ML-NB-LDPC-CM scheme in reducing computation complex-
ity. Notice that we use q ¼ 2 for the ML-NB-LDPC-CM scheme for the purpose of
revealing the potential of complexity reduction, which may not be the optimal
choice in terms of performance, and the selection of q should also take the
performance into account for practical applications.
Figure 9.60 presents the simulated 25-Gbaud 16QAM optical transmission
system in the ASE noise-dominated scenario, based on which we evaluate the
aforementioned three coded-modulation schemes. We have applied identical
coded-modulation scheme to both polarizations. Parameters for the adopted
quasi-cyclic LDPC codes are N ¼ 13,680, K ¼ 11,970, R ¼ 0.875, and girth
8. The simulated optical transmission data rate is 4 2 25 0.875 ¼ 175
Gb/s. For BI-LDPC-CM, we use 25 iterations in binary LDPC decoders based on
9.13 Multidimensional Turbo Equalization 767
-1
10
-2
10
-3
10
-4
10
BER
-5
10
-6
10 BI-LDPC-CM
NB-LDPC-CM
-7 Multi-level NB-LDPC-CM
10
-8
10
6.4 6.6 6.8 7.0 7.2 7.4 7.6 7.8 8.0 8.2
OSNR b [dB/0.1nm] (per information bit)
Fig. 9.60 BER vs. OSNR performance of LDPC-coded PDM-16QAM optical transmission
the sum-product algorithm and perform 3 outer iterations between the demapper
and the decoders as iterative decoding is adopted. For both NB-LDPC-CM and
multilevel NB-LDPC-CM, we use 50 iterations for the nonbinary LDPC decoders
based on MD-FFT-SPA [82]. For NB-LDPC-CM, we use 16-ary LDPC code to
match the constellation size. For multilevel NB-LDPC-CM, we set q ¼ 2 and
employ a couple of identical 4-ary LDPC codes. Figure 9.60 shows the perfor-
mances of LDPC-coded PDM 16QAM optical transmission system in terms of BER
vs. OSNRb. As shown in the Fig. 9.60, the ML-NB-LDPC-CM outperforms BICM-
LDPC-CM by ~0.65 dB while achieving nearly identical performance as the
conventional NB-LDPC-CM. The results have indicated that the ML-NB-LDPC-
CM scheme has reduced the complexity by adopting low-complexity nonbinary
LDPC codes over smaller finite field while keeping the performance unaffected.
residual polarization-dependent loss (PDL), (iii) residual CD, (iv) residual I/Q-
imbalance effects in multilevel-coded modulation schemes, and (v) residual mode-
coupling in FMFs.
m1 previous m2 previous
symbols symbols
…
0…01 s’0…01 Symbol position to be detected
0…03 s’0…03
…
.
. s0…010…0 0…010…0
.
…
0…0100 s’0…010 s0…0120…0 0…0120…0
0…0101 s’0…0101 …
0…0102 s’0…0102 0/2 s0…020…1020 0…020…1020
…
.
. 3/M-1 s0…0 M-1 0 2 0…03 0…0 M-1 20…03
.
…
Fig. 9.61 A portion of trellis to be used in multidimensional BCJR detector with memory
m1 + m2 + 1. The m1 previous symbols and m2 next symbols relative to the observed symbol
define the memory of the detector
For the complete description of the dynamical trellis, the transition PDFs
p(yjjxj) ¼ p(yjjs), s2S are needed, where S is the set of states in the trellis and yj
is the vector of samples (corresponding to the transmitted symbol index xj). The
conditional PDFs can be determined from collected histograms or by using
instanton-Edgeworth expansion method [17]. The number of edges originating in
any of the left-column states is M, and the number of merging edges in arbitrary
terminal state is also M.
assigns x^k to the value x2GF(2m) that maximizes the APP P(xk ¼ x|y) given the
received sequence y as follows:
Lðxk ¼xjyÞ
where L(xk ¼ x|y) is the conditional LLR that the symbol at position k is x, defined
as:
Pðxk ¼ xjyÞ
Lðxk ¼ xjyÞ ¼ log , ð9:172Þ
Pðxk ¼ 0jyÞ
where x is a nonzero element from GF(2m). Clearly, for each position, we need to
calculate 2m 1 conditional LLRs. (Notice that in this formulation L(0|y) is always
zero.) To calculate the P(xk ¼ x|y) needed in either (9.170) or (9.171), we invoke
Bayes’ rule:
X X PðyjxÞPðxÞ
Pðxk jyÞ ¼ PðxjyÞ ¼ , ð9:173Þ
8x:xk ¼x 8x:x ¼x
Pð y Þ
k
where P(y|x) is conditional probability density function (PDF) and P(x) is the a
of input sequence x, which when the symbols are independent
priori probability Y
n
factors as PðxÞ ¼ i¼1
Pðxi Þ, where n is the length of the sequence to be detected.
By substituting (9.173) into (9.172), the conditional LLR can be written as:
2 3
X Yn
6 pðyjxÞ Pðxi Þ7
68x:xk ¼x 7
6
Lðxk ¼ xjyÞ ¼ log6 X
i¼1
7
Yn 7 ð9:174Þ
4 pðyjxÞ Pðx Þ5 i
8x:xk ¼0 i¼1
where the extrinsic information about xk contained in y Lext(xk ¼ x|y) and the a priori
LLR La(xk ¼ x) are defined, respectively, as:
9.13 Multidimensional Turbo Equalization 771
2 X Yn 3
6 pðyjxÞ Pð x i Þ 7
68x:xk ¼x i¼1, i6¼k 7
Lext ðxk ¼ xjyÞ ¼ log6
6 X Yn
7,
7
4 pðyjxÞ Pðx Þ5 ð9:175Þ
i
8x:xk ¼0 i¼1, i6¼k
Pð x k ¼ x Þ
La ðxk ¼ xÞ ¼ log :
Pð x k ¼ 0 Þ
Extrinsic LLRs
…
calculation
D-dim. const.
samples
NB LDPC decoder
Multidimensional
LLRs calculation
pol. diversity Rx
Mode demux +
D-dimensional
BCJR detector
Extrinsic level
GF(2b1)−Level 1
demodulator
From SDM
…
…
…
fiber
NB LDPC decoder
GF(2bm)−Level m
∗
αj ðsÞ ¼ max 0
αj1 ðs0 Þ þ γ j ðs0 ; sÞ , ð9:176Þ
s
βj1 ðs Þ ¼ max∗ βj ðsÞ þ γ j ðs0 ; sÞ ,
0
ð9:177Þ
s
h
i
γ j ðs0 ; sÞ ¼ log p yj jx½j m; j þ m P xj : ð9:178Þ
where δ represents the observed symbol (δ2{0,1,. . .,M 1}\{δ0}) and δ0 is the
reference symbol. The forward and backward metrics are calculated using the
(9.176) and (9.172). The forward and backward recursion steps of multidimensional
BCJR MAP detector for signal constellation size M are illustrated in Figs. 9.63a, b,
respectively. In Fig. 9.63a, s denotes an arbitrary terminal state, which has M edges
originating from corresponding initial states, denoted as s’0, s’1, s’2, . . ., s’M 1.
Notice that the first term in branch metric is calculated only once, before the
detection/decoding takes place, and stored. The second term, log(P(xj)), is
recalculated in every outer iteration. The forward metric of state s in the j-th step
9.13 Multidimensional Turbo Equalization 773
Fig. 9.63 Forward/backward recursion steps for multidimensional BCJR detector of arbitrary
signal constellation size M: (a) the forward recursion step and (b) the backward recursion step
In this section, we provide the propagation simulation study results for nonbinary
LDPC-coded turbo equalization applied to rate-adaptive four-dimensional signal-
ing [116]. The transmitter/receiver structures of the 4-D nonbinary LDPC-coded
modulation (4-D-NB-LDPC-CM) are depicted in Fig. 9.64. As introduced before,
the source signal entering the transmitter is indeed composed of m parallel binary
information streams of length K bits each. These m parallel bit streams are consid-
ered as a single nonbinary stream over an alphabet of Q ¼ 2m symbols. This Q-ary
information stream of length K is encapsulated into a codeword of length N symbols
by a Q-ary LDPC encoder of code rate R ¼ K/N. The mapper maps each Q-ary
codeword symbol to a Q-ary 4-D constellation point s ¼ (Ix, Qx, Iy, Qy)s ¼ (Ix, Qx,
Iy, Qy), where Ix and Qx correspond to the in-phase and quadrature components in
x-polarization, while Iy and Qy correspond to those in y-polarization. Rate
LDPC Encoder
Source Ix Q x
To Fiber
4D Mapper
Nonbinary
m m DFB MZM
PBS PBC
Laser MZM
Iy Qy
(a)
Ix'
LDPC Decoder
From Coherent
PBS Qx' Output
Equalizer
Nonbinary
fiber Detector
BCJR
m
I y'
Local Coherent
PBS Qy'
laser Detector
(b)
adaptation is achieved by using software to configure the mapper which then selects
the proper 4-D modulation format (tuning the number of bits per symbol). The
output of the mapper is used to drive the 4-D modulator, composed of a distributed
feedback (DFB) laser, a polarization beam splitter (PBS), two I/Q modulators, and a
polarization beam combiner (PBC). At the Rx side, the received optical signal is
first split into two polarizations using the PBS, and the resulting signals are fed to
two balanced coherent detectors. Outputs of the coherent detectors are sampled at
the symbol rate to obtain the estimates on the coordinates corresponding to the
transmitted symbols and then passed to the equalizer employing BCJR algorithm.
Compared to the conventional 2-D schemes where each polarization branch is
equipped with a separate BCJR equalizer block, the corresponding 4-D scheme
uses a single BCJR equalizer which handles both polarizations simultaneously, and
hence, it can compensate for the nonlinear cross talk between polarizations,
whereas the conventional 2-D schemes lack such capability. The symbol LLRs at
the output of the BCJR equalizer are finally forwarded to a Q-ary LDPC decoder
matched to the encoder at the transmitter side. The estimates of the m information
sequences sent by the transmitter are then passed to the sink.
The 4-D-NB-LDPC-CM scheme is evaluated in the optical transmission system
depicted in Fig. 9.64 by using VPItransmissionMaker v8.5, for dispersion map
shown in Fig. 9.65 [116], based on the nonlinear propagation model described in
Sect. 2.4.5. Our fiber model takes into account dispersion effects, ASE noise, and
impairments due to nonlinear phase noise, Kerr nonlinearities, and stimulated
Raman scattering. To explore the fundamental limits on the transmission distances
that could be achieved by the 4-D LDPC-coded modulation schemes (both binary
and nonbinary) and compare them against those achievable by its counterpart
polarization-division multiplexing 2-D LDPC-coded modulation schemes, perfect
CD and PMD compensations are assumed. In order to achieve this in our simula-
tions, we perform inline CD compensation via dispersion compensating fibers
(DCFs) and adopt polarization tracking. As shown in Fig. 9.65, each span in the
dispersion map consists of a 40 km-long SMF (dispersion 16 ps/nmkm, dispersion
slope 0.08 ps/nm2km, effective cross-sectional area 80 μm2, attenuation 0.22 dB/
km) and a 7.11 km-long DCF (dispersion 90 ps/nmkm, dispersion slope
0.45 ps/nm2km, effective cross-sectional area 30 μm2, attenuation 0.5 dB/km)
each followed by an Erbium-doped fiber amplifier (EDFA). For both SMF and
DCF, we set nonlinear refractive index as 2.6 1020 m2/W and PMD coefficient
0.1 1012 s/km1/2. We also applied pre-compensation of 320 ps/nm and the
corresponding post-compensation in our transmission link. The optimal launch
Transmitter Receiver
N spans
Fig. 9.65 Dispersion map of the 4-D-LDPC-CM transmission system under test
776 9 Advanced Coding and Coded Modulation Techniques
power of the system is found to be near 5 dBm. The operating wavelength and the
laser linewidth are set to 1552 nm and 100 KHz, respectively. Bandwidths of the
optical and electrical filters are set to 3Rs and 0.75Rs, respectively, where Rs is the
symbol rate which is defined as the information bit rate Ri ¼ 40 Gb/s divided by the
FEC code rate R, which is set to R ¼ 0.8, corresponding to 25% overhead. For
efficient encoding and hardware-friendly decoding, we employ regular and
QC-LDPC codes. The software-configured 4-D signal constellations are of size
16, 32, and 64, denoted as 16-, 32- and 64-4-D, respectively. The 16-4-D constel-
lation is described by the set {1,1,1,1}, which is indeed the set of vertices of
a tesseract (i.e., a regular octachoron). Also, each EDFA in Fig. 9.65 has a noise
figure of 5 dB.
The coherent receiver is composed of an optical filter, two π-hybrids, eight
photodiodes, four electrical filters, and four samplers followed by a BCJR equalizer
and LDPC decoder(s). In Fig. 9.66a, we present first the BER against transmission
distance performances of 4-D block-interleaved LDPC-coded modulation (4-D-BI-
LDPC-CM) and the corresponding PDM 2-D block-interleaved LDPC-coded mod-
ulation (PDM-2-D-BI-LDPC-CM) schemes under the dispersion map given in
Fig. 9.65. Our comparisons are performed against conventional modulation for-
mats, i.e., 16-4-D vs. PDM-QPSK and 64-4-D vs. PDM-8QAM. As shown in
Fig. 9.66a, we achieve more than 8000 km with 16-4-D at 160 Gb/s aggregate bit
rate and 2800 km with 64-4-D at 240 Gb/s aggregate bit rate. The corresponding
PDM-QPSK and 8QAM distances are limited to around 6000 km and 2000 km,
respectively. Similar observation can be obtained from the comparison between
4-D-NB-LDPC-CM and PDM 2-D nonbinary LDPC-coded modulation (PDM-2-D-
NB-LDPC-CM) in Fig. 9.66b. As revealed by both figures, 4-D scheme exhibits
solid advantage over the corresponding PDM-2-D scheme. Specifically, such
advantage is even more significant when nonbinary LDPC-coded modulation is
adopted. To put it numerically, 4-D-NB-LDPC-CM maintains more than 2000 km
additional transmission reach over PDM-2-D-NB-LDPC-CM during transmission
at aggregate bit rates of both 160 Gb/s and 240 Gb/s. Such an improvement in
transmission reach is just a well-grounded justification why 4-D schemes should be
adopted rather than PDM-2-D schemes for long-haul transmission.
In order to further manifest the superiority of 4-D-NB-LDPC-CM over 4-D-BI-
LDPC-CM, we performed comparisons between the two for three different 4-D
modulation formats, i.e., 16-, 32-, and 64-4-D. Our results are presented in
Fig. 9.67. The 4-D-NB-LDPC-CM significantly outperforms 4-D-BI-LDPC-CM
especially as the underlying constellation size, and hence the spectral efficiency,
and hence the aggregate bit rates increase. For example, for transmission at
240 Gb/s, 4-D-NB-LDPC-CM can provide more than 1500 km additional reach
compared to 4-D-BI-LDPC-CM. In addition to improving transmission reach
compared to 4-D-BI-LDPC-CM, 4-D-NB-LDPC-CM can also improve the latency
at the receiving ends since it avoids costly turbo equalization steps which pass
through the inherently complex BCJR equalization block about 3–5 times for
acceptable performance in BI-LDPC-CM schemes.
9.13 Multidimensional Turbo Equalization 777
-1
10
Bit-error rate, BER
-2
10
-3
10
16-4D
-4
64-4D
10 PDM-QPSK
PDM-8QAM
600 km 2300 km
-5
10
2000 4000 6000 8000 10000
Total transmission distance, L [km]
(a)
-1
10
Bit-error rate, BER
-2
10
-3
10
16-4D
64-4D
-4
PDM-QPSK
10
PDM-8QAM
2100 km 2700 km
-5
10
2000 4000 6000 8000 10000
Total transmission distance, L [km]
(b)
Fig. 9.66 BER vs. transmission distance comparisons between (a) 4-D–BI-LDPC-CM and
PDM-2-D-BI-LDPC-CM and (b) 4-D-NB-LDPC-CM and PDM-2-D-NB-LDPC-CM
-1
10
Bit-error rate, BER
-2
10
-3
10 NB-16-4D
BI-16-4D
NB-32-4D
-4
10 BI-32-4D
NB-64-4D
BI-64-4D
-5
10
4000 6000 8000 10000
Total transmission distance, L [km]
Fig. 9.67 BER against transmission distance comparison between 4-D-NB-LDPC-CM and 4-D-
BI-LDPC-CM
Fig. 9.68 Time-domain 4-D-NB-LDPC-CM: (a) transmitter and (b) receiver architecture. P/S
parallel-to-serial; S/P serial-to-parallel
9.13 Multidimensional Turbo Equalization 779
Fig. 9.69 Experimental setup (top figure) and optical spectra (at 0.1 nm RBW): (a) Tx output
WDM signal, (b) Tx output signal in C-band, (c) WDM signal after 7680 km. ECL external cavity
laser, DAC digital-to-analog converter, OTF optical tunable filter, LO local oscillator laser, BPD
balanced photodetector
-1 Uncoded
10 NB-LDPC-CM PDM-QPSK
4D-LDPC-CM 16-4D
-2
10
-3
10
BER
-4
10
-5
10
9 10 11 12 13 14 15 16 17 18 19
OSNR [dB/0.1nm]
Fig. 9.70 BER vs. OSNR performance of time-domain 4-D-LDPC-CM of 16-4-D and NB-
LDPC-CM of PDM-QPSK
10 PDM-QPSK:
Before Equalizer
9 After Equalizer
16-4D:
8 Before Equalizer
After Equalizer
7 LDPC threshold:
Q [dB]
4-ary code
6 16-ary code
3
2880 3840 4800 5760 6720 7680
Distance [km]
Fig. 9.71 Q factor vs. distance performance of time-domain 16-4-D and PDM-QPSK before and
after BCJR equalization
782 9 Advanced Coding and Coded Modulation Techniques
DAC11 DAC12
66 GHz
55 DFB I/Q Pol.
Lasers Mod MUX
Coupler
EDFA DAC8 DAC9
WSS
66 GHz
56 DFB I/Q Pol.
Lasers Mod MUX
(a)
Switch (SW)
Coherent
OTF
Rx
SW
Pol.
GEQ
scrambler Vascade FMF
EX3000 ×5
(b)
Fig. 9.72 System setup: (a) transmitter with six tunable channels, and 111 loading channels, on a
33 GHz grid (b) recirculating loop with 5 101.6-km-long hybrid spans of FMF and Vascade
EX3000
The experimental setup is shown in Fig. 9.72. At the transmitter side, digital-to-
analog converters (DACs) with a sampling rate of 64 GHz are used to generate WDM
channels tuned to a 33 GHz grid. WDM channels are prepared in two groups. The first
group consists of six neighboring channels generated with tunable ECLs. These six
channels are tuned together across the C-band and only the center channel which uses
a narrow-linewidth (<1 kHz) laser is measured. Each of the even and odd subgroups
of the six tunable channels is modulated separately by four independent streams of
data for all in-phase and quadrature (I/Q) rails in both polarizations. The 111 loading
channels are modulated with only independent I/Q rails followed by polarization
multiplexing emulators. The tunable channels and the dummy channels are
784 9 Advanced Coding and Coded Modulation Techniques
combined using a wavelength selective switch (WSS) with a 1-GHz grid resolution
and a coupler. Using the DACs, either a 32 Gbaud, Nyquist-shaped SCM 16QAM, or
a MSCM signal of 32 1 Gbaud 16QAM subcarriers with 10 MHz guard band is
generated per wavelength. The 218–1 PRBS binary data are encoded by 16-ary
irregular quasi-cyclic nonbinary LDPC encoder of girth 10 to generate codewords
at three overheads 14.3, 20, and 25%, to maximize the capacity across C-band. The
codeword length is 13,680 for 14.3 and 20% OHs and 74,985 for 25% OH. Encoder
output is uniformly distributed into 32 subcarriers of MSCM signal.
At the receiver side, the WDM channel under test is filtered and captured with a
standard offline coherent receiver, using a narrow-linewidth (<1 kHz) laser as the
local oscillator and a real-time 80 GSa/s sampling scope. In the case of a SCM
signal, after resampling and chromatic dispersion compensation (CDC), the signal
is fed into a multi-modulus algorithm for initial convergence of polarization
demultiplexing followed by carrier-phase recovery. Subsequently a second stage
of T-spaced equalizer using DD-LMS is applied to the 32 Gbaud SCM signal to
mitigate MPI. In the case of MSCM, after frequency offset estimation and CDC,
each subcarrier is digitally filtered and processed individually in the same way as
the single-carrier signal. The data of all subcarriers is combined and is further
improved by the BCJR equalization and then sent to nonbinary LDPC decoder for
detecting post-FEC bit errors.
The circulating loop test bed is composed of five hybrid spans obtained by
splicing 51.3-km-long FMFs with 50.3-km-long Vascade® EX3000 fiber with
average attenuations of 0.157 dB/km and 0.153 dB/km, respectively. The FMFs
support the LP11 mode albeit with a slightly higher attenuation, and the differential
modal delay is estimated to be 0.95 ns/km with the LP01 lagging. The average
effective areas of the single-mode fiber and the FMF portions are 151 μm2 and an
estimated 200 μm2, respectively. A short piece of Vascade® EX3000 is used as a
bridge fiber between the input end of the FMF and the standard-single-mode fiber
pigtail of the EDFA output. The average span loss is 16.48 dB corresponding to an
additional 0.7 dB incurred by the 4 splices and the two connectors. The mid-band
chromatic dispersion is approximately 21 ps/nm/km. Span loss is compensated by
C-band EDFAs, and the accumulated amplifier gain tilt is compensated by a WSS
each loop.
The Q factor is measured across the C-band at 6600 km for a total of 111 WDM
channels, from 1534.5 to 1563.6 nm. Q factors averaged over 32 carriers, both
polarizations, and over 10 separate measurements are plotted in Fig. 9.73 along
with the received spectrum. The Q factor varies from 4.5 dB to 5.7 dB from the
shorter to the longer wavelengths. To maximize the capacity with such a variation
of Q factor, three different FEC OHs at 14.3, 20, and 25% are used for 28, 64, and
19 WDM channels across the C-band, as shown in Fig. 9.73, resulting in an average
spectral efficiency of 6.5 b/s/Hz. For each channel, more than 25 million bits were
processed for LDPC decoding, and all the channels were decoded error-free in the
LDPC decoder assisted with BCJR equalizer. The coding performance is further
evaluated in the BTB configuration as a function of pre-FEC Q factor derived from
bit-error counting as shown in Fig. 9.74. To achieve sufficient confidence level,
9.13 Multidimensional Turbo Equalization 785
5.8
5.5
Q (dB)
5.2
4.9
4.6
4.3
-30
Power (dB)
-40
-60
1535 1540 1545 1550 1555 1560 1565
Wavelength (nm)
Fig. 9.73 (Top) Q factor vs wavelengths with %14.3 (green), 20% (blue), and 25% (red) FEC OH
after 6600 km. (Bottom) Received spectrum (After Ref. [118]; © IEEE 2015; reprinted with
permission)
10
-9
10
-12
10 14% OH
20% OH
-15
25% OH
10
3.5 3.7 3.9 4.1 4.3 4.5 4.7 4.9 5.1 5.3 5.5
over 100 million bits are considered for each BER point, and exponential fitting is
used for extrapolating the measured BER data and thus estimating the FEC limit as
5.5 dB, 4.9 dB, and 4.35 dB Q factor for 14.3%, 20%, and 25% OH, respectively.
To make direct performance comparisons, we next constructed 3 comparable
loops from either all single-mode fiber, all FMF, or hybrid spans. Four of the hybrid
spans are broken up and respliced to obtain either two spans of all-single-mode fiber
spans or all-FMF spans with almost identical span lengths and losses. For the hybrid
case, three spans are removed from the loop. Figure 9.75 shows the comparison
after 10 and 20 circulations using the same MSCM signals and the same receiver
786 9 Advanced Coding and Coded Modulation Techniques
Q (dB)
reprinted with permission)
5
4060 km
4
All-single-mode-fiber
3 Hybrid
All-few-mode fiber
2
16 17 18 19 20 21 22 23 24 25 26 27
Received OSNR @ 0.1 nm (dB)
DSP with 101-tap long CMA-based filer. Because the FMFs have larger effective
area, the optimum OSNR is larger by about 1 dB compared to the all-SMF case.
However, some of this improvement is lost because the impact of MPI cannot be
removed altogether which is more evident in portions of the curves dominated by
the linear noise, especially when all-FMF spans are used. This is most clear at
4060 km in the low OSNR regime. However, for the hybrid span case, the nonlinear
improvement from the large effective area more than compensates for the penalty
due to residual MPI affording 0.4 dB improvement over the all-single-mode fiber
configuration. For additional details on this experiment, an interested reader is
referred to [118].
where (I,Q) denote in-phase and quadrature coordinates and σ 2s is the variance of the
source. By expressing Cartesian coordinates by using polar coordinates (r,θ) as
9.14 Optimized Signal Constellation Design and Optimized Bit-to-Symbol. . . 787
follows I ¼ rcosθ and Q ¼ rsinθ, it is straightforward to show that radius will follow
Rayleigh distribution, while phase distribution is uniform. This indicates that the
optimum distribution, in mutual information (MI) sense, contains constellation
points placed on circles of radii that follow Rayleigh distribution. The number of
points per circle is nonuniform, wherein the distribution of point on a circle is
uniform. For corresponding algorithm an interested reader is referred to [119, 120],
which is accurate for medium and large signal constellation sizes. Namely, the
approximation used in algorithm described in [119, 120] is not very accurate for
small constellation sizes. This signal constellation has been extended in [122] to
arbitrary signal constellation sizes and to multidimensional signal space
[125]. Since it closely approaches the channel capacity in ASE noise-dominated
scenario, it has been called the optimum signal constellation design (OSCD), which
is optimum in MI sense. Namely, the OSCD algorithm is formulated on such a way
to maximize the MI for ASE noise-dominated scenario, which justifies the name
introduced. The OSCD has been extended in [126, 127] to the phase noise-
dominated channels. The optimum mapping rule design for OSCDs is the subject
of ref. [125]. Finally, in [128] the vector quantization concepts have been used to
large signal constellation design for multidimensional signaling.
Given the space limitations, here we briefly describe the OSCD for
multidimensional signaling, the optimum mapping rule determination, as well as
the EXIT chart analysis [125] of OSCDs. In Sect. 14.3, we describe the nonlinear-
optimized signal constellation design (NL-OSCD), suitable for SPM-dominated
channels. After the initialization stage by signal constellation obtained by sphere-
packing method, we generate the multidimensional training sequences from the
optimum source distribution and split them into the clusters of points according to
the Euclidean distance squared from constellation obtained in previous iteration.
New constellation points are obtained as the center of mass of such obtained
clusters. This procedure is repeated until convergence or until a predetermined
number of iterations has been reached.
As an illustration in Fig. 9.76, we provide the 8-ary and 16-ary 2-D signal
constellations obtained by using the OSCD algorithm for ASE noise-dominated
scenario as well as the optimized mapping rules. Corresponding 3-D constellations
and mapping rules are provided in Fig. 9.78. The 3-D constellations are relevant in
SDM-based applications.
788 9 Advanced Coding and Coded Modulation Techniques
(a)
(b)
Fig. 9.76 The optimum signal constellations and mapping rules for (a) 8-ary and (b) 16-ary 2-D
signal space
9.14 Optimized Signal Constellation Design and Optimized Bit-to-Symbol. . . 789
For the convergence behavior analysis, the EXIT chart analysis should be
performed [101]. In order to determine the MI transfer characteristics of the
demapper, we model the a priori input LLR, LM,a, as a conditional Gaussian random
variable. The MI between c (c denotes the initial bits) and LM,a is determined
numerically as explained in [101]. Similarly, the MI between c and demapper
extrinsic LLR, denoted as LM,e, is also calculated numerically, but with the PDF
of c and LM,e determined from histogram obtained by Monte Carlo simulation. By
observing the MI of demapper extrinsic likelihoods ILM,e as a function of the MI of
the prior LLRs LM,a, denoted as ILM,a, and OSNR, in dB, the demapper EXIT
characteristic (denoted as TM) is given by
I LM, e ¼ T M I LM, a ; OSNR : ð9:182Þ
where we use ILD,e to denote MI of decoder extrinsic likelihoods and ILD,a to denote
the MI of decoder the prior LLRs.
The EXIT chart analysis of optimized mapping, optimized as described in [125]
(and references therein), for 2-D 8-ary OSCD is shown in the Fig. 9.77a. Namely,
the optimization criterion for these mapping rules can be summarized as follows
[125]: find the mapping rule in such a way that every two symbols that differ in only
one bit position have larger distance than the minimum Euclidean distance of the
constellation. The channel OSNR (for symbol rate of 25 GS/s) equals 5.0 dB, and
we use a QC-LDPC (16,935, 13,550) decoder. It is obvious to see that in this case
only 8-ary OSCD constellation can operate with the turbo decoding process. Other
mapping rules, for this OSNR, will result in turbo decoding errors. In Fig. 9.78a, we
can see the tradeoff performance for MI in optimized mapping. The MI at the output
of the demapper increases over iterations when using the optimized mapping. The
corresponding EXIT chart for 8-ary 3-D OSCD is shown in Fig. 9.78b. The
optimized mappings for OSCDs are studied for use in adaptive polarization-
division multiplexed/mode-division multiplexed LDPC-coded modulation schemes
to enable both 400GbE and 1 TbE. The channel symbol rate was set to 31.25 GS/s
and QC-LDPC (16,935, 13,550) code of girth-8, and column-weight 3 was used in
simulations. All results are obtained for 20 LDPC decoder (inner) iterations and
3 APP demapper-LDPC decoder (outer) iterations and summarized in Fig. 9.79.
Clearly, the OSCD constellations outperform QAM constellations in both 16-ary
and 8-ary cases. Also, the optimized mapping rules outperform randomly selected
mapping for OSCDs, and the gap, at BER of 108, is almost 0.5 dB in the 8-ary case
and 0.6 dB in the 16-ary case. Note that we used natural mapping for 8-QAM and
16-QAM constellations.
790 9 Advanced Coding and Coded Modulation Techniques
Z
-0.5
110
-1 101
001 1
-1.5
1.5 0
1 0.5 0 -0.5 -1
-1 -1.5
X
Y
(a)
(b)
1.0
0.6
Channel OSNR=5.0 dB
0.4 8OSCD Optimized mapping
8OSCD Random mapping
8PSK Gray mapping
8PSK Natural mapping
0.2
8QAM Natural mapping
The Decoder characteristic
16935 LDPC Decoder
0.0
0.0 0.2 0.4 0.6 0.8 1.0
a priori input ID,e to demapper
(a)
1.0
channel and extrinsic ourput ID,a of demapper
0.8
0.6
Channel OSNR=3.0 dB
(16935,13550) LDPC decoder
3D-8-Sphere packing
3D-8-OSCD with Random mapping
3D-8-OSCD with Optimal mapping
0.4
0.0 0.2 0.4 0.6 0.8 1.0
a priori input ID,e to demapper
(b)
Fig. 9.78 EXIT chart analysis for (a) 8-ary 2-D OSCD and (b) 8-ary 3-D OSCD. Random
mapping: randomly selected mapping rule
constellation points from previous iteration. Each sample point is assigned to the
cluster with the largest log-likelihood
n
(LL)function, defined o below. Given the
m-th cluster (subset) A^m ¼ yj ¼ yj, I ; yj, Q jj ¼ 0; 1; . . . , find the LL function
of the m-th cluster as follows:
792 9 Advanced Coding and Coded Modulation Techniques
-2
10
-3
10
PDMLDPC-coded QAM:
-4
10 16-QAM
Bit-to-error rate, BER
8-QAM
-5
10 PDMLDPC-coded OSCD:
16-Random mapping
10
-6
16-Optimizedmapping
(by Cost Function)
10
-7 8-Random mapping
8-Optimized mapping
-8
10
-9
10
4 5 6 7 8 9 10
Optical signal to noise ratio, OSNR [dB](perbit)
Fig. 9.79 BER performance for optimal mapping rules of LDPC-coded PDM 2-D-OSCDs. PDM
polarization-division multiplexing
X
n1
LLm ¼ n1 max Lðxk ; yÞ, ð9:184Þ
^
k¼0 y2A m
where Ns denotes the number of nonlinear phase noise samples ΦNL , i, obtained
from channel model described in Sect. 2.4.5.
3. Determine the new signal constellation points as center of mass for each cluster.
Repeat the steps 2–3 until convergence is achieved. Equation (9.185) is written by
having in mind a 2-D signal constellation design, but it can straightforwardly be
generalized for arbitrary dimensionality.
As an illustration, the 16-ary NL-OSCD constellation obtained launch power of
6 dB, and transmission distance of 2000 km is shown in Fig. 9.80. The optimal
launch power (in uncoded BER sense) for 16-ary NL-OSCD is 4 dBm, as shown in
Fig. 9.81a, and the total transmission distance for LDPC-coded 16-NL-OSCD
exceeds 4400 km, as shown in Fig. 9.81b. Figure 9.81a indicates that 16-ary
NL-OSCD has better nonlinear tolerance than 16-QAM. On the other hand,
9.14 Optimized Signal Constellation Design and Optimized Bit-to-Symbol. . . 793
-0.01
-0.02
-0.02 -0.01 0.00 0.01 0.02
In-phase coordinates Ix (Iy)
By using 8-ary OSCD, we have demonstrated in [129] a record to date 714 Gb/s
capacity-per-amplifier (40 Tb/s in aggregated data rate) transoceanic transmission
over 6787 km is demonstrated. The system is based on dual-carrier 400G transmis-
sion with C + L-band EDFA amplification only (at 121 km span length). In this
subsection, we have briefly described this experimental verification.
Figure 9.82 outlines the experimental setup. At the transmitter side, a total of
109 C-band DFB lasers spanning from 1529.88 to 1564.55 nm and 91 L-band lasers
spanning from 1572.40 to 1602.81 nm at 40.2GHz spacing are used and indepen-
dently modulated by the data bar outputs of four 64Gs/s DACs. For the measure-
ment, instead of DFB lasers, eight external cavity lasers (ECLs) are separated into
odd and even channels and are modulated separately by four 64Gs/s digital-to-
analog converters (DAC) driving two I/Q modulators to produce 40
Gbaud Nyquist-shaped NB-LDPC-coded 8-ary OSCD signals. First, a PRBS of
order 218 – 1 was encoded by the 8-ary irregular quasi-cyclic-LDPC (81126, 67605)
encoder of girth 10 to generate codewords at 20% overhead and then mapped into
794 9 Advanced Coding and Coded Modulation Techniques
-1
10
-3
10
Length = 2000 km
QAM
-4
NL-OSCD(4,4000)
10
-8 -6 -4 -2 0 2 4 6
Launch Power (dBm)
(a)
-1
10
-2
10
-3
10
Bit Error Rate
-4
10
-5
10
8-ary OSCD symbols via optimal mapping described above. For additional details
on experimental setup including recirculating loop, an interested reader is referred
to [129].
The offline DSP algorithm digitally compensates for the coarse frequency offset
between the transmitter and LO lasers and then filters out the testing carrier and
resamples the signals back to two samples per symbol. After resampling, either CD
compensation (CDC) is performed in single stage in frequency domain or nonlinear
compensation (NLC) is applied using digital back propagation with one step per
9.14 Optimized Signal Constellation Design and Optimized Bit-to-Symbol. . . 795
DAC3 DAC4
C-band
110 I/Q
Lasers Mod 3 C+L SW
coupler WSS-C
Coherent
DAC1 DAC2 Pol.
PM-EDFA OTF
L-band MUX Rx
WSS-L
92 I/Q
Lasers Mod 4
DAC1 DAC2
SW L C
LSPC
Odd
4 I/Q Pol.
ECLs Mod 1 MUX C or L ×4
DAC3 DAC4 coupler
Even 121.2 km
4 I/Q Pol.
ECLs Mod 2 MUX
GEQ-C C
GEQ-L
L
(b)
Fig. 9.82 (a) Experimental system setup, (b) 8-ary OSCD constellation in back-to-back (BTB)
configuration and received spectrum after 6787 km at 0.1 nm resolution
span [130]. Received signal is then fed into multi-modulus algorithm for initial
convergence of polarization demultiplexing. Due to the nonregular constellation
layout for the 8-ary OSCD, the blind phase searching method [131, 132] is applied
for carrier-phase recovery in the stage of DD-LMS algorithm. The recovered
symbols are then sent to nonbinary LDPC decoder for detecting post-FEC bit
errors. MD-FFT-SPA is employed with 50 iterations or less.
The coding performance of using regular 8-QAM and 8-ary OSCD modulation
formats is compared in the back-to-back (BTB) scenario as a function of pre-FEC Q
factor derived from BER counting. The regular 8-QAM constellations can be found
in [133]. To achieve sufficient confidence level, over 100 million bits are consid-
ered for each BER point, and exponential fitting is used for extrapolating the
measured BER data and thus estimating the FEC limit. As observed in Fig. 9.83,
with the same LDPC codewords transmitted, the FEC limit achieved by using
optimal 8-ary OSCD is 4.05 dB at 20% overhead, whereas 4.6 dB for regular
8-QAM. Conforming to the findings in [48], there is ~0.55 dB improvement
when utilizing optimal nonbinary LDPC-coded-8QAM due to the joint coded
modulation involving bit mapping, coding, and modulation format.
796 9 Advanced Coding and Coded Modulation Techniques
Post-FEC BER
8QAM
-4
10
-6
10
Exp Fit for 8-OSCD
Exp Fit for regular 8QAM
-8
10
3.6 3.8 4 4.2 4.4 4.6
pre-FEC Q [dB]
5
CDC
NLC
4.5
Q-factor [dB]
3.5
“FEC limit” of optimal coded-8QAM
3
1540 1560 1580 1600
Wavelength [nm]
Fig. 9.84 Measured transmission performance for all channels with CDC and NLC after 6780 km.
We use the term “FEC limit” to denote that not any countable error is found in experiment after
LDPC decoder for this particular Q-value
5.5
NLC
5 CDC
3.5
2.5
16 16.5 17 17.5 18 18.5
OSNR/0.1nm [dB]
Fig. 9.85 Measured transmission performance for the channel at 1551.2 nm with CDC and NLC
as a function of received OSNR
The NLC improvement is different for the two bands since C-band is operated
slightly below the optimum channel power, and L-band is operated at a slightly
above the optimum power to avoid excessive Raman interaction between bands and
also to minimize gain tilt at the L-band.
Figure 9.85 shows the Q-value vs. received OSNR at 1551.2 nm as an example,
where CDC only and NLC are compared as the channel power is swept freely. [The
Q factor is obtained from measured BERs.] The lower two figures in Fig. 9.85
depicts the constellation diagrams after CDC and NLC, respectively. These results
show that NLC not only increases system margin but provides additional flexibility
for system design and power budget allocation. In addition, the coded 8-OSCD
could benefit more from the NLC since the coded modulation has lower FEC limit
and the Q-factor improvement from NLC is sufficient to let the Q factor move away
(to the right) from the LDPC waterfall region, thus avoiding bit errors. Further
experiments employing OSCD-based constellations can be found in [134, 135].
798 9 Advanced Coding and Coded Modulation Techniques
Compared to adaptive modulation alone, the additional coding gain can be achieved
by superimposing either trellis codes or coset codes on top of the adaptive modu-
lation scheme. The key idea behind this adaptive coded modulation is to exploit the
separability of coding stage and constellation design inherent to the coset codes.
The instantaneous SNR or OSNR varies with time, which will change the distance
in the received signal constellation d0(t), and, therefore, the corresponding mini-
mum distance between coset sequences ds and the minimum distance between coset
points dc will be time-varying as well. By using adaptive modulation in a tandem
9.15 Adaptive Coding and Adaptive Coded Modulation 799
with the coset codes, we can ensure that distances ds and dc do not vary as channel
conditions changes by adapting the signal constellation size M(SNR), transmit
power P(SNR), and/or symbol rate Rs(SNR) of the transmitted signal constellation
relative to the SNR, subject to an average transmit power P constraint on
SNR-dependent transmit power P(SNR). By minimum distance does not vary as
channel conditions change dmin(t) ¼ min{ds(t), dc(t)} ¼ dmin, the adaptive coded
modulation will exhibit the same coding gain as coded modulation developed for a
Gaussian-like channel with corresponding minimum codeword distance dmin.
Therefore, this adaptive coded modulation scheme requires small changes in
generic coded modulation scheme described in Sect. 11.1, as shown in Fig. 9.86.
Clearly, the coding stage does not change at all. The number of cosets does not
change as well. On the other hand, the number of points within the coset is channel
SNR dependent. When channel condition gets improved, we enlarge the coset size.
On such a way, we transmit more uncoded bits, while not affecting the distance of
the channel code. Additionally, this approach is hardware friendly.
The following approximation for bit error probability for M-ary QAM systems
can be used:
1:5SNR Gc PðSNRÞ
Pb 0:2 exp , M 4, 0 SNR ½dB 30 dB, ð9:186Þ
MðSNRÞ 1 P
where Gc is the coding gain. We adjust the signal constellation size M(SNR)
depending on channel SNR and target BER as follows:
1:5 PðSNRÞ Pð γ Þ
MðSNRÞ ¼ 1 þ SNR Gc ¼ 1 þ Cf SNR Gc , ð9:187Þ
logð5Pb Þ P P
|fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl}
Cf
One point
One point selected out of
Additional selected out of 2[n(SNR)+r] / (N/2)
n(SNR)-k info 2n(SNR)+r possible possible Adaptive two- To
bits Signal point Constellation dimensional channel
selection mapper modulator
from coset M(SNR), P(SNR)
One coset selected Modulation stage
k+r
out of 2 possible
8
1=SNR0 1=SNRc , SNR SNR0 =Cc
PðSNRÞ < |fflfflfflfflffl{zfflfflfflfflffl}
¼ , Cc ¼ Cf Gc ð9:189Þ
P : SNRc
0, SNR < SNR0 =Cc
where SNR0 is signal-to-noise ratio for AWGN channel. After substituting (9.189)
into (9.187), we obtain the following equation for adaptive signal constellation size
ð
1
R SNR
¼ log2 f ðSNRÞdSNR, ð9:191Þ
B SNRc
SNRc
In this scheme, which employs a single NB-LDPC encoder on Tx side and a single
NB-LDPC decoder operating over GF of order matching the signal constellation
size on Rx side, as depicted in Fig. 9.87, the signal constellation size M ¼ 2m and
code-rate R adaptation has been performed such that mR C, where C is the
multidimensional optical channel capacity.
The simulation results for SDM NB irregular QC-LDPC-coded 2-D constella-
tions are summarized in Fig. 9.88, for information symbol rate Rs, info ¼ 25 GS/s
9.15 Adaptive Coding and Adaptive Coded Modulation 801
(a)
Adaptive hybrid D-dim. Dem.
D-
dimen. Adaptive SDM
Adaptive NB
APP D-dim.
LDPC dec. demod. fiber
demap.
Extrinsic
LLRs
(b)
NB-LDPC (34635,27708,0.8):
10
-2 Regular QC-LDPC coded:
16-OSCD
-3 16-QAM
10
8-QAM
Irregular QC-LDPC coded:
Bit-error rate, BER
-4
10 8-OSCD
16-OSCD
-5
10 BI reg. LDPC(34635,27710,0.8):
LDPC-coded 8-QAM
10
-6 LDPC-coded 16-QAM
-7
10
-8
10
-9
10
4.0 4.5 5.0 5.5 6.0 6.5
Optical signal-to-noise ratio, OSNR [dB] (per bit)
-1
10 Rate-0.8 NB-LDPC code:
8-OSCD
-2 16-OSCD
10
32-OSCD
10
-3 16-QAM
Bit-error rate, BER
-7
10
-8
10
-9
10
3.5 4.0 4.5 5.0 5.5 6.0 6.5 7.0 7.5
Optical signal-to-noise ratio, OSNR [dB] (per bit)
Fig. 9.89 BER performance of irregular NB-QC-LDPC-coded 2-D constellations for code rates
ranging from 0.667 to 0.8
rate have been chosen based on the estimate of channel OSNR per bit. Both
conventional QAM and constellations from optimized signal constellation
design (OSCD) have been observed (see chapter on advanced modulation
formats for additional details on OSCD constellations). In Fig. 9.89 fixed irregular
(34635,27708,0.8) code is observed.
LDPC(16935,13550)
α=3, μ=2:
LDPC(100515,80412) 2 4
σ R=10
Channel inversion
2
1
-6
Pb=10 1
0
0 5 10 15 20 25 30 5 10 15 20 25 30
Signal-to-noise ratio, Es/N0 [dB] Signal-to-noise ratio, Es/N0 [dB]
Fig. 9.90 Spectral efficiencies against symbol SNR for hybrid LDPC-coded modulation
efficiency R/B ¼ 4 bits/s/Hz is 7.2 dB in both (weak and strong) turbulence regimes.
Further improvements can be obtained by increasing the girth of LDPC codes and
employing better modulation formats. The increase in codeword length does not
improve spectral efficiency performance that much. It is interesting to notice that by
employing adaptive hybrid coded modulation, the communication under saturation
regime is possible. Moreover, for variable-rate variable-power scheme, there is no
degradation in saturation regime compared to strong turbulence regime. Overall
improvement from adaptive modulation and coding for spectral efficiency of 4 bits/
s/Hz at Pb ¼ 106 over nonadaptive uncoded modulation ranges from 10.5 dB
(3.3 dB from adaptive modulation and 7.2 dB from coding) in the weak turbulence
regime to 38.9 dB in the strong turbulence regime (31.7 dB from adaptive modu-
lation and 7.2 dB from coding). For additional details on this approach, an inter-
ested reader is referred to [2, 137].
This chapter has been devoted to advanced channel coding and coded modulation
techniques. After linear block code fundamentals described in Sect. 1, BCH code
fundamentals have been described in Sect. 2, including Massey-Berlekamp algo-
rithm. The trellis description of linear block codes and the corresponding Viterbi
804 9 Advanced Coding and Coded Modulation Techniques
References
25. Moision B, Hamkins J (2003) Deep space optical communications downlink budget: modu-
lation and coding, Interplanetary network progress report, vol 42–154. Jet Propulsion Labo-
ratory, Pasadena, CA, pp 1–28, Apr–Jun 2003
26. Available at: http://ipnpr.jpl.nasa.gov/progress_report/42-154/154K.pdf
27. Moision B, Hamkins J (2005) Coded modulation for the deep space optical channel: serially
concatenated pulse-position modulation, Interplanetary network progress report, 42-161. Jet
Propulsion Laboratory, Pasadena, CA, pp 1–25, 15 May 2005. Available at: http://ipnpr.jpl.
nasa.gov/progress_report/42-161/161T.pdf
28. Ryan WE (2003) Concatenated convolutional codes and iterative decoding. In: Proakis JG
(ed) Wiley encyclopedia in telecommunications. John Wiley and Sons, Hoboken
29. Pyndiah RM (1998) Near optimum decoding of product codes. IEEE Trans Commun
46:1003–1010
30. Sab OA, Lemarie V (2001) Block turbo code performances for long-haul DWDM optical
transmission systems. In: Proceedings OFC 2001, Paper ThS5
31. Gallager RG (1963) Low density parity check codes. MIT Press, Cambridge
32. MacKay DJC (1999) Good error correcting codes based on very sparse matrices. IEEE Trans
Inf Theory 45:399–431
33. Richardson T, Urbanke R (2008) Modern coding theory. Cambridge University Press,
Cambridge
34. Vasic B, Djordjevic IB, Kostuk R (2003) Low-density parity check codes and iterative
decoding for long haul optical communication systems. J Lightwave Technol 21(2):438–446
35. Li Z-W, Chen L, Zeng L-Q, Lin S, Fong W (2006) Efficient encoding of quasi-cyclic
low-density parity-check codes. IEEE Trans Commun 54(1):71–81
36. Ryan WE (2004) An introduction to LDPC codes. In: Vasic B (ed) CRC handbook for coding
and signal processing for recording systems. CRC Press, Boca Raton, FL
37. Ryan WE, Lin S (2009) Channel codes: classical and modern. Cambridge University Press,
New York
38. Kschischang FR, Frey BJ, Loeliger H-A (2001) Factor graphs and the sum-product algorithm.
IEEE Trans Inf Theory 47:498–519
39. Chen J, Dholakia A, Eleftheriou E, Fossorier M, Hu X-Y (2005) Reduced-complexity
decoding of LDPC codes. IEEE Trans Commun 53:1288–1299
40. Lan L, Zeng L, Tai YY, Chen L, Lin S, Abdel-Ghaffar K (2007) Construction of quasi-cyclic
LDPC codes for AWGN and binary erasure channels: a finite field approach. IEEE Trans. Inf.
Theory 53:2429–2458
41. Fan JL (2000) Array-codes as low-density parity-check codes, Second international sympo-
sium on turbo codes, Brest, France, pp 543–546
42. Kudekar S, Richardson TJ, Urbanke RL (2011) Threshold saturation via spatial coupling:
why convolutional LDPC ensembles perform so well over the BEC. IEEE Trans. Inf Theory
57(2):803–834
43. Lentmaier M, Fettweis G, Zigangirov KS, Costello D (2009) Approaching capacity with
asymptotically regular LDPC codes. In: Proceedings of information theory and applications
2009, San Diego, USA, pp 173–177
44. Sugihara K et al (2013) A spatially-coupled type LDPC code with an NCG of 12 dB for
optical transmission beyond 100 Gb/s. In: Proceedings OFC/NFOEC 2013, Paper OM2B.4
45. Chang D et al (2012) LDPC convolutional codes using layered decoding algorithm for high
speed coherent optical transmission. In: Proceedings OFC/NFOEC 2012, Paper OW1H.4
46. Zhang Y, Djordjevic IB (2014) Staircase rate-adaptive LDPC-coded modulation for high-
speed intelligent optical transmission. In: Proceedings OFC/NFOEC 2014, Paper M3A.6
47. Felstr€om AJ, Zigangirov KS (1999) Time-varying periodic convolutional codes with
low-density parity-check matrix. IEEE Trans. Inf Theory 45(6):2181–2191
48. Djordjevic IB (2013) On the irregular nonbinary QC-LDPC-coded hybrid multidimensional
OSCD-modulation enabling beyond 100 Tb/s optical transport. J Lightwave Technol 31
(16):2969–2975
References 807
49. Arabaci M, Djordjevic IB, Xu L, Wang T (2012) Nonbinary LDPC-coded modulation for
rate-adaptive optical fiber communication without bandwidth expansion. IEEE Photon
Technol Lett 23(18):1280–1282
50. Arabaci M, Djordjevic IB, Xu L, Wang T (2012) Hybrid LDPC-coded modulation schemes
for optical communication systems. In: Proceedings of CLEO 2012, Paper CTh3C.3
51. Arabaci M, Djordjevic IB, Saunders R, Marcoccia RM (2009) High-rate non-binary regular
quasi-cyclic LDPC codes for optical communications. J Lightwave Technol 27
(23):5261–5267
52. Elias P (1954) Error-free coding. IRE Trans Inf Theory IT-4:29–37
53. Zhao Y, Qi J, Hauske FN, Xie C, Pflueger D, Bauch G (2012) Beyond 100G optical channel
noise modeling for optimized soft-decision FEC performance. In: Proceedings of
OFC/NFOEC 2012 Paper OW1H.3
54. Vacondio F et al (2011) Experimental characterization of Gaussian-distributed nonlinear
distortions. In: Proceedings of ECOC 2011, Paper We.7.B.1
55. Chang F, Onohara K, Mizuochi T (2010) Forward error correction for 100 G transport
networks. IEEE Commun Mag 48(3):S48–S55
56. Miyata Y, Sugihara K, Matsumoto W, Onohara K, Sugihara T, Kubo K, Yoshida H, Mizuochi
T (2010) A triple-concatenated FEC using soft-decision decoding for 100 Gb/s optical
transmission. In: Proceedings of OFC/NFOEC 2010, Paper OThL3
57. Mizuochi T et al (2009) Experimental demonstration of concatenated LDPC and RS code by
FPGAs emulation. IEEE Photon Technol Lett 21(18):1302–1304
58. Zhang Z et al (2008) Lowering LDPC error floors by postprocessing. In: Proceedings of IEEE
GLOBECOM, 2008
59. Byers GJ, Takawira F (2004) Fourier transform decoding of non-binary LDPC codes. In:
Proceedings Southern African Telecommunication Networks and Applications Conference
(SATNAC), Sept 2004
60. Davey M, MacKay DJC (1998) Low-density parity check codes over GF(q). IEEE Comm.
Lett. 2(6):165–167
61. Barnault L, Declercq D (2003) Fast decoding algorithm for LDPC over GF(2q). In: Pro-
ceedings of ITW2003, pp 70–73
62. Spagnol C, Marnane W, Popovici E (2007) FPGA implementations of LDPC over GF
(2m) Decoders, IEEE Workshop on signal processing system Shanghai, China, 2007, pp
273–278
63. Declercq D, Fossorier M (2007) Decoding algorithms for nonbinary LDPC codes over GF(q).
IEEE Trans. Comm. 55(4):633–643
64. Savin V (2008) Min-max decoding for non-binary LDPC codes. In: Proceedings of ISIT
2008, Toronto, ON, Canada, pp 960–964, 6–11 July 2008
65. Voicila A, Verdier F, Declercq D, Fossorier M, Urard P (2007) Architecture of a
low-complexity non-binary LDPC decoder for high order fields. In: Proceedings of ISIT
2007, pp 1201–1206
66. Zou D, Djordjevic IB (2015) FPGA implementation of concatenated non-binary QC-LDPC
codes for high-speed optical transport. Opt Express 23(10):14501–14509
67. Zou D, Djordjevic IB (2016) FPGA implementation of advanced FEC schemes for intelligent
aggregation networks. In: Proceedings of PhotonicsWest 2016, OPTO, Optical metro net-
works and short-haul systems VIII, SPIE, vol 9773, San Francisco, California United States.
(Invited Paper), pp 977309-1–977309-7, 13–18 Feb 2016
68. Djordjevic IB, Sankaranarayanan S, Vasic B (2004) Projective plane iteratively decodable
block codes for WDM high-speed long-haul transmission systems. IEEE/OSA J Lightwave
Technol 22:695–702
69. Djordjevic IB, Vasic B (2004) Performance of affine geometry low-density parity-check
codes in long-haul optical communications. Eur Trans Telecommun 15:477–483
70. Djordjevic IB, Vasic B (2003) Projective geometry low-density parity-check codes for ultra-
long haul WDM high-speed transmission. IEEE Photon Technol Lett 15:784–786
808 9 Advanced Coding and Coded Modulation Techniques
71. Djordjevic IB, Sankaranarayanan S, Vasic B (2004) Irregular low-density parity-check codes
for long haul optical communications. IEEE Photon Technol Lett 16:338–340
72. Djordjevic IB, Milenkovic O, Vasic B (2005) Generalized low-density parity-check codes for
optical communication systems. J. Lightwave Technol 23(5):1939–1946
73. Djordjevic IB, Xu L, Wang T, Cvijetic M (2008) GLDPC codes with reed-Muller component
codes suitable for optical communications. IEEE Commun Lett 12(9):684–686
74. Djordjevic IB, Wang T (2014) Multiple component codes based generalized LDPC codes for
high-speed optical transport. Opt Express 22(14):16694–16705
75. Zou D, Djordjevic IB (2016) An FPGA design of generalized Low-density parity-check
codes for rate-adaptive optical transport networks. In: Proceedings of SPIE PhotonicsWest
2016, Optical metro networks and short-haul systems VIII, SPIE, vol 9773, San Francisco,
California United States, pp 97730M-1–97730M-6, 13–18 Feb 2016
76. Boutros J, Pothier O, Zemor G (1999) Generalized low density (Tanner) codes. In: Pro-
ceedings of IEEE International Conference on Communication (ICC’99), pp 441–445
77. Lentmaier M, Zigangirov KS (1999) On generalized low-density parity-check codes based on
hamming component codes. IEEE Commun Lett 3(8):248–250
78. Zyablov VA, Johannesson R, Loncar M (2009) Low-complexity error correction of
hamming-code-based LDPC codes. Probl Inf Transm 45(2):95–109
79. Andersen I (1990) Combinatorial designs: construction methods. In: Mathematics and its
applications. Ellis Horwood, Chichester
80. Huang M-F, Tanaka A, Ip E, Huang Y-K, Qian D, Zhang Y, Zhang S, Ji PN, Djordjevic IB,
Wang T, Aono Y, Murakami S, Tajima T, Xia TJ, Wellbrock GA (2014) Terabit/s Nyquist
superchannels in high capacity fiber field trials using DP-16QAM and DP-8QAM modulation
formats. J Lightwave Technol 32(4):776–782
81. Gho G-H, Kahn JM (2012) Rate-adaptive modulation and low-density parity-check coding
for optical fiber transmission systems. J Opt Commun Netw 4(10):760–768
82. Arabaci M, Djordjevic IB, Saunders R, Marcoccia RM (2010) Polarization-multiplexed rate-
adaptive non-binary-LDPC-coded multilevel modulation with coherent detection for optical
transport networks. Opt Express 18(3):1820–1832
83. Beygi L, Agrell E, Johannisson P, Karlsson M (2010) A novel multilevel coded modulation
scheme for fiber optical channel with nonlinear phase noise. In: Proceedings of IEEE
GLOBECOM
84. Massey JL (1974) Coding and modulation in digital communications. In: Proceedings of
international Zurich seminar on digital communications, Zurich, Switzerland, pp E2(1)–E2
(4)
85. Imai H, Hirakawa S (1977) A new multilevel coding method using error correcting codes.
IEEE Trans Inf Theory IT-23(3):371–377
86. Wachsmann U, Fischer RFH, Huber JB (1999) Multilevel codes: theoretical concepts and
practical design rules. IEEE Trans Inf Theory 45(5):1361–1391
87. Narayanan KR, Li J (2000) Bandwidth efficient low density parity check codes using
multilevel coding and iterative multistage decoding. In: Proceedings of the 2nd symposium
turbo codes and related topics, Brest, France, pp 165–168
88. Benedetto S, Divsalar D, Montorsi G, Pollara H (1996) Parallel concatenated trellis coded
modulation. In: Proceedings of IEEE international conference on communications, Dallas,
TX, pp 974–978
89. Caire G, Taricco G, Biglieri E (1998) Bit-interleaved coded modulation. IEEE Trans Inf
Theory 44(3):927–946
90. Tan J, Stüber GL (2005) Analysis and design of symbol mappers for iteratively decoded
BICM. IEEE Trans Wirel Commun 4(2):662–672
91. Hou J, Siegel PH, Milstein LB, Pfitser HD (2003) Capacity-approaching bandwidth-efficient
coded modulation schemes based on low-density parity-check codes. IEEE Trans Inf Theory
49(9):2141–2155
References 809
92. Beygi L et al (2014) Coded modulation for fiber-optic networks. IEEE Signal Process Mag 31
(2):93–103
93. Ungerboeck G (1982) Channel coding with multilevel/phase signals. IEEE Trans Inf Theory
IT-28:55–67
94. Forney GD, Gallager RG, Lang GR, Longstaff FM, Qureshi SU (1984) Efficient modulation
for band-limited channels. IEEE J Sel Areas Commun SAC-2(5):632–647
95. Forney GD (1988) Coset codes-part I: introduction and geometrical classification. IEEE
Trans Inf Theory 34(5):1123–1151
96. Goldsmith A (2005) Wireless communications. Cambridge University Press, Cambridge
97. Calderbank AR, Sloane NJA (1987) New trellis codes based on lattices and cosets. IEEE
Trans Inf Theory IT-33:177–195
98. Forney GD (1992) Trellis shaping. IEEE Trans. Inf. Theory 38(2):281–300
99. Djordjevic IB, Vasic B (2006) Multilevel coding in M-ary DPSK/differential QAM high-
speed optical transmission with direct detection. IEEE/OSA J. Lightwave Technol. 24
(1):420–428
100. Hou J, Siegel PH, Milstein LB, Pfitser HD (2003) Capacity approaching bandwidth-efficient
coded modulation schemes based on low-density parity-check codes. IEEE Trans Inf Theory
49(9):2141–2155
101. ten Brink S (2000) Designing iterative decoding schemes with the extrinsic information
transfer chart. Int J Electron Commun 54:389–398
102. Hou J, Siegel PH, Milstein LB (2005) Design of multi-input multi-output systems based on
low-density parity-check codes. IEEE Trans Commun 53:601–611
103. Djordjevic IB, Cvijetic M, Xu L, Wang T (2007) Using LDPC-coded modulation and
coherent detection for ultra high-speed optical transmission. IEEE/OSA J Lightwave Technol
25:3619–3625
104. Le Goff S, Glavieux A, Berrou C (1994) Turbo-codes and high-spectral efficiency modula-
tion. In: Proceedings of the 1994 I.E. international conference on communications (ICC’94,
New Orleans, Louisiana), pp 645–649
105. Robertson P, W€orz T (1995) Coded modulation scheme employing turbo codes. Electron Lett
31:1546–1547
106. Robertson P, W€ orz T (1998) Bandwidth-efficient turbo trellis-coded modulation using
punctured component codes. IEEE J Sel Areas Commun 16(2):206–218
107. Djordjevic IB, Vasic B (2006) Nonlinear BCJR equalizer for suppression of Intrachannel
nonlinearities in 40 Gb/S optical communications systems. Opt Express 14:4625–4635
108. Djordjevic IB, Minkov LL, Xu L, Wang T (2009) Suppression of fiber nonlinearities and
PMD in coded-modulation schemes with coherent detection by using turbo equalization.
IEEE/OSA J Opt Commun Netw 1(6):555–564
109. Koetter R, Singer AC, Tüchler M (2004) Turbo equalization. IEEE Signal Process Mag 21
(1):67–80
110. Duan C et al (2012) A low-complexity sliding-window turbo equalizer for nonlinearity
compensation. In: Proceedings of OFC 2012, paper JW2A.59
111. Fujimori T et al (2013) A study on the effectiveness of turbo equalization with FEC for
nonlinearity compensation in coherent WDM transmissions. In: Proceedings of OECC/PS
2013, Paper OM2B
112. Douillard C, Jézéquel M, Berrou C, Picart A, Didier P, Glavieux A (1995) Iterative correction
of intersymbol interference: turbo equalization. Eur Trans Telecommun 6:507–511
113. Ip E, Kahn JM (2008) Compensation of dispersion and nonlinear impairments using digital
backpropagation. J Lightwave Technol 26(20):3416–3425
114. Ip E, Kahn JM (2009) Nonlinear impairment compensation using backpropagation. In:
Lethien C (ed) Optical fibre, new developments, In-Tech, Vienna Austria, December 2009
(Invited Chapter)
115. Zhang Y, Zhang S, Djordjevic IB (2013) On the pragmatic turbo equalizer for optical
communications. In: Proceedings of CLEO-PR&OECC/PS 2013, Paper ThR2–4
810 9 Advanced Coding and Coded Modulation Techniques
Abstract The subject of this chapter is devoted to spread spectrum (SS), CDMA,
and ultra-wideband (UWB) communication systems. After the introduction of SS
systems, both direct sequence-spread spectrum (DS-SS) and frequency hopping-
spread spectrum (FH-SS) systems are described in detail. Regarding the DS-SS
systems, after typical transmitter and receiver configurations are described, we
describe in detail the synchronization process including acquisition and tracking
stages. To deal with the multipath fading effects, the use of RAKE receiver is
described. The section on DS-SS systems concludes with the spreading sequences
description, in particular pseudo-noise (PN) sequences. In this section, after the
introduction of the basic randomness criteria, we introduce maximal-length
sequences (m-sequences) and describe their basic properties. In the same section,
the concept of nonlinear PN sequences is introduced as well. Regarding the FH-SS
systems, both slow-frequency hopping (SFH) and fast-frequency hopping (FFH)
systems are introduced. We provide the detailed description of FH-SS systems,
including both transmitter and demodulator as well as various time acquisition
schemes. In the same section, we describe how to generate the FH sequences. After
the introduction of CDMA systems, we describe various signature waveforms
suitable for use in DS-CDMA systems including Gold, Kasami, and Walsh
sequences. We then describe relevant synchronous and asynchronous CMDA
models, with special attention devoted to discrete-time CDMA models. In section
on multiuser detection (MUD), we describe how to deal with interference intro-
duced by various CDMA users. The conventional single-user detector is used as the
reference case. The various MUD schemes are described then, with special atten-
tion being paid to the jointly optimum MUD. The complexity of jointly optimum
MUD might be prohibitively high for certain applications, and for such applica-
tions, we provide the description of the decorrelating receiver, which can compen-
sate for multiuser interference, but enhances the noise effect. To solve for this
problem, the linear minimum mean-square error (MMSE) receiver is introduced.
The section on MUD concludes with a description of the nonlinear MUD schemes
employing decisions on bits from other users (be preliminary or final), with
description of successive cancelation and multistage detection schemes. In section
on optical CDMA (OCDMA), we describe both incoherent and coherent optical
detection-based OCDMA schemes. Regarding the incoherent optical detection-
based schemes, we first describe how to design various unipolar signature
sequences, known as optical orthogonal codes (OOC), followed by the description
The main issues in digital communications are related to the efficient use of the
bandwidth and power. However, in certain situations, in a very hostile environment,
in the presence of eavesdroppers and jammers, we may want to scarify these
efficiencies in order to enable secure and reliable transmission. One way to achieve
this goal is through the spread spectrum communications [1–7]. Signals belonging
to the spread spectrum class must simultaneously satisfy the following spreading
and despreading criteria. The generic spread spectrum digital communication
system is illustrated in Fig. 10.1. The spreading criterion indicates that
information-bearing signal is spread in frequency domain, on a transmitter side,
as shown in Fig. 10.1, with the help of the spreading signal so that the resulted
Information-bearing Estimated
Channel Channel
Modulator Channel Demodulator
sequence encoder decoder sequence
Spreading
Spreading
sequence
sequence
Fig. 10.1 The generic spread spectrum digital communication system. The spreading sequences
on transmitter and receiver sides are synchronized
10.1 Spread Spectrum Systems 815
signal spectrum is much larger than the bandwidth of the original information-
bearing signal. On the other hand, the despreading criterion indicates that the
recovery of information-bearing signal from noisy spread spectrum received signal
is achieved by correlating the received signal with the synchronized replica of the
spreading signal, as illustrated in Fig. 10.1. The channel encoder and decoder, the
basic ingredients of a digital communication system, are shown as well. If there is
no any interference/jammer present, an exact copy (replica) of the original signal
can be recovered on the receiver side, and the spread spectrum system performance
is transparent to the spreading-despreading process.
In the presence of the narrowband interference signal, introduced during trans-
mission, during the despreading process, the bandwidth of the interference signal
will be increased by the receiver side spreading signal. Since the filter that follows
despreading matches the information-bearing signal, the interfering spread signal
will be significantly filtered, and the output signal-to-interference ratio (SIR), often
called signal-to-noise ratio (SNR), will be improved. This improvement in SIR due
to spread spectrum processing is commonly referred to as the processing gain
(PG) and will be formally introduced below.
X
N
sm ðt Þ ¼ smn ϕn ; m ¼ 1, 2, , M; 0 t < T, ð10:1Þ
n¼1
where
ðT
smn ¼ sm ðtÞϕn ðtÞdt: ð10:2Þ
0
816 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
ðT
1, n ¼ k
ϕn ðtÞϕk ðtÞdt ¼ δnk ¼ : ð10:3Þ
0, n 6¼ k
0
We also assume that all signaling waveforms have the same energy Es, in other
words:
ðT X
N
s2m ðtÞ dt ¼ s2mn ≜Es , ð10:4Þ
n¼1
0
where we use the notation 〈•〉 to denote the ensemble averaging. To better hide the
signaling waveform into N-dimensional space, we chose to select the coefficients of
expansion smn independently so that they have zero mean and the correlation given
by [6]:
Es
hsmn smk i ¼ δnk : ð10:5Þ
N
X
N
J ðtÞ ¼ J n ϕn , 0 t < T, ð10:6Þ
n¼1
ðT X
N
J 2 ðtÞdt ¼ J 2n ≜EJ : ð10:7Þ
n¼1
0
When the jamming signal is additive to transmitted signal and by ignoring the
noise, the received signal is given by:
X
N
r ðtÞ ¼ sm ðtÞ þ J ðtÞ ¼ ðsmn þ J n Þϕn ; m ¼ 1, 2, , M; 0 t < T: ð10:8Þ
n¼1
The output of the m-th branch of correlator receiver can be determined as:
ðT ðT X
N
r m ¼ r ðtÞsm ðtÞdt ¼ ½sm ðtÞ þ J ðtÞsm ðtÞdt ¼ s2mn þ smn J n : ð10:9Þ
n¼1
0 0
10.1 Spread Spectrum Systems 817
while the mean value of rm, assuming equal probable transmission, will be:
¼ Es EJ =N: ð10:11Þ
where PG is the processing gain, also known as the spreading factor. By assuming
that M ¼ D, we can express the PG as follows:
N 2BSS T BSS
PG ¼ ffi ¼ , ð10:14Þ
D 2BD T BD
Tc, which is much shorter than the symbol duration Ts. The bits in spreading code
are commonly referred to as chips, while the duration of the bit in spreading code Tc
is known as the chip time. Finally, the rate 1/Tc is called the chip rate. The
bandwidth of spreading signal, denoted as Bc, is approximately 1/Tc, so that the
processing gain can be estimated as PG ffi BSS/BD ffi (1/Tc)/(1/Ts) ¼ Ts/Tc. The
multiplication of s(t) and sc(t) in time domain, namely, s(t)sc(t), can be represented
as the convolution in frequency-domain S( f )*Sc( f ), where S( f ) is the Fourier
transform (FT) of s(t), while Sc( f ) is the FT of sc(t). The corresponding bandwidth
of the resulting signal is approximately equal to Bc + BD. In the presence of additive
white Gaussian noise (AWGN) process z(t), the received SS signal is given by r
(t) ¼ s(t)sc(t) + z(t). After despreading, the resulting signal becomes:
0
sc ðtÞr ðtÞ ¼ sðtÞ s2c ðtÞ þ sc ðtÞzðtÞ ¼ sðtÞ þ z ðtÞ: ð10:15Þ
|ffl{zffl} |fflfflfflffl{zfflfflfflffl}
¼1 z0 ðtÞ
Since z0 (t) still has the white Gaussian statistics, the despreading does not have an
effect on the signal transmitted over AWGN. When the jamming (interference)
signal is wideband, it can be approximated by an equivalent AWGN process, and
the end effect will be reduction of overall SNR. On the other hand, when the
jamming signal is narrowband, in frequency domain after despreading, it can be
represented as Sc( f )*J( f ), where J( f ) ¼ FT{J(t)}. Therefore, the power of the
jamming signal gets distributed over SS bandwidth, and the corresponding jamming
signal power after the matched filter is approximately BSS/BD ffi PG times lower.
This indicates that SS approach is effective in dealing with narrowband interfer-
ence. We will now show that SS approach is also effective in dealing with multipath
fading-induced intersymbol interference (ISI). For simplicity, let us observe the
two-ray multipath model, introduced in Chap. 2, whose impulse response is given
by h(t) ¼ aδ(t) + bδ(t τ), where the first component corresponds to the line of sight
(LOS) component, while the second component is the reflected component, which
arrives at the receiver side with delay τ. The corresponding frequency response is
given by H( f ) ¼ a + b exp(j2πfτ). The received signal, in the absence of noise,
after two-ray multipath channel can be represented in frequency domain as [Sc( f )
*S( f )]H( f ). The corresponding time-domain representation is given by asc(t)s
(t) + bsc(t–τ)s(t–τ). After despreading we can write as(t) + b sc(t)sc(t–τ)s(t–τ).
Since the reflected component is asynchronous with respect to the spreading signal,
it will not be despread, and the power of the reflected component after the matched
filter will be reduced approximately PG times. This indicates that DS-SS systems
are effective in dealing with multipath fading-induced ISI.
In FH-SS, we occupy a large bandwidth by randomly hopping input data-
modulated carrier form one frequency to another. Therefore, the spectrum is spread
sequentially rather than instantaneously. The term sequentially is used to denote
that frequency hops are arranged in pseudorandomly ordered code sequence sc(t).
The chip time Tc dictates the time elapsed between frequency hops. The FH-SS is
suitable to be combined with M-ary frequency-shift keying (MFSK). When
10.1 Spread Spectrum Systems 819
N different carrier frequencies are used in FH-SS systems, the bandwidth occupied
is given by NBD, where BD is the bandwidth of original information-bearing signal,
as before. The FH-SS systems are attractive for defense/military applications.
Depending on the rate at which frequency hops occur, we can classify the FH-SS
systems into two broad categories:
• The slow-frequency hopping (SFH), in which the symbol rate of MFSK Rs ¼ 1/
Ts is an integer multiple of the hop rate Rc ¼ 1/Tc. In other words, several
symbols are transmitted with the same carrier frequency (for each frequency
hop).
• The fast-frequency hopping (FFH), in which the hop rate Rc is an integer
multiple of the MFSK symbol rate Rs. In other words, the carrier frequency
gets changed several times during the transmission of the same symbol. Clearly,
in multipath fading environment, FFH scheme provides inherent frequency
diversity.
In the presence of AWGN, the FH does not have influence on AWGN perfor-
mance. Let as consider the narrowband interference at carrier frequency fn of
bandwidth B ¼ BD. When the FH frequency coincides with the interference carrier,
the particular symbol transmitted will be affected by the interference. However, this
occurs 1/N fraction of time. The power of interference is effectively reduced
approximately 1/N times. However, compared to DS-SS systems, where the
power of narrowband interference is reduced all the time, the FH-SS systems are
affected by the full power of the jammer a fraction of the time. In FFH systems, the
interference affects the portion of the symbol only, and this problem can be solved
by coding, to correct for occasional errors. On the other hand, in SFH systems,
many symbols are affected by the interference, so that the coding with interleaving
is required to solve for this problem.
Regarding the influence of multipath fading-induced ISI, for two-ray channel, on
FH-SS systems, whenever τ > Tc, the reflected component will exhibit a different
carrier frequency than LOS component and will not affect the detection of LOS
component. However, when τ < Tc, the FFH system will exhibit the flat fading,
while the SFH system will exhibit either slowly varying flat fading for interference
bandwidth B < 1/τ or slowly varying frequency-selective fading for B > 1/τ.
As we discussed in the previous section, in DS-SS systems, the modulated signal s(t)
is multiplied by a wideband spreading signal sc(t), very often derived from pseudo-
noise (PN) sequences [1–6], which possess noise-like properties including (i) the
mean value is approximately zero and (ii) the autocorrelation function is approx-
imately δ-function. Additional details on PN sequences will be provided later in this
section. More generally, DS refers to the specific way to generate SS signals
satisfying the following three conditions [5]:
820 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
(i) The chip waveform of duration Tc, denoted as PTc, is chosen such that:
ð
1
X
N
sc ðtÞ ¼ Ac ð2bi 1ÞpT c ½t ðn 1ÞT c , ð10:17Þ
n¼1
However, there exist significant spectral components outside the spectral null 1/Tc.
When someone is concerned with spectral efficiency, in particular for CDMA
systems, the following waveform can be used for the chip waveform [5]:
To implement DS-SS system, we can start from either spreading sequence gener-
ator or spreading signal generator. The DS-SS modulator for QPSK, based on PN
sequence generator, is shown in Fig. 10.2a.
The spreading sequence generators used for in-phase and quadrature channels
are typically identical and generate sequence b ¼ (b1b2. . .bN). The block channel
encoder (n, k) generates the codeword c ¼ (c1c2. . .cn). The sequence after mod-2
adder can be obtained by bi ci. The in-phase component before product modulator
can be represented as:
Mod-2
Binary adder Polar
spreading NRZ
sequence encoder
cosωct
Data Adder DS-SS QPSK
Channel Wireless
Oscillator channel
sequence encoder signal
−π/2
(a)
Spreading
signal
generator
Polar
NRZ cosωct
Data encoder Adder
Channel Wireless
Oscillator channel
sequence encoder
Polar
NRZ −π/2
encoder
Spreading sinωct
signal
generator
(b)
Fig. 10.2 DS-SS QPSK signal generation based on (a) binary spreading sequence generator and
(b) spreading signal generator
Similar equation holds for the quadrature channel. After product modulation, the
in-phase and quadrature SS signals are added together and transmitted toward a
remote destination by a transmit antenna. The spreading signal generator-based
configuration of DD-SS QPSK modulator is shown in Fig. 10.2b. The spreading
signal generator generates the signal according to Eq. (10.17). The mod-2 adder
version is easier to implement instead of waveform multiplication.
On the receiver side, we can also employ either spreading sequence generator or
spreading signal generator to perform despreading. Additionally, either matched
filter receiver or correlation receiver configurations can be used. To facilitate
explanations, only in-phase demodulator structures are summarized in Fig. 10.3.
The quadrature demodulator structure is very similar to what is shown in Fig. 10.3.
The received in-phase equivalent low-pass signal can be represented by:
where z(t) originates from the jamming signal and/or Gaussian noise. When z(t) is
Gaussian noise or when interference can be modeled as equivalent zero-mean
822 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
r(t) Matched
Channel Estimated
filter ADC
decoder sequence
p*Tc(Tc-t)
2bi−1
Spreading
Chip-rate
sequence
clock
generator
(a)
r(t) Tc
Estimated
∫ ( ) dt
Channel
ADC
0
decoder sequence
2bi−1
p*Tc(t) Chip-rate
Spreading
sequence
clock
generator
(b)
r(t) Tc
Estimated
∫ ( ) dt
Channel
ADC
0
decoder sequence
(2bi−1)pTc(t−iTc)
p*Tc(t)
Spreading
Chip-rate
signal
clock
generator
(c)
Fig. 10.3 Various in-phase signal demodulator architectures for DS-SS signals: (a) matched filter
and spreading sequence-based demodulator, (b) correlator and spreading sequence-based demod-
ulator, and (c) spread signal-based demodulator with correlator
Gaussian process with power spectral density (PSD) N0/2 ¼ PJTc/2, where PJ is the
average power of the jamming (interference) signal, we can use either matched
filter- or correlator-based receiver, with corresponding spreading sequence-based
configurations provided in Fig. 10.3a,b. The corresponding spreading signal
generator-based demodulator with correlator is shown in Fig. 10.3c. Given that
(2bi–1)2 ¼ 1 in either case, we have successfully performed the despreading
operation. Based on Chap. 6, we conclude that bit error probability Pb for uncoded
binary PSK (BPSK) can be estimated as:
rffiffiffiffiffiffi
rffiffiffiffiffiffiffiffiffiffi
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi!
1 Eb 1 Eb 1 Eb =T b T b
Pb ¼ erfc ¼ erfc ¼ erfc
2 N0 2 PJ T c 2 PJ T c
rffiffiffiffiffiffiffiffiffiffi
ð10:22Þ
1 Pb T b
¼ erfc , Pb ¼ Eb =T b ,
2 PJ T c
Eb
MJ ½dB ¼ PG½dB 10 log10 L½dB, ð10:23Þ
N0 min
1X M
Eb
PM erfc Rc wm , ð10:24Þ
2 m¼2 N0
where Rc is the coder rate of block code, defined by Rc ¼ k/n, and wm is the weight
of the codeword Cm.
We now explain how the DS-SS systems can be efficient in dealing with
multipath fading-induced ISI. Let us assume that a wireless channel introduces
several multipath components so that the corresponding impulse response can be
represented by h(t) ¼ aLOSδ(t τLOS) + a1δ(t τ1) + a2δ(t τ2) + . . ., wherein
aLOS > a1 > a2 > . . .. Let us further denote the spreading sequence (code) by sc(t)
while the transmitted sequence
X by {sk}. The baseband-modulated signal can be
represented by ~s ðtÞ ¼ s k g ð t kT s Þ, where g(t) is the baseband modulator
k pffiffiffiffiffiffiffiffiffiffi
impulse response, which is assumed to be rectangular gðtÞ ¼ 2=T s , 0 t < T s :
We also assume that the chip waveform is rectangular given by Eq. (10.18). For the
receiver shown in Fig. 10.3c, the input to the correlator can be written as:
^
~s ðtÞ ¼ f½~s ðtÞsc ðtÞ cos ðωc tÞ∗hðtÞgsc ðt τÞ cos ðωc t þ ϕÞ
ð10:25Þ
þ zðtÞsc ðt τÞ cos ðωc t þ ϕÞ:
^
~s ðtÞ ¼ aLOS~s ðtÞ s2c ðtÞ cos 2 ðωc tÞ þ a1~s ðt τ1 Þsc ðt τ1 Þ cos ½ωc ðt τ1 Þsc ðtÞ
|ffl{zffl}
¼1
We are concerned in demodulation of the m-th symbol, and assuming that multipath
fading induced-ISI originates from the transmission of the (m-k)-th symbol, we can
set τ1 ¼ kTs to obtain:
824 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
Tðs Tðs
2
s^m ¼ ^ ∗
~s ðtÞg ðT s tÞdt ¼ aLOS sm cos 2 ðωc tÞ dt
Ts |fflfflfflfflfflffl{zfflfflfflfflfflffl}
0 0 1½1þ cos ð2ω tÞ
2 c
Tðs
2
þ a1 smk sc ðtÞsc ðt τ1 Þ cos ðωc tÞ cos ½ωc ðt τ1 Þ dt
Ts |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
0 1½ cos ðω τ Þþcos ð2ω tω τ Þ
2 c 1 c c 1
rffiffiffiffiffi Tðs
2
þ zðtÞ sc ðtÞ cos ðωc tÞdt : ð10:27Þ
Ts
0
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
zm
Given that the double-frequency terms in Eq. 10.27 will not survive the low-pass
filtering (integration), the previous equation simplifies to:
Tðs
1
s^m ffi aLOS sm þ a1 smk cos ðωc τ1 Þ sc ðtÞsc ðt τ1 Þdt þ zm , ð10:28Þ
Ts
0
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
ρc ðt;tτ1 Þ
where ρc(t,t τ1) is the autocorrelation function of the spreading sequence (code),
defined as:
Tðs
1 1 XN
ρc ðt; t τÞ≜ sc ðtÞsc ðt τÞdt ¼ sc ðnT c Þsc ðnT c τÞ, N ¼ T=T c :
Ts N n¼1
0
ð10:29Þ
Tðs
1
ρc ðt; t τÞ ¼ sc ðtÞsc ðt τÞdt ¼ ρc ðτÞ, ð10:30Þ
Ts
0
Clearly, when T ¼ Ts and ρc(τ1) ¼ δ(τ1), the multipath fading-induced ISI gets
completely eliminated by the despreading procedure. So, one of the key topics in
DS-SS systems is to properly design the spreading sequence (code) of finite length,
whose autocorrelation over Ts is approximately δ-function.
In the discussion above, we assumed that the receiver is perfectly locked to the
LOS, which is not always the case in practice, and we need to study the synchro-
nization process of synchronizing the locally generated spreading sequence with the
received SS signal.
The mean acquisition time for a serial DS search system has been found in [9] to be:
Spreading
Feedback
sequence
search control
generator
826 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
Spreading
sequence
generator
sc(t)
kTc
∫ ( ) dt
0
sc(t−Tc/2)
kTc Comparator
Received
DS-SS signal
∫ ( ) dt
0
(select the
largest
Output
signal
input)
sc[t−(2Nc−1)Tc/2]
…
kTc
∫ ( ) dt
0
ð2 PD Þð1 þ KPFA Þ
T acquisition ¼ N c kT c , ð10:33Þ
PD
where PD and PFA are probabilities of the correct detection and false alarm,
respectively. We assumed that the time required to verify detection is NckTc, and
K is the penalty due to false alarm (KTc).
To reduce the acquisition time of DS serial search, the parallel search acquisi-
tion, illustrated in Fig. 10.5, can be used. In this acquisition scheme, the locally
generated spreading sequence sc(t) is available together with 2Nc delayed versions,
spaced Tc/2 apart. Clearly, two Nc correlators (matched filters are needed) and the
comparator after kTc seconds select the largest input. As the number of chips
k increases, the probability of synchronization error decreases. When for each k
the correlator outputs are examined to determine the largest one, the maximum time
interval required for a fully parallel search is:
T acquisition max
¼ kT c : ð10:34Þ
Threshold
kTc
∫ ( ) dt
0
Comparator
2
Received n-stage PN
PN sequence
sequence
DS-SS signal chip detector
Pos. 1 Switch generator
Feedback
search control
Fig. 10.6 The rapid acquisition by sequential estimation (RASE) search technique
Despreading
correlator
Estimated
Demodulator
data
sc ( t + τ )
Early correlator
Received Square-law
BPF
DS-SS signal detector
−
PN sequence
VCO Loop-filter
Tc generator
sc t + +τ +
2 Tc
sc t − +τ
2
Band-pass Square-law
filter (BPF) detector
Late correlator
Fig. 10.7 The delay-locked loop (DLL) for DS-SS signal tracking
(VCO) should be increased, when the late correlator output is larger in magnitude or
decreased. The increase in VCO frequency is proportional to 1/τ; namely, when
VCO frequency is increased, τ is decreased and vice versa. On such a way, the τ is
getting smaller and smaller, and in limit we have that sc ðtÞsc ðt þ τÞ ! 1. For
τ!0
sufficiently small τ, the dispreading correlator output signal represents the dispread
signal that is further demodulated in BPSK demodulator. The main problem DLL is
facing is related to imperfect gain balancing of early and late correlator branches,
which can cause the offset in feedback signal, when magnitudes are expected to be
the same, resulting in nonzero error signal.
To avoid for this problem, the tau-dither loop, shown in Fig. 10.8, can be used, in
which only one correlator is used for both code tracking and dispreading functions.
The incoming sequence is correlated with either early or late version of locally
generated PN sequence, which is dictated by tau-dither generator. The tau-dither
signal is a square wave signal that alternates between +1 and -1 and controls the
switch that alternatively passes early path (advanced) and late path (delayed)
versions of PN sequence. Since the same BPF and square-law detector are used
with both paths, the problem of identical transfer functions of DLL is solved.
The DS-SS receiver, described in Fig. 10.3, will synchronize to one of the multipath
components, not necessarily the strongest one. To solve for this problem, the RAKE
receiver [13], shown in Fig. 10.9, should be used. The assumption here is that there
are M-1 multipath components, in addition to LOS, with delay being a multiple of
chip interval Tc. Therefore, the impulse X
response of such multipart system, based on
M
Chap. 2, can be represented as hðtÞ ¼ a δðt mT c Þ, where am is the gain
m¼1 m
10.1 Spread Spectrum Systems 829
Estimated
Demodulator
data
Received Square-law
BPF
DS-SS signal detector
Tau-dither
generator
Early path
PN sequence
VCO Loop-filter
generator
Late path
Fig. 10.8 The tau-dither loop (TDL) for DS-SS signal tracking
sc ( t )
Coherent
w1, φ1 Diversity combiner
demodulator
sc ( t − Tc ) Estimated
…
…
Received
…
sc ( t − mTc )
…
Coherent
wM, φM
demodulator
sc ( t − MTc )
ðmÞ
X
M
ðmÞ
s^k ffi am s k þ am0 sk, m0 ρc ½ðm m0 ÞT c þ zk , ð10:36Þ
m0 ¼1, m0 6¼m
which represents the generalization of Eq. 10.31. In Eq. (10.31), symbol sk gets
transmitted over the k-th symbol interval, while sk,m0 symbol gets transmitted over
[(k m0 )Ts, (k + 1 m0 )Ts] symbol interval. When ρc(τ) ffi 0, for |τ} > Tc, and the
ISI in each branch is negligible, the performance of RAKE receiver will be identical
to the performance of various diversity schemes described in Chap. 8 (see also Ref.
[14]).
In the rest of this section, we describe spreading sequences suitable for DS-SS
systems [15–17] and beyond.
where L is the sequence length. The pseudorandom sequences satisfying Eq. 10.37
are commonly referred to as the perfect sequences.
The generic block scheme of the feedback shift register is shown in Fig. 10.10.
Let si(k) denote the state of the i-th flip-flop after the k-th clock pulse. Then the state
10.1 Spread Spectrum Systems 831
Clock
s0 s1 s2 sm
Output
1 2 … m
sequence
Flip-flop
Fig. 10.10 The generic block scheme of the feedback shift register
00
0 0/01
0/10
1/0 0/1 10 01
1/01
1 1/10 0/11
11
1/1
m=1 1/11
m=2
of the shift register can be described as s ¼ s1(k)s2(k). . .sm(k). Given that the
number of flip-flops is m, the number of possible states of the shift register is 2m.
Clearly, the sequence generated by shift register must be periodic, with a period at
most 2m.
The logic can be nonlinear, and corresponding sequence will be binary nonlinear
m
PN sequence. The possible number of Boolean functions of m variables will be 22 .
The feedback branch symbol is obtained as the arbitrary Boolean function of the
shift register content (state). De Bruijn (or good) graph representation [18, 19] can
be used to describe this calculation, which represents the state diagram. State
corresponds to the content of the shift register, and edges represent possible
transitions. Each state has two incoming and two outgoing edges. As an illustration,
we provide de Bruijn graphs for m ¼ 1 and m ¼ 2 in Fig. 10.11, where we assumed
that the next bit has been appended from the left. The maximal length (2m) sequence
is obtained by finding the path starting from one state and which visits every state
only once and reading out the output symbols. De Bruijn has shown that the number
of such sequences, known as de Bruijn sequences, is N m ¼ 22 m .
m1
832 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
Clock
Output
sm sm-1 … s2 s1
sequence
…
f0=1 f1 f2 fm−2 fm−1 fm=1
…
mod-2
adder
Fig. 10.12 The generic block scheme of the linear-feedback shift register (LFSR)
Rð0Þ ¼ 2n =L, Rð
iÞ ¼ 0 ði ¼ 1; 2; ; m 1Þ, Rð
mÞ 6¼ 0: ð10:38Þ
The de Bruijn sequences are suitable for encryption. There exist many algorithms to
generate the Bruijn sequences, such as [20].
When the feedback logic in Fig. 10.10 is composed of modulo-2 adders only, the
corresponding register is commonly referred to as the linear-feedback shift register
(LFSR). Because the all-zero state will always generate all-zero sequence, such a
state is not allowed, and the period of a PN sequence cannot exceed 2m–1. When the
period is exactly L ¼ 2m 1, the corresponding PN sequence is known as a
maximal-length sequence or m-sequence. The generic LFSR register is provided
in Fig. 10.12. The coefficients fi (i ¼ 1,2,. . .,m 1) have the value 1 or 0, depending
whether the corresponding switch is closed or open. The switches f0 and fm are
always closed ( f0 ¼ fm ¼ 1). Assuming that initial content of the shift register smsm–
1. . .s2s1 is different from all-zero word, the i-th feedback output symbol can be
determined by:
X
m
si ¼ f 1 si1 f 2 si2 f m sim ¼ f j sij : ð10:39Þ
j¼1
After certain number of clocks, the initial content of register will repeat.
The switches should be properly chosen such that period is maximum possible
L ¼ 2m 1.
By introducing the delay operator x ¼ z1, we can define the generating function
as follows:
X
1
G ðxÞ ¼ si x i , ð10:40Þ
i¼0
10.1 Spread Spectrum Systems 833
where s0 is the very first bit being generated. Based on recurrent relation
(Eq. 10.39), we can represent the generating function as:
P
m
f i xi si1 xi þ si1 xði1Þ þ þ s1 x1
i¼1
GðxÞ ¼ P
m : ð10:41Þ
1 f i xi
i¼1
Since the initial content of the shift register can be any sequence of length
m different from all-zero word, we can set s1 ¼ s2 ¼ . . . ¼ s–(m–1) ¼ 0,
s–m ¼ 1 (similar to unit response) to obtain:
1 1
GðxÞ ¼ X ¼ , ð10:42Þ
m
f ðxÞ
1 f ix i
i¼1
|fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl}
f ðxÞ
where f(x) is the characteristic polynomial. It can be shown that when f(x) is
irreducible (not divisible with any polynomial of lower degree), the period L will
be independent of initial conditions, and L can be found as the smallest positive
integer for which 1 xL is divisible with the characteristic polynomial f(x) [16]. In
other words, the characteristic polynomial is one of the factors of 1 xL. Let us
assume that the characteristic polynomial is the product of two irreducible poly-
nomials, that is, f(x) ¼ f(x1)f(x2). Then we can perform the partial fraction expan-
sion of 1/f(x) as follows:
1 a1 ð x Þ a2 ð x Þ
¼ þ ; deg½ai ðxÞ < deg½f i ðxÞ; i ¼ 1, 2 ð10:43Þ
f ðxÞ f 1 ðxÞ f 2 ðxÞ
The maximum possible period will be the least common multiplier of possible
periods 2m1 þm2 ¼ 2m , 2m1 , 2m2 . Since
we conclude that the necessary condition to obtain the m-sequence is to make sure
that the characteristic polynomial is irreducible. However, this is not a sufficient
condition. The sufficient condition will be satisfied when the characteristic poly-
nomial is primitive. The primitive polynomial is a irreducible polynomial with
corresponding roots being the primitive elements of finite field GF(2m). Finally, a
primitive element is a field element that generates all nonzero elements of the field
as its successive powers.
As an illustration, to get m-sequence of length L ¼ 23 1 ¼ 7, we need to
factorize x7 1 as follows:
834 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
(a)
g2(x) = 1 + x2 + x3
s3 s2 s1
(b)
x 7 1 ¼ ð x 1Þ x 3 þ x þ 1 x 3 þ x 2 þ 1 :
Let si be the content of register in the i-th step. The content of shift register in the
next step will be si+1 ¼ siM. In general, the transformation matrix has the form:
2 3
f1 1 0 0
6 f2 0 1 0 7
6 7
M¼6
6 ⋮ ⋮ ⋮ ⋱ ⋮7 7, ð10:45Þ
4 f m1 0 0 1 5
fm 0 0 0
2 3
6 7
pðλÞ ¼ detðM λIÞ ¼ ð1Þmþ1 41 f 1 x þ f 2 x2 þ þ f m xm 5=xm , ð10:46Þ
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
f ð xÞ
where x ¼ 1/λ. (Notice that in GF(2), - sign can be replaced with + sign.)
The period of m-sequence can be determined as the smallest power of M yielding
to the identity matrix:
ML ¼ I: ð10:47Þ
Since every matrix satisfies its characteristic equation p(M) ¼ 0, if p(x) is the factor
of 1 xL, then M will be the root of equation I M L, given that M is the root of
p(M). Therefore, when p(x) divides 1 xL, then ML ¼ I.
The autocorrelation function of the m-sequence is dependent on the chip wave-
form. When the chip waveform is a rectangular pulse of duration Tc, given by
Eq. 10.18, the continuous autocorrelation function will have a triangle shape around
the origin of duration 2Tc, in other words:
8
> L þ 1 jτj
<1 , jτj < T c
Rmsequence ðτÞ ¼ L Tc : ð10:48Þ
>
: 1
, jτ j > T c
L
Clearly, Eq. 10.49 can be derived from Eq. 10.48 by letting L to tend to plus infinity.
Given that m-sequence is periodic with period LTc, the corresponding autocorrela-
tion function will be periodic as well and can be sketched as shown in Fig. 10.14.
The corresponding power spectral density (PSD) can be obtained by calculating the
R(τ)
LTc LTc
… 1/L … τ
2Tc
X
1
1 Lþ1 l l
PSDmsequence ðτÞ ¼ δ ðf Þ þ 2 sinc2 δ f : ð10:50Þ
L2 L l¼1, l6¼0
L LT c
Wireless channel
FH-SS transmier (Tx) z(t) FH-SS receiver (Rx)
t=iTs
Sequence of Tx signal Decision
{sˆi }
Modulator h(t) Demodulator
symbols {si} s(t) circuit
PN PN
generator generator
(a)
Matched filters (MFs) &
envelope detectors (EDs)
Received
MF &
Clipper Accumulator
FH-SS signal ED 1
Decision
stage sˆi
MF &
Filter Clipper Accumulator (select the
ED 2
largest
input)
…
…
…
Frequency
hopper
MF &
Clipper Accumulator
ED M
(b)
Fig. 10.16 Configurations of (a) FH-MSFK system and (b) FFH-MFSK demodulator
838 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
Received
Square-law Delay of
BPF
FH-SS signal detector k1 hops
f1
Square-law Delay of
BPF
detector k2 hops Σ
…
f2
…
Square-law Delay of kN
BPF
detector hops
fN
Received
FH-SS signal
Square-law
BPF Integrator
detector
Frequency
synthesizer/
hopper Threshold Comparator
Search
PN code
feedback
generator
control
are introduced, depending on the spreading sequence. Once the delays are properly
chosen, the strong peak gets generated at the output, indicating that the local
spreading sequence matches that of the received signal.
To reduce the complexity of this acquisition scheme, single correlator/matched
filter can be used, combined with frequency synthesizer/hopper, as shown in
Fig. 10.18. The PN generators control the frequency synthesizer/hopper. Once the
correct frequency hopping sequence is found, the comparator exceeds the threshold,
and the acquisition indication is generated. The tracking step is very similar to that
of DS-SS systems.
We have discussed the impact of multipath fading on FH-SS systems already in
Sect. 10.1.1. When multipath effects cause either flat or frequency-selective fading,
in the absence of interference signal, the performances are similar to those of
not-FH systems. In the presence of interference, let us assume that SFH is used
and that interference (jamming) signal occupies K out of N frequency bands. The
symbol error probability Ps can be estimated as follows:
10.1 Spread Spectrum Systems 839
Let us assume that during the dispreading, in the absence of jammer, the influence
of multipath components is mitigated, and the symbol SNR ρs is affected by the
channel gain, so that we can use the expression of symbol error probability for
AWGN channel. As an illustration, for M-ary QAM/PSK with coherent detection,
pffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ffi
we can use the following approximate expression PðsAWGNÞ ’ aðMÞQ bðMÞρs ,
with parameters a(M ) and b(M ) being modulation and signal constellation size
dependent as shown in Chap. 6. What remains is to determine the symbol error
probability in the presence of jammer, denoted as PðsJammerÞ . When narrowband
jammer inserts the Gaussian noise within the bandwidth of modulated signal B,
such a jammer, known as partial band noise jammer, it reduces the SNR, and
corresponding SNR can be determined as:
N0B
ρðsJammerÞ ¼ ρ, ð10:52Þ
N 0 B þ N Jammer B s
where NJammer is the PSD of the jammer noise source.The corresponding symbol
ðJammerÞ ðAWGNÞ
error probability will be Ps ¼ Ps ρðsJammerÞ : The overall symbol error
probability, based on Eq. 10.51, can be determined as:
N K N0B K
P s ð ρs Þ ¼ PðsAWGNÞ ðρs Þ ðJammerÞ
þ Ps ρs : ð10:53Þ
N N 0 B þ N Jammer B N
Let now the jamming signal be the tone at the hopped carrier frequency with some
phase offset δϕi. The demodulator output at the i-th symbol interval can be
represented as:
pffiffiffiffiffi jδϕ
s^i ¼ ai si þ zi þ PJ e i , ð10:54Þ
where ai is the channel gain coefficient after dispreading, and PJ is the average
power of the jamming tone. For M-ary PSK, assuming that Arg{si} ¼ 0, the symbol
error probability can be estimated by:
n pffiffiffiffiffi o
Ps ¼ 1 Pr
Arg ai si þ zi þ PJ ejδϕi
π=M , ð10:55Þ
systems, the following parameters are relevant [17, 21]: number of available
frequency slots Q, sequence period L, cardinality of sequence set M, and maximum
Hamming crosscorrelation Hmax. The Hamming crosscorrelation for two sequences
{x} and {y} of length L each is defined as:
X
L1
Hxy ðiÞ ¼ h xl ylþi , ð10:56Þ
l¼0
1, a ¼ b
where h(a,b) is the Hamming metrics defined as hða; bÞ ¼ . The hop-
0, a 6¼ b
ping pattern can be defined as L-tuple:
fL ¼ f j1 ; f j2 ; ; f jL , ð10:57Þ
where f jl is the symbol selected from a finite set of Q elements. The maximum
number of patterns, for synchronous multiuser case, with no more than k hits
between any two patterns is Qk+1 [21]. For asynchronous transmission, the maxi-
mum number of patterns reduces down to Qk+1/L. The upper limit for maximum
sequence length is given by [21]:
Qkþ1 1
L , ð10:58Þ
Qk 1
which indicates that for k ¼ 1, we have that Lmax ¼ Q + 1, while for k > 1, the
Lmax ¼ kQ. Compared to the Singleton bound for maximum-distance separable
(MDS) codes, this bound is not a tight bound. The Singleton bound, as shown in
Chap. 9, for codeword length n and number of information bits kinfo is given by:
The set of patterns with k hits is equivalent to the MDS code with kinfo ¼ k + 1. So
only for k ¼ 1, these two bounds are in agreement. The lower bound for Hmax is
given by [22]:
ðL bÞðL þ b þ QÞ
Hmax , b ¼ L mod Q: ð10:60Þ
QðL 1Þ
It has been shown in Chap. 9 that Reed-Solomon (RS) codes satisfy the Single-
ton bound with equality sign and belong to the class of MDS codes. If we are
concerned with asynchronous multiuser transmission and sequences of length
L ¼ Q 1, we can generate Qk sequences as follows [17, 23–25]. Let Q be a
prime power for the finite field GF(Q) that is defined, and let α be a primitive
element in GF(Q). We need to determine the polynomial:
10.1 Spread Spectrum Systems 841
X
k
PðxÞ ¼ pi xi , pi 6¼ 0, ð10:61Þ
i¼0
p1(t)
p2(t)
1 1
t
T/2 T T
−1
(a)
iT a1i+zi aˆ1i
∫ ( ) dt Decision
circuit
( i −1)T
s1(t) z(t)
r(t) p1(t−iT)
Channel
p2(t−iT)
(b)
Fig. 10.20 (a) Two orthogonal signature waveforms assigned to two different users. (b) Two
users’ CDMA system model
Now let both users apply antipodal signaling with aik2{1,+1}, i ¼ 1,2. Then
modulated signals can be represented as:
X X
s1 ðtÞ ¼ a p ðt iT Þ, s2 ðtÞ ¼
i 1i 1
a p ðt iT Þ, hs2 js1 i ¼ 0:
i 2i 2
ð10:65Þ
The corresponding CDMA system model is provided in Fig. 10.20b. Because the
signature waveforms (“codes”) p1(t) and p2(t) are orthogonal to each other, and
perfect synchronism is assumed, the optimum receiver will be matched filter or
correlation receiver.
The FDMA can be considered as the special case of CDMA in which signature
waveforms are defined as:
where g(t) is the pulse of unit energy and duration T, while l is an integer. In a
similar fashion, TDMA can be considered as a special case of CDMA with
signature waveforms being defined as:
1 t ðk 1ÞT=K
pk ðtÞ ¼ pffiffiffiffiffiffiffiffiffi rect ; k ¼ 1, 2, , K ð10:67Þ
T=K T=K
In the next subsection, we discuss different signature waveforms suitable for use
in CDMA systems.
The spreading sequences suitable for DS-SS systems have already been discussed
in Sect. 10.1.2, in particular in Subsect. 10.1.2.4. On the other hand, the spreading
sequences suitable for both FH-SS- and FH-based CDMA systems have been
discussed in Sect. 10.1.3. The DS-SS waveform, given in Eq. 10.17, can be
generalized as follows [5]:
X
N
sc ðtÞ ¼ Ac βn ϕn ðtÞ, ð10:68Þ
n¼1
where [β1,. . ., βn,. . ., βN] is the spreading code with components not necessarily
binary and the basis functions {ϕi(t)} satisfy the orthogonality conditions:
For DS-SS systems, the basis functions are chip waveforms given by:
ϕn ðtÞ ¼ pT c ½t ðn 1ÞT c , while spreading code components βn2{1,+1}. In
FH-SS, the chips are modulated in frequency domain:
X
N
sðcFHÞ ðtÞ ¼ Ac ϕn ðt; f n Þ,
n¼1
ð10:69Þ
cos ð2πf n tÞ, ðn 1ÞT c t < nT c
ϕn ðt; f n Þ ¼
0, otherwise
n1
Φn ðf Þ ¼ p1=T f , ð10:70Þ
T
10.2 Code-Division Multiple Access (CDMA) Systems 845
where τ denotes the difference in time arrivals. Given that spreading codes fsck g are
periodic with the period Ts, then crosscorrelation is dependent only on the differ-
ence in time arrivals τ, and we can use ρkk’(τ) to denote ρkk’(t, t τ). In synchronous
CDMA, the users’ signals arrive at the same time at the receiver side, and
corresponding crosscorrelation becomes:
ð Ts
1 1X N
1XN
ρkk0 ð0Þ ¼ sck ðtÞsck0 ðtÞdt ¼ sck ðnT c Þ sck0 ðnT c Þ ¼ ð1Þckn ð1Þck0 n ,
Ts 0 N n¼1 |fflfflfflffl{zfflfflfflffl} |fflfflfflffl{zfflfflfflffl} N n¼1
ð1Þckn ð1Þ k0 n
c
ð10:73Þ
where we used ð1Þckn to denote sck ðnT c Þ. Clearly, the negative logic is used here: -1 to
denote binary 1 and +1 to denote binary 0. Ideally, we would like in synchronous
(asynchronous) CDMA to have ρkk0 (0) ¼ 0 [ρkk0 (τ) ¼ 0] whenever k 6¼ k0 . The codes set
satisfying this crosscorrelation property can be called as orthogonal spreading code
set, otherwise non-orthogonal spreading code set. The literature on PN sequences is
quite of reach [10, 11, 16–26]. Some examples of pseudorandom sequences include
Gold codes, Kasami sequences [10, 17], Barker sequences, etc. The crosscorrelation
between two synchronous signature sequences can be determined as:
1X N
1
ρkk0 ð0Þ ¼ ð1Þckn ð1Þck0 n ¼ ð# agreements # disagreementsÞ
N n¼1 N
1
¼ ½# agreements ðN # agreementsÞ
N ð10:74Þ
2
¼ 1 þ ð# agreementsÞ
N
2X n
¼ 1 þ ½ckn ¼ ck0 n ,
N n¼1
846 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
where we used [P] to denote the Iversion function, which has a value of 1 when
proposition P is true, and zero otherwise:
: 1, P is true
½P¼ ð10:75Þ
0, P is false
For an m-sequence, defined as (c1,c2,. . .,cN), there are 2m–1 zeros and 2m–1 ones
in the sequence. The sequence length is N ¼ 2m–1, and when we let the m-sequence
to repeat, the corresponding correlation function is given by:
(
1 XN 1, l ¼ 0, N, 2N,
RðlÞ ¼ ð1Þcn ð1Þcnþl ¼ 1 ð10:76Þ
N n¼1 , otherwise
N
The spreading codes for asynchronous CDMA must satisfy the following two
constrains: (i) the out-of-phase autocorrelation must be low and (ii) the
crosscorrelation must be low as well. The m-sequences do satisfy the constrain
(i); however, their crosscorrelation constraint is not that good. The Welch bound
has shown that the maximum crosscorrelation for any two spreading (periodic)
binary sequences of length N, taken from the set of size M, is lower bounded as
follows [27]:
1=2
M1 pffiffiffiffi
R ðk Þ N N: ð10:77Þ
MN 1
The Gold sequences (codes) [28, 29] have better crosscorrelation properties than
m-sequence, but worse autocorrelation properties. At this point, it is convenient to
introduce the concept of preferred pairs of m-sequences, which represents a pair of
m-sequences {a} and {b} of length N with a periodic crosscorrelation function
taking three possible values:
8
< 1=N
1 þ 2ðnþ1Þ=2 , n odd
ρa , b ¼ tðnÞ=N , tðnÞ ¼ ð10:78Þ
: 1 þ 2ðnþ2Þ=2 , n even
½tðnÞ 2=N
Let us observe two sequences of length N ¼ 2m–1; the second is obtained from the
first {an} by decimation (taking every q-th element): {bn} ¼ {aqn}. When N and
q are co-prime, with either q ¼ 2k+1 or q ¼ 22k–2k + 1, and when m ¼ 0 mod 4 with
the greatest common
divider (GCD) for m and k satisfying the following constraint
1, m odd
GCDðm; kÞ ¼ , then it can be shown that crosscorrelation between
2, m even
these two sequences will have three possible values, as specified by Eq. 10.78.
Therefore, {an} and {bn} ¼ {aqn} are preferred pair of sequences. They can be used
to create the Gold sequences:
10.2 Code-Division Multiple Access (CDMA) Systems 847
1 + x2 + x5
1 + x + x2 + x4 + x5
Fig. 10.21 Generation of one set of Gold sequences form polynomials g1(x) ¼ 1 + x2 + x5 and
g2(x) ¼ 1 + x + x2 + x4 + x5
fag, fbg, fa þ bg, fa þ Dbg, a þ D2 b , , a þ DN1 b , ð10:79Þ
and the number of sequences is large 23m/2 for m ¼ 0 mod 4 and 23m/2 + 2m/2 for
m ¼ 2 mod 4.
For synchronous CDMA applications, the orthogonal sequences can be used.
The orthogonality of two sequences, represented as vectors |a〉 ¼ [a1,. . .,aN]T and |
b〉 ¼ [b1 . . . bN]T, can be defined in a similar fashion to orthogonality principle for
signals [see Eq. 10.64] as follows:
848 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
X
N
hbjai ¼ an b∗
n ¼ 0:
n¼1
The very popular orthogonal sequences are Walsh functions (sequences) [30–32],
as the set of bipolar sequences of size N ¼ 2m, defined recursively as follows:
An alternative way to obtain the Walsh sequences is to interpret them as the rows
(columns) of the Hadamard matrices, defined recursively as:
2 3
þ1 þ1 þ1 þ1
þ1 þ1 6 þ1 þ1 1 1 7
H1 ¼ ½þ1, H2 ¼ , H4 ¼ H
2 ¼6
4 þ1
7, ,
þ1 1 2 1 þ1 1 5
þ1 1 1 þ1
Hn Hn
H2n ¼ H
2 ¼ ,
n Hn Hn
ð10:82Þ
where we use ()
to denote the Kronecker product of matrices. Clearly, the
Hadamard matrix is symmetric and has equal number of +1 and -1 in every row
(column), except the first one. Additionally, any two rows (columns) are orthogonal
to each other. In conclusion, the rows (columns) of Hadamard matrix can be used as
Walsh sequences.
We first describe the basic models, followed by discrete-time models. We adopt the
interpretation similar to [5].
In synchronous CDMA, because the signals originating from different users are
perfectly time aligned, it is sufficient to consider a single symbol interval [0, T]. To
facilitate explanations, let us denote the k-th (k ¼ 1,2,. . .,K ) user antipodally
modulated signature waveform of unit energy with sk(t) instead of sck ðtÞ used
before. As the generalization of Fig. 10.21 to K users, the received signal can be
represented as:
10.2 Code-Division Multiple Access (CDMA) Systems 849
X
K
r ðt Þ ¼ Ak bk sk ðtÞ þ σzðtÞ, ð10:83Þ
k¼1
where Ak is the amplitude of the k-th user at the receiver side, bk2{+1,–1} is the k-th
user information bit, and z(t) is a zero-mean Gaussian noise of unit variance. When
the real-valued signature waveforms are orthogonal to each other, the performance
of the k-th user is dependent on signal-to-noise ratio Ak/σ, where σ-signal is the
standard deviation of Gaussian noise process. When the signature waveforms are
quasi-orthogonal (or even non-orthogonal), we can use the crosscorrelation to
quantify the orthogonality:
ðT
ρkk ¼ hsk jsk i ¼ sk ðtÞs∗
0 0
k0 ðtÞdt, ð10:84Þ
0
and since the waveform signatures are real valued, the complex-conjugate opera-
tion can be omitted. By applying the Bujakowski-Cauchy-Schwarz inequality, the
following upper bound on magnitude of crosscorrelation is obtained:
T
ð
ðT
∗
jρkk0 j ¼
sk ðtÞsk0 ðtÞdt
ksk kksk0 k ¼ 1, ksk k ¼ jsk ðtÞj2 dt ¼ 1:
2
ð10:85Þ
0 0
In asynchronous CDMA, we need to specify delays in arrival for each user τk2[0,
T]; k ¼ 1,2,. . .,K. Because different user signals arrive at different times at the
receiver side, it is not sufficient to observe one symbol, but block of symbols. Let us
denote the block of symbols for the k-th user containing 2 M + 1 symbols as follows
[5]: bk ¼ [bk [M], . . ., bk [0], . . ., bk [M]]. The basic asynchronous CDMA model
can be now represented as:
X
K X
M
r ðt Þ ¼ Ak bk ½isk ðt iT τk Þ þ σzðtÞ: ð10:88Þ
k¼1 i¼M
We further assume that information block length bk is sufficiently large so that edge
effects are not relevant, so that we can observe delays modulo-T. Clearly, when
signals from all users arrive at the same time (τk ¼ τ), the asynchronous case
reduces down to the synchronous chase. Another interesting special case is when all
amplitudes are the same (Ak ¼ A) and all users use the same signature waveform,
namely, sk(t) ¼ s(t). If we further assume that delays can be represented as τk ¼ (k–
1)T/K, like in TDMA, clearly, Eq. 10.88 reduces down to ISI case:
X
K X
M
k1
r ðt Þ ¼ Abk ½is t iT T þ σzðtÞ
k¼1 i¼M
K
XK X
ð10:89Þ
M
k1
¼ A b½iK þ k 1 s t iT T þ σzðtÞ:
k¼1 i¼M
|fflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl} K
bk ½i
Because the signals from users k and m have different delays, τk and τm, we have
to specify two crosscorrelations, assuming that τ ¼ τm–τk > 0 (the signal from the k-
th user arrives earlier than the signal from the m-th user for τ seconds), as illustrated
in Fig. 10.22. The crosscorrelation ρkm is related to crosscorrelation between the
current symbol of k-th user and current symbol of the m-th user, and it is defined as:
ðT
ρkm ¼ sk ðtÞsm ðt τÞdt: ð10:90Þ
τ
ρmk ρkm
t
τk τm
τ
10.2 Code-Division Multiple Access (CDMA) Systems 851
ðτ
ρkm ¼ sk ðtÞsm ðt þ T τÞdt: ð10:91Þ
0
Given that most of the signal processing in CDMA systems is performed in the
discrete-time (DT) domain, it makes sense to develop the DT CDMA models [5].
Similarly to the single-user case, the samples from correlators’ (matched filters)
multiuser synchronous CDMA case, as shown in Fig. 10.23, represent a sufficient
statistics. The k-th correlator output can be represented as:
ðT ðT "X
K
#
r k ¼ r ðtÞsk ðtÞdt ¼ Ak bk sk ðtÞ þ σzðtÞ sk ðtÞdt
k¼1
0 0
X
K ðT ðT
¼ Ak bk þ Am bm sm ðtÞsk ðtÞdt þ σzðtÞsk ðtÞdt ð10:92Þ
m¼1, m6¼k
0 0
|fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl}
ρmk zk
X
K
¼ Ak b k þ Am bm ρmk þ zk ; k ¼ 1, 2, , K:
m¼1, m6¼k
This set of K-equations can also be written in more compact matrix form:
iT
r1[i]
∫ ( ) dt
( i −1)T t=iT
…
…
r(t) iT
rk[i]=Akbk +
bksk(t) Channel ∫ ( ) dt Σm≠k Ambmρmk+zk
( i −1)T t=iT
…
bKsK(t)
…
…
sk(t−iT)
…
iT rK[i]
∫ ( ) dt
( i −1)T t=iT
sK(t−iT)
2 3 2 3 2 3
r1 b1 z1
6 r2 7 6 b2 7 6 z 2 7
jr i ¼ 6 7
4 ⋮ 5 ¼ R diag ð|fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl}
A1 ; ; AK Þ 6 7þ6 7
4⋮ 5 4⋮5
rK A bK zK
|fflfflffl{zfflfflffl} |fflfflffl{zfflfflffl}
jbi jzi
¼ R A j bi þ j z i
|{z} |{z}
b z
¼ R A b þ z: ð10:93Þ
indicating that components in |z〉 are correlated, and in analogy with single-user ISI
channel, we can perform whitening by the Cholesky factorization of the
crosscorrelation matrix [3, 5, 33, 34], assuming that signals are real valued:
R ¼ FT F, ð10:95Þ
where F is the lower triangular matrix with positive diagonal elements. Now by
multiplying Eq. 10.93 by (FT)-1 from the left side, we obtain:
0 T 1 1 1
r ¼ F jr i ¼ FT FT F A b þ FT z
0
¼ FA b þ z :
|fflfflfflfflfflffl{zfflfflfflfflfflffl} |fflfflfflffl{zfflfflfflffl} ð10:96Þ
I 0
z
Given that:
0 D T 1 E T 1
z ¼ F z ¼ F hzi ¼ 0,
0 D 0 0 T E D T 1 T 1 E T 1 T 1
Cov z ¼ z z ¼ F zz F ¼ F zz F
|fflffl{zfflffl} ð10:97Þ
σ2 R
1 1
R F1 ¼ σ 2 FT FT |ffl{zffl}
¼ FT σ 2 |{z} FF1 ¼ σ 2 I,
|fflfflfflfflfflffl{zfflfflfflfflfflffl}
FT F I
I
we conclude that components of jz’〉 are uncorrelated, and the whitening of the
colored Gaussian noise has been successfully conducted.
This synchronous model is useful when K signature waveforms are quasi-
orthogonal and known on the receiver side. However, in certain situations, such
D
as antenna arrays, a different set of orthogonal functions is used, say fϕd ðtÞgd¼1 .
To solve for this problem, we can project the signature waveforms along this new
basis functions as follows:
10.2 Code-Division Multiple Access (CDMA) Systems 853
ðT
skd ¼ sk ðtÞϕd ðtÞdt; d ¼ 1, , D: ð10:98Þ
0
In a similar fashion, the received signal can be represented in terms of projection as:
ðT
r d ¼ r ðtÞϕd ðtÞdt; d ¼ 1, , D: ð10:99Þ
0
ðT ðT "X
K
#
rd ¼ r ðt Þ ϕd ðtÞdt ¼ Ak bk sk ðtÞ þ σzðtÞ ϕd ðtÞdt
|{z} k¼1
0 0
X
K
Ak bk sk ðtÞ þ σzðtÞ
k¼1
X
K ð T ð X
K
T
ð10:100Þ
~
r ¼ SAb þ ~
z, ð10:103Þ
854 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
where matrix A and vector b are the same as introduced before. Let us now
determine the covariance matrix of ~
r as follows:
T D T E
Cov ~
r ¼ ~r ¼ SAb þ ~
r~ z SAb þ ~z
* +
T T
¼ SAb ðSAbÞ þ ~z~z
|fflfflfflffl{zfflfflfflffl} |fflffl{zfflffl}
bT AT ST σ2 I
¼ SA bbT AT ST þ σ 2 I, ¼ SAAT ST þ σ 2 I, ð10:104Þ
|fflffl{zfflffl}
I
where we used in the second line the fact that users’ bits are independent. Clearly,
the noise samples are independent and Eq. 10.103 is valid regardless of whether the
D K
orthogonal basis fϕd ðtÞgd¼1 span the signature waveforms fsk ðtÞgk¼1 or not.
Regarding the DT representation of asynchronous CDMA system, without loss
of generality, we assume that delays can be arranged as τ1 τ2 τK. The
correlators’ outputs can be written as:
τk þðð
iþ1ÞT
τk þðð
iþ1ÞT τk þðð
iþ1ÞT
K X
X M
¼ Am bm ½i sm ðt iT τk Þsk ðtÞdt þ σzðtÞdt
m¼1 i¼M
τk þiT τk þiT
|fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl}
zk ½i
τk þðð
iþ1ÞT
X
K X
M
¼ Ak bk ½i þ Am bm ½i sm ðt iT τk Þsk ðtÞdt þ zk ½i: ð10:105Þ
m¼1, m6¼k i¼M
τk þiT
Now we have to group the cross talk terms, relative to the k-th user signal, into two
categories, as illustrated in Fig. 10.24: (i) the cross talk terms for which τm > τk and
(ii) cross talk terms for which τl < τk. By taking the asynchronous crosscorrelations’
definitions, given by Eqs. 10.90 and 10.91, into account, we can rewrite the
equation above as follows:
X
K X
K
r k ½i ¼ Ak bk ½i þ Am bm ½iρkm þ Am bm ½i 1ρmk
m>k m>k
ð10:106Þ
XK X
K
þ zk ½i þ Al bl ½i þ 1ρkl þ Al bl ½iρlk :
l<k l<k
10.2 Code-Division Multiple Access (CDMA) Systems 855
b k [i]
sk (current symbol)
k-th user
b m [i−1] bm [ i ]
sm (prev. sym.) sm (current sym.)
m-th user
ρmk ρ km
bl [i] bl [i+1]
sl (current symbol) sl (next symbol)
l-th user
ρlk
ρkl
t
τl τk τm
Let the elements of correlation matrices R[0] and R[1] be defined as [5]:
8
< 1, m ¼ k
0, m k
Rmk ½0 ¼ ρmk , m < k , Rmk ½1 ¼ : ð10:107Þ
: ρkm , m < k
ρkm , m > k
We can now represent the K-equations from Eq. 10.106 in matrix form by:
F T (z −1)
z(z)
b(z) A S(z) r(z)
where F[0] is lower triangular and F[1] is upper triangular with zero diagonal, such
that [5, 33]:
ð1
1 j2πf
detF½0 ¼ exp log detS e df : ð10:112Þ
2 0
Moreover, when detS(ejω) > 0 , 8 ω 2 [π, π], then the filter with transfer function
F1[z] is causal and stable [5, 33]. The corresponding MIMO asynchronous
CDMA model in the z-domain is shown in Fig. 10.25.
Let us now multiply Eq. 10.110 by FT(z1), from the left side, to obtain:
0
r ðzÞ¼FT z1 rðzÞ ¼ FT z1 FT z1 FðzÞAbðzÞ þ FT z1 zðzÞ
|fflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflffl} |fflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl}
I wðzÞ
It can be shown that the samples of noise process w(z) are uncorrelated, indicating
that the filter with transfer function FT(z1) is in fact MIMO whitening filter. The
corresponding equivalent asynchronous CDMA model in z-domain with MIMO
whitening filter, based on Eq. 10.113, is shown in Fig. 10.26.
The time-domain representation of asynchronous CDMA system can be
obtained by inverse z-transform of Eq. 10.113, which yields:
0
r ½i ¼ F½0Ab½i þ F½1Ab½i 1 þ w½i: ð10:114Þ
Finally, from Eqs. 10.110 and 10.111, we can establish the following relationships
between R[0], R [1], and F[0], F [1]:
w(z)
b(z) A F(z) r’(z)
The interference that originated from multiple users should not be treated as a noise
process. Instead, the knowledge of signature waveforms should be exploited to
mitigate multiaccess interference. In particular, when all users are detected simul-
taneously, the interference from other users can be estimated and cancelled out. The
CDMA receiver can also exploit the structure of multiuser interference in detection
of the desired signal, which is commonly referred to as the multiuser detection. The
multiuser detection was pioneered by Sergio Verdú, in a series of publications
[5, 35–42].
We start our discussion with conventional single-user detection, when other
users are considered as interference channels, which is illustrated in Fig. 10.23.
This case is suboptimum, because the output of the k-th correlator (matched
filter) does not represent the sufficient statistics for making a decision on bit
transmitted bk.
r1
b1=−1 b1=1
Fig. 10.27 Probability density functions for user 1 bit, b1, by taking into account the bit
originating from user 2, b2
r 1 ¼ A1 b1 þ A2 b2 ρ þ z1
ð10:116Þ
r 2 ¼ A2 b2 þ A1 b1 ρ þ z2 ,
where for simplicity, we have written ρ12 ¼ ρ21 ¼ ρ. Given that noise samples are
zero-mean Gaussian with the same variance σ 2, we sketched in Fig. 10.27 the
probability density functions (PDFs) for user 1 when transmitted bit b1 was either
+1 or -1, which takes into account the bit b2 transmitted by user 2. The probability
of error for user 1 can be determined as:
Pe, 1 ¼ Pr b^1 6¼ b1
¼ Prfr 1 < 0jb1 ¼ þ1gPrfb1 ¼ þ1g þ Prfr 1 > 0jb1 ¼ 1gPrfb1 ¼ 1g:
ð10:117Þ
ð10:118Þ
1 A 1 þ A2 ρ
Prfz1 > A1 þ A2 ρjb1 ¼ 1; b2 ¼ 1g ¼ erfc pffiffiffi
2 σ 2
ð10:119Þ
1 A 1 A2 ρ
Prfz1 > A1 A2 ρjb1 ¼ 1; b2 ¼ þ1g ¼ erfc pffiffiffi ,
2 σ 2
and after substitution in Eq. 10.118, assuming Pr{b2 ¼ 1} ¼ Pr{b2 ¼ 1} ¼ 1/2,
we obtain:
1 A1 þ A2 ρ 1 A1 A2 ρ
Prfr 1 > 0jb1 ¼ 1g ¼ erfc pffiffiffi þ erfc pffiffiffi : ð10:120Þ
4 σ 2 4 σ 2
1 A1 þ A 2 ρ 1 A1 A 2 ρ
P e, 1 ¼ erfc p ffiffi
ffi þ erfc p ffiffi
ffi , ð10:121Þ
4 σ 2 4 σ 2
while based on Eq. 10.116, we conclude that probability of error for user 2 will be
the same as probability of error for user 1, namely, Pe,2 ¼ Pe,1. Given that the first
term in Eq. 10.121 cannot be smaller than the second term, the probability of error
can be upper bounded by:
1 A1 A 2 j ρ j
Pe, 1 ¼ Pe, 2 erfc pffiffiffi , ð10:122Þ
2 σ 2
indicating that probability of error will be smaller than ½ (Pe,1 < 1/2) when
A1 > A2|ρ|, and this condition is known as the open eye condition (when observed
on a scope, the eye diagram will be open). In this case, the useful term is dominant
over cross talk term, and error probability can be approximated as:
1 A1 A 2 j ρ j
Pe, 1 ¼ Pe, 2 ’ erfc pffiffiffi ,
2 σ 2
and this expression is similar to single-user link, except that SNR is lower due to the
presence of cross talk. In an opposite situation, when A1 < A2|ρ|, the eye diagram
will be completely closed, and the cross talk will dominate over useful signal,
which reminds to the near-far cross talk problem. Since the reception will be
dominated by interference, the receiver 1 will detect the bit transmitted by user
2, and probability of error will be close to ½. When A1 ¼ A2ρ, from Eq. 10.121, we
obtain the following expression for error probability:
1 2A1 1
Pe, 1 ¼ erfc pffiffiffi þ , ð10:123Þ
4 σ 2 4
860 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
-1
10
-2
10
Probability of error, P e
-3
10
-4 ρ=0.25:
10
A 2/A 1=4
A 2/A 1=2
-5
10 A 2/A 1=1
A 2/A 1=1/2
-6
10 A 2/A 1=0
-7
10
0 4 8 12 16 20
Signal-to-noise ratio, A 1/σ [dB]
Fig. 10.28 Probability of error in channel 1, for conventional single-user correlator receiver
vs. SNR for different A2/A1 ratios, assuming the crosscorrelation of 0.25
Pe, k ¼ Prfr k < 0jbk ¼ þ1gPrfbk ¼ þ1g þ Prfr k > 0jbk ¼ 1gPrfbk ¼ 1g
1 n X o 1 n X o
¼ Pr zk < Ak ¼
Am bm ρmk þ Pr zk > Ak ¼
Am bm ρmk
2n P
m6 k o 2 m6 k
1 X X X 1 Ak m6¼k Am αm ρmk
¼ K1 α 2f1;þ1g α 2f1;þ1g α 2f1;þ1g erfc pffiffiffi ,
2 1 m K 2 σ 2
ð10:124Þ
where we performed conditioning over all possible interfering bits. Again, for the
open eye condition, the following upper bound can be used:
10.3 Multiuser Detection 861
1 Ak m6¼k Am jρmk j X
P e, k erfc pffiffiffi , Ak > A ρ : ð10:125Þ
2 σ 2 m6¼k m mk
For sufficient number of cross talk terms, we can use the Gaussian approxima-
tion, according to central limit theorem, for ∑m 6¼ kAmρmk, and corresponding expres-
sion for error probability will be:
0 1
~ e, k ’ 1 erfcB
P
Ak
@qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
C
ffipffiffiffiA, ð10:126Þ
2 P
σ þ m6¼k Am ρmk 2
2 2 2
which gives more pessimistic results, in high SNR regime, as shown in [5].
The probability of error analysis for asynchronous CDMA is similar, except that
we need to account for (i) left and right crosscorrelations and (ii) the fact that each
bit is affected by two K–2 interfering bits. The resulting probability of error
expression will have increased the number of terms twice [5]:
1 X X X
P e, k ¼ K1
4
α1 , β12f1;þ1g2 αm , βm2f1;þ1g2 αK , βK2f1;þ1g2
P
When the user k signal is dominant, the following open eye condition will be valid:
X
Ak > A ðjρmk j þ jρkm jÞ:
m6¼k m
ð10:128Þ
(r1,..,rK), not just rk, and the use of non-optimum receiver might result in significant
performance degradation, in particular for asynchronous CDMA in the presence of
multipath fading.
In our study on optimum multiuser detection for synchronous CDMA, we
assume that the receiver has full knowledge of signature waveforms of all users,
received amplitudes Ak for all users, bit-timing information, and the variance of the
noise σ 2. We apply DT synchronous CDMA model, given by Eq. 10.83, namely, r
(t) ¼ ∑kAkbksk(t) + σz(t). We start our study with a two-user case, in a similar
fashion as we have done before:
Form detection theory [33] (see also Chap. 6), we know that the maximum a
posteriori probability (MAP) decision rule minimizes the decision error probability,
and the individually optimum decision rules can be formulated as:
We are more interested in the jointly optimum decision rule, formulated by:
b^1 ; b^2 ¼ argmax Prfðb1 ; b2 Þjr ðtÞg: ð10:131Þ
ðb1 ;b2 Þ2f1;þ1g2
For sufficiently high SNR, we would expect these two decision rules to agree. When
each of the possibilities for (b1,b2) are equally likely, the MAP decision rule
becomes the maximum likelihood (ML) decision rule:
b^1 ; b^2 ¼ argmax f ðr ðtÞÞ j ðb1 ; b2 Þ
ðb1 ;b2 Þ
ðT
1
2σ 2 ½r ðtÞ A1 b1 s1 ðtÞ A2 b2 s2 ðtÞ2 dt
¼ argmax e 0
ðb1 ;b2 Þ
ðT ð10:132Þ
1
¼ argmin 2 ½r ðtÞ A1 b1 s1 ðtÞ A2 b2 s2 ðtÞ2 dt
ðb1 ;b2 Þ 2σ
0
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
d2 ½rðtÞ;A1 b1 s1 ðtÞþA2 b2 s2 ðtÞ
E
1
¼ argmin 2 d2E ½r ðtÞ; A1 b1 s1 ðtÞ þ A2 b2 s2 ðtÞ:
ðb1 ;b2 Þ 2σ
10.3 Multiuser Detection 863
Therefore, when the variance is not known, the Euclidean distance receiver is
equivalent to ML decision rule for AWGN, which is consistent with Chap. 6.
Instead of using waveforms, it will be much more convenient to work with matched
filter (MF) outputs r1 and r2, representing projections of received signal r(t) onto
signatures s1(t) and s2(t), as illustrated in Fig. 10.23. The corresponding ML
decision rule will be now:
b^1 ; b^2 ¼ argmax Prfr 1 ; r 2 jðb1 ; b2 Þg
ðb1 ;b2 Þ
1
C1 ðrmÞ
¼ argmax e 2σ2 ðrmÞ
T
ð10:133Þ
ðb1 ;b2 Þ
¼ argmin ðr mÞ C1 ðr mÞ, T
ðb1 ;b2 Þ
where r ¼ [r1 r2]T, m ¼ [A1b1 + A2b2ρ A2b2 + A1b1ρ]T and C is the covariance
matrix:
1 ρ
C ¼ Covðr 1 ; r 2 Þ ¼ σ 2 :
ρ 1
ϕ1 ðtÞ ¼ s2 ðtÞ,
s2 ðtÞ ρs1 ðtÞ ð10:134Þ
ϕ2 ðtÞ ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffi :
1 ρ2
These new projections, denoted as ~r 1 ; ~r 2 , will have the mean and covariance as
follows:
þffiffiffiffiffiffiffiffiffiffiffiffiffi
A1 b 1 p A1 b 1 ρ
~
m¼ , ~ ¼ Cov ~r 1 ; ~r 2 ¼ σ 2 1
C
0
: ð10:135Þ
A2 b 2 1 ρ 2 0 1
Since the covariance matrix is diagonal, we can simplify the decision rule to:
b^1 ; b^2 ¼ argmin k~r m
~ k2 , ð10:137Þ
ðb1 ;b2 Þ
864 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
and with this decision rule, we can split the signal space into decision regions,
similarly like in K-hypothesis decision theory.
The following bounds for error probability for ML decision for two-user channel
have been derived in [5]:
8 0qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi19
<1
A21 þ A22 2A1 A2 jρj =
A1 1
max erfc pffiffiffi ; erfc@ pffiffiffi A Pe
:2 σ 2 4 σ 2 ;
0qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi1 ð10:138Þ
A21 þ A22 2A1 A2 jρj
1 A1 1 @ A:
Pe erfc p ffiffi
ffi þ erfc pffiffiffi
2 σ 2 4 σ 2
In Fig. 10.29, we plotted these probability of error ML bounds and compared them
against conventional receiver, assuming A2/A1 ¼ 1.5 and ρ ¼ 0.45. First of all, we
notice that these ML bounds agree very well. Second, the ML receiver significantly
outperforms the conventional receiver.
The ML decision rule (Eq. 10.137) can further be written as:
h 2 pffiffiffiffiffiffiffiffiffiffiffiffiffi2 i
b^1 ; b^2 ¼ argmin ~r 1 A1 b1 A2 b2 ρ þ ~r 2 A2 b2 1 ρ2
ðb1 ;b2 Þ
pffiffiffiffiffiffiffiffiffiffiffiffiffi
¼ argmax ~r 1 A1 b1 þ ~r 1 A2 b2 ρ þ ~r 2 A2 b2 1 ρ2 A1 b1 A2 b2 ρ :
ðb1 ;b2 Þ
ð10:139Þ
-1
10
-2
10
Probability of error, Pe
-3
10
-4
10
-5
10
ρ=0.45, A2/A1=1.5:
-6 Conventional
10
ML lower-bound
ML upper-bound
-7
10
0 2 4 6 8 10 12 14 16
Signal-to-noise ratio, A1/σ [dB]
Fig. 10.29 Probability of error in a two-user channel for ML against conventional receiver for
A2/A1 ¼ 1.5 and ρ ¼ 0.25
10.3 Multiuser Detection 865
From Eq. 10.134, we have the following relationship between new and old
coordinates:
pffiffiffiffiffiffiffiffiffiffiffiffiffi
~r 1 ¼ r 1 , ~r 2 ¼ ðr 2 ρr 1 Þ= 1 ρ2 , ð10:140Þ
It has been shown in [5] that this expression can be expressed equivalently as:
1 1
b^1 ¼ sgn r 1 A1 þ jr 2 A2 A1 A2 ρj jr 2 A2 þ A1 A2 ρj
2 2
ð10:142Þ
^ 1 1
b 2 ¼ sgn r 2 A2 þ jr 1 A1 A1 A2 ρj jr 1 A1 þ A1 A2 ρj ,
2 2
Assuming that all 2K possibilities are equally likely, the MAP detector becomes ML
one. Similar to Eq. 10.132, the ML decision rule for K-user case can be written as:
T r1 r1A1 bˆ1
∫ ( ) dt
0 t=T
r(t) Decision
A1 circuit
s1(t) |⋅|
−
T r2
r2A2
∫ ( ) dt
0 t=T
A1A2ρ
−
s2(t) A2 1/2
|⋅|
Fig. 10.30 Implementation of jointly optimum multiuser detector for user 1 in a two-user system
866 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
ðT
1
2σ 2 ½r ðtÞ A1 b1 s1 ðtÞ A2 b2 s2 ðtÞ AK bK sK ðtÞ2 dt
b^ ¼ argmax e 0
b
ðT " X
K
#2
¼ argmin r ðt Þ Ak bk sk ðtÞ dt ð10:144Þ
b k¼1
0
X
K K X
X K
¼ argmax 2 A k bk Ak bk Am bm ρkm :
b k¼1 k¼1 m¼1
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
L K ð bÞ
we can rewrite the last line in Eq. 10.144 in matrix form as follows:
Assuming that covariance matrix R is invertible, we can multiply Eq. 10.146 by R-1
from the left side to obtain:
R1 r ¼ R 1
|fflffl{zfflR
1 1
ffl} A b þ R z¼A b þ R z, ð10:147Þ
I
10.3 Multiuser Detection 867
we conclude that multiuser interference is compensated for, and the decision can be
made by simply looking for the signs of R1r as follows:
b^k ¼sign R1 r k ; k ¼ 1, , K; ð10:148Þ
where we used the notation ()k to denote the k-th element of the vector. Clearly, in
the absence of noise, b^k ¼signðAbÞk ¼ bk , Ak > 0, providing that amplitudes are
nonnegative. In the presence of noise, from equalization (Chap. 6) and spatial
interference cancelation in MIMO systems (Chap. 8), we know that noise process
described by R1z gets enhanced. The configuration of decorrelating detector for
synchronous CDMA system is provided in Fig. 10.31. The covariance matrix
inversion can be computationally intensive for large number of users. Two inter-
esting properties of decorrelating receiver are the following: (i) the knowledge of
amplitudes Ak is not needed, as evident from Eq. 10.148, and (ii) the demodulation
process can be parallelized by operating with transformed set of basis functions in
bank of decelerators (matched filters). Namely, the k-th element of R1r can be
rewritten as:
* +
X
K X
K
1
R r k¼ R1 km r m ¼ 1
R sm jr
|{z} km |{z}
m¼1 m¼1
hsm jr i ~s k
ð10:149Þ
X
K
¼ h~s k jr i, ~s k ¼ R1 km sm :
m¼1
T r1 bˆ1
∫ ( ) dt
0 t=T
…
…
…
s1(t)
…
r(t) T
rk bˆ k
∫ ( ) dt
0 t=T
R−1
…
…
sk(t)
…
T rK bˆ K
∫ ( ) dt
0 t=T
Bank of correlators
sK(t) (matched fitters) Bank of decision
(threshold) circuits
T bˆ1
∫ ( ) dt
0 t=T
s1 ( t )
…
…
…
…
r(t) T bˆ k
∫ ( ) dt
0 t=T
…
…
…
sk ( t )
…
T bˆ K
∫ ( ) dt
0 t=T
Modified bank of
sK ( t ) correlators Bank of decision
(threshold) circuits
Fig. 10.32 Modified correlator bank-based decorrelating detector for synchronous CDMA
systems
Clearly by using the set f~s k g instead of {sk} to implement the bank of correlators,
we can greatly simplify the receiver architecture, as shown in Fig. 10.32. As long as
the set of signals {sk} is linearly independent, the decorrelating set is a unique one.
The new signal set has a unit dot product with the original signal set since:
ðT X
K
h~s k jsk i ¼ R1 s ðtÞsk ðtÞdt
km m
¼ R1 R kk ¼ 1: ð10:150Þ
m¼1
0
However, when the crosscorrelations are not known a priori, due to channel
distortion, we would need to generate them locally on the receiver side as well as
to calculate elements of R1.
The decorrelating linear transformation can be related to the whitening matched
filter approach. Namely, we can perform the Cholesky factorization R ¼ FTF, and
apply an approach similar to Eq. 10.96, with additional details provided in [5].
We mentioned earlier that the decorrelation receiver does not require the
knowledge of amplitudes. Assuming equal probable transmission, the ML decision
will be:
10.3 Multiuser Detection 869
^A
b; ^ ¼ argmax f ðrjb; AÞ
ML
ðb;AÞ
¼ argmin kr RAbk2 ¼ argmin ðr RAbÞT ðr RAbÞ
ðb;AÞ ðb;AÞ
ð10:151Þ
¼ argmax ðRAbÞT r þ rT ðRAbÞ ðRAbÞT RAb
ðb;AÞ
¼ argmax ðRAbÞT ðr RAbÞ þ rT ðRAbÞ,
ðb;AÞ
Since Eqs. 10.153 and 10.155 represent the left and right sides of Eq. 10.153, by
equating them, we obtain:
AR¼W RA2 Rþσ 2 R , ð10:156Þ
and by multiplying Eq. 10.156 by R1 from the right, we arrive at:
A¼W RA2 þσ 2 I : ð10:157Þ
and the optimal joint linear MMSE multiuser detector performs the following
operations:
1
b~ ¼ Woptimum r ¼ A RA2 þσ 2 I r: ð10:159Þ
The sign of b^k will not be affected if we factor out matrix A ¼ diag(A1,. . .,AK), since
attenuation coefficients are nonnegative, so that the final decision for the k-th user is
made according to:
10.3 Multiuser Detection 871
T r1 bˆ1
∫ ( ) dt
0 t=T
…
…
…
s1(t)
r(t) … T
rk bˆ k
∫ ( ) dt
0 t=T
[R+σA−2] −1
…
…
…
sk(t)
…
T rK bˆ K
∫ ( ) dt
0 t=T
Bank of correlators
sK(t) (matched fitters) Bank of decision
(threshold) circuits
Fig. 10.33 The linear MMSE multiuser detector for synchronous CDMA systems
nh 1 i o
b^k ¼ sign Rþσ 2 A2 r ; k ¼ 1, , K: ð10:161Þ
k
and we do not require anymore the covariance matrix to be nonsingular. When the
variance tends to zero, the decision reduces to:
n o
b^k ! sign R1 r k ,
σ 2 !0
and we can say that MMSE detector becomes decorrelating detector, when noise
variance tends to zero (or equivalently SNR tends to plus infinity).
The linear MMSE multiuser detector has certain similarities with linear MMSE
interface described in Sect. 8.2.6 (in Chap. 8). By denoting RA as H, our DT
synchronous CDMA model becomes MIMO model r ¼ Hb + z, wherein the channel
matrix is quadratic and of full rank. Therefore, different MIMO techniques, but of
lower complexity, are applicable here as well. Moreover, the iterative interface
described in Sect. 8.2.7.4, in which spatial interference is canceled in an iterative
fashion, is also applicable here.
872 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
Nonlinear multiuser detection scheme can employ decisions on bits from other users,
to estimate the interference and remove it from the received signal [5, 43–53]. Both
tentative and final decision on other users’ bits may be employed. These decision-
driven multiuser detectors can be classified into several categories [5, 43–53]:
(i) successive cancelation schemes [45–47], (ii) multistage detection [48, 51], (iii)
continuous-time tentative decoding [5], and (iv) decision-feedback multiuser detec-
tion schemes [52, 53]. The first two schemes will be briefly described here.
In successive cancelation scheme, the symbol of a given user is detected by
observing the signals for other users as noise. Such obtained decision is then used to
re-modulate the signal from that user and subtract it from the received signal. This
procedure is repeated in an iterative fashion until the transmitted bits from all users
are demodulated. Before the successive cancelation takes place, the users are
arranged with the decreased average*ðenergies at the outputs of matched filters for
T 2 + X
synchronous CDMA defined as r ðtÞsk ðtÞdt ¼ σ 2 þ A2k þ A2 ρ 2 :
m6¼k m mk
0
However, this is not the best strategy since the crosscorrelation is not taken into
account. As an illustration, let us observe two-user synchronous successive cancel-
ation scheme, employing conventional correlators (matched filters), with
corresponding scheme being provided in Fig. 10.34. Assuming that r 22 is higher,
we first make a decision on b2 by:
We used this decision to estimate the cross talk originating from user 2 by:
and after subtracting the cross talk from user 2, we perform match filtering for user
1 and perform decision by:
rˆ ( t ) T
r1 bˆ1
∫ ( ) dt
0 t=T
−
s1(t)
A2
r(t) T
r2
∫ ( ) dt
0 t=T bˆ 2
s2(t)
T
r2
∫ ( ) dt
0 t=T bˆ 2
8T 9
<ð =
b^1 ¼ sign r ðtÞ A2 b^2 s2 ðtÞ s1 ðtÞdt
: ;
00
B
¼ sign@ r1 A2 b^2 ρÞ ¼ sign A1 b1 þ ρA2 b2 b^2 þ σ hs1 jzi ,
|{z} |{z}
A1 b1 þρA2 b2 þσ hs1 jzi signðr2 Þ
ð10:164Þ
T
r1
bˆ1
∫ ( ) dt
0 t=T
−
s1(t)
r(t) T
ρ A1
∫ ( ) dt A2
0 t=T
s2(t)
T
− bˆ 2
∫ ( ) dt
0 t=T r2
Successive cancelation
Bank of correlators stage
(matched fitters)
Fig. 10.36 A two-user synchronous two-stage detection scheme, with the first stage being
conventional receiver
T
r1
bˆ1
∫ ( ) dt −
t=T
dˆ 1
0
−
s1(t)
r(t) T
ρ −
ρ A1
∫ ( ) dt A2
0 t=T
−
s2(t)
dˆ 2
T
− bˆ 2
∫ ( ) dt
0 t=T
r2
Successive cancelation
Decorellating detector stage
Fig. 10.37 A two-user synchronous two-stage detection scheme, with the first stage being the
decorrelating detector
These decisions are then used as tentative decisions used in the successive cancel-
ation stage, operating as described in Eq. 10.165, so that the corresponding deci-
sions in successive cancelation will be made now as:
( )
X
K
^
b k ¼ sign r k ^
Am ρmk d m : ð10:167Þ
m¼kþ1
For two-user case, the corresponding decisions are made based on:
In this section, we briefly describe various optical CDMA schemes [54–75]. Simi-
larly to wireless communications, optical CDMA allows users to share the same
bandwidth at the same time using the unique codes or signature sequences. Some
unique advantages of optical CDMA include [66–69] (i) privacy and inherent
security in transmission, (ii) simplified network control (no centralized network
control is required), (iii) scalability of network, (iv) multimedia application support,
and (v) provision for quality of service (QoS). Optical CDMA can be either direct
detection based [56–64] or coherent optical detection based [65]. The basic inten-
sity modulation/direct detection (IM/DD) optical CDMA scheme, suitable for LAN
applications, is provided in Fig. 10.38.
The optical source could either be laser diode or LED. The light beam gets
modulated by electro-optical modulator, which can be either electroabsorption
(EA) or Mach-Zehnder modulator (MZM). Different users get assigned unique
signature codes, typically referred to optical orthogonal codes (OOCs), which are
strictly speaking quasi-orthogonal. The OOCs must satisfy the following two
constrains [56–58, 66, 68, 69]: (i) each sequence (code) must be easily distinguish-
able from a shifted version of itself, and (ii) each code must be easily be distin-
guished from any other sequence in the OOC family (and possibly corresponding
shifted version as well). The OOC can be defined in either time domain, typically
called time-spreading encoding, or spectral (wavelength) domain, commonly
referred to as spectral-amplitude coding (SAC). Moreover, the frequency hopping
(coding) can also be employed, in a similar fashion as already employed in wireless
FH-CDMA systems. The scheme shown in Fig. 10.38 is suitable for both time-
spreading encoding, typically based on pulse laser, and SAC, wherein the optical
sources are LED. The corresponding OOCs are imposed optically in either time
domain or spectral domain. Independent signals are after time-domain/spectral-
domain encoding combined together with the help of N N optical coupler, such as
optical star coupler. On the receiver side, the signal for the intended user is decoded
and converted into electrical domain by photodetector.
user 1 coupler
Data
user N
X
v1
xn xnþm λa ; m ¼ 0, 1, , v 1 ð10:169Þ
n¼0
• Crosscorrelation constraint:
X
v1
xn ynþm λc ; m ¼ 0, 1, , v 1: ð10:170Þ
n¼0
The strict orthogonality would mean that λa ¼ λc ¼ 0; however, when sequences are
unipolar, the cardinality of set of unipolar sequences will be too small. In practice,
we typically require λa ¼ λc ¼ 1. There are different ways how to design OOCs
including algebraic constructions [58, 61], combinatorial constructions [66, 69],
and finite geometries [68], to mention a few. The weight of codewords in OOC does
not need to be of fixed weight; the variable weight can be used as a way to provide
different QoS values for different user types [71, 72]. To improve the cardinality of
OOCs, the two-dimensional (2-D) wavelength-time OOCs have been advocated in
[70, 73, 74]. The 2-D wavelength-time OOCs (m n, k, λa,λc) are 2-D unipolar
sequences, described as m n arrays, with weight k, and autocorrelation
and crosscorrelation constrains being λa and λc. For 2-D time-wavelength OOCs
{xi , j} and {yij}, the autocorrelation and crosscorrelation constrains are defined,
respectively, as [70, 73, 74]:
• Autocorrelation constraint:
X
m1 X
n1
k, l¼0
xi, j xi, ðjþlÞmodn ¼ ð10:171Þ
i¼0 j¼0
λa , 1 l n 1
• Crosscorrelation constraint:
X
m1 X
n1
xi, j yi, ðjþlÞmodn λc , 0 l n 1 ð10:172Þ
i¼0 j¼0
The incoherent optical CDMA systems can be categorized into three categories:
time-spreading encoding, spectral-amplitude coding, and wavelength hopping
optical CDMA systems. The generic time-spreading encoding scheme, together
10.4 Optical CDMA Systems 877
Pre-amp
...
Encoder/decoder:
...
...
...
Fig. 10.39 Generic time-spreading scheme together with a configuration of encoder/decoder
SAC
Spectral decoder
amplitude 1
encoder A(f)
Intensity Star 1:a Balanced Threshold
LED A(f) detector detector
modulator coupler coupler
Â(f)
a
Data
source
Fig. 10.40 Generic spectral amplitude coding (SAC) scheme with balanced optical detector
...
amplifiers (SOAs)
ODL1
SOA1
...
...
AWG
SOAn
Broadband
source
Broadband Intensity
source modulator
Threshold
detector
(b)
Data Pulse
source local
laser
Pre-amp
ODLi PSl
...
ODL1 PS1
(a)
CW
Data Spreading Despreading
source
local
sequence sequence
laser
Pre-amp
(b)
Fig. 10.43 Coherent optical detection CDMA systems: (a) pulse laser-based and (b) CW laser-
based schemes
880 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
The hybrid OFDM-CDMA systems [76–80] are trying to take advantages of both
OFDM and CDMA concepts, in particular in dealing with frequency-selective
fading and narrowband interference while at the same time supporting multiple
users. They can be categorized into three broad classes: (i) multicarrier CDMA
(MC-CDMA), (ii) OFDM-CDMA, and (iii) OFDM-CDMA-FH systems.
In multicarrier CDMA [79, 81–83], on transmitter side, shown in Fig. 10.44a, the
data sequence is coming in a serial fashion, in blocks of length P each, and after
serial-to-parallel (S/P) conversion, each bit (symbol) of the k-th user, say bkp, is
multiplied by a spreading sequence of the k-th user [sk1 ... skN] to obtain bkp[sk1 ...
skN]. Such frequency spread [bkp sk1 ... bkp skN] data is then used as the input of
inverse FFT (IFFT) block of OFDM subsystem. Clearly, the required number of
subcarriers is NP. The remaining steps on transmitter side are the same as described
in Chap. 8; this is why not full details of OFDM transmitter are provided here.
Clearly, the spreading is applied here in frequency domain rather than time domain
in DS-CDMA systems. Because of that, each user benefits from frequency diversity
since the same user bit (symbol) gets transmitted over multiple subcarriers. The
transmitted signal of the k-th user (k ¼ 1,. . .,K ) can be represented as:
ðMC-CDMAÞ
1 X
X P1 X
N 1
sk ðtÞ ¼ bkp skn pðt iT s Þej2π ðnPþpÞΔf ðtiT s Þ ,
i¼1 p¼0 n¼0
( ð10:173Þ
1, TG t < Ts TG
pðtÞ ¼
0, otherwise
10.5 Hybrid OFDM-CDMA Systems 881
Data stream,
User 1 MC-CDMA transmitter
user 1
...
...
sk1
bk1
sk2
...
...
Serial-to- Guard
...
...
cos(ωct)
...
...
...
Data stream,
User K MC-CDMA transmitter
user K
(a)
User k MC-CDMA receiver
Despreading
...
w1sk1
bˆ k 1
w2sk2
...
...
bˆ k p
...
removal
w2skN
...
...
bˆ k P cos(ωct)
...
(b)
Fig. 10.44 Generic K-user MC-CDMA system: (a) transmitter configuration and (b) k-th user
receiver configuration
1 X
X P1 X
N 1
r ðMC-CDMAÞ ðtÞ ¼
i¼1 p¼0 n¼0
X
K
H ðnpkÞ bkp skn pðt iT s Þej2πðnPþpÞΔf ðtiT s Þ þ zðtÞ, ð10:175Þ
k¼1
882 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
where H ðnpkÞ is the channel coefficient corresponding to the (nP + p)-th subcarrier of
the k-th user and z(t) is the noise process. The configuration of the k-th user receiver
is shown in Fig. 10.44b. After the down-conversion and analog-to-digital conver-
sion (DAC), we perform timing recovery and frequency synchronization (not
shown in figure), followed by cyclic extension removal. We further perform S/P
conversion, followed by FFT. The next step is to perform dispreading together with
a proper weighting, according to some of diversity schemes, such as maximum ratio
combining or MMMSE combining.
The generic hybrid OFDM-CDMA-FH scheme [76–78, 80] is provided in
Fig. 10.45. The transmitter, shown in Fig. 10.45a, is composed of four stages:
(i) data modulation stage, (ii) DS-CDMA stage, (iii) OFDM stage, and (iv) FH
stage. When FH stage gets replaced with up-converter, the corresponding scheme
can be called hybrid OFDM-CDMA scheme. On the other hand, when DS-CDMA
stage is omitted, the corresponding system will be hybrid OFDM-FH scheme. The
binary input sequence gets first encoded using one of the following alternatives:
(1) convolutional code, (2) concatenated convolutional-RS code, (3) turbo code, or
(4) LDPC code. The interleaver is employed to randomize the burst errors due to the
deep fades on some subcarriers. After that the I/Q modulator is used followed by
QAM mapper. After that the scrambling is used, typically based on PN sequences.
After that the spreading is achieved by multiplying the scrambled signal with a
spreading sequence.
The PN sequence is not suitable for spreading since the scheme needs to be
combined with OFDM, and the period is not sufficient to ensure good autocorrela-
tion and crosscorrelation properties. Instead, the Walsh sequences should be used.
After that, the spread signal is used as the input to the OFDM transmitter, which
starts with pilot insertion, which is used on the receiver side for channel estimation
to compensate for channel impairments as well as for synchronization purposes.
Further, after pilot insertion, we perform S/P conversion, IFFT, P/S conversion, and
guard interval insertion, followed by DAC. In FH stage, the frequency synthesizer,
which is phase-locked to the carrier frequency oscillator in RF Tx, changes the
frequency according to the FH code. The FH codes, described in Sect. 10.1.3, are
applicable here as well.
The steps in the receiver are in reverse order compared to the transmitter.
Receiver also has four stages: the FH stage, OFDM Rx, DS-CDMA Rx, and data
demodulation stage. Additional details about this scheme as well as its performance
comparison against MC-CDMA can be found in [80].
DS-CDMA Spreading
Data modulation stage stage sequence user k
Guard
P/S S/P Pilot
DAC interval IFFT
conv. conv. insertion
insertion
OFDM Tx stage
Tx antenna
RF Tx
FH
stage
Frequency
synthesizer
PN code
generator
(a)
DS-CDMA Despreading
Data demodulation stage stage sequence user k
Guard
S/P P/S Channel
ADC Synch. interval FFT
conv. conv. correction
removal
OFDM Rx stage
Symbol timing
Rx antenna
RF Rx
FH
stage
Frequency
synthesizer
PN code
generator
(b)
Fig. 10.45 Generic hybrid OFDM-CDMA-FH scheme related to the k-th user: (a) transmitter and
(b) receiver configurations
1.99 GHz
−50
For indoor
UWB
−60
communications
−70
Fig. 10.46 The spectral mask for UWB communications as mandated by FCC
can support high data rates at short range (up to 10 m or so) with limited interfer-
ence to other wired devices. The UWB technologies can be classified into two broad
categories: (i) impulse radio UWB (IR-UWB), typically DS-CDMA-based, and
(ii) multiband OFDM (MB-OFDM). The spectral mask for UWB communications,
as regulated by FCC 15.517(b, c), is provided in Fig. 10.46.
Two popular pulse shapes used in IR-UWB communications are Gaussian
monocycle and doublet, which are derived as the first and second derivative of
Gaussian pulse g1(t) ¼ C1 exp[(t/τ)2], as follows:
h i
h i
2t 2 2t2
g2 ðtÞ ¼ C2 2 exp ðt=τÞ2 , g3 ðtÞ ¼ C3 2 1 exp ðt=τÞ2 :
τ τ τ
ð10:176Þ
In order to occupy the whole UWB spectrum, ranging from 3.1 to 10.6 GHz, the
pulse duration should be in the order of hundreds of ps. Different modulation
schemes suitable for use in IR-UWB communications can further be classified in
two broad categories, as illustrated in Fig. 10.47: (i) time-domain-based schemes
such as pulse position modulation (PPM) and pulse duration modulation (PDM) and
(ii) shape-based schemes such as bi-phase modulation (BPM) or BPSK, pulse-
amplitude modulation (PAM), on-off keying (OOK), and orthogonal pulse modu-
lation (OPM).
The signal constellation for M-ary PPM, where M is the signal constellation size,
can be represented by the signal set {si ¼ p(t-τi)} (i ¼ 1,. . .,M ), where τi is delay
parameter related to the i-th signal constellation point and p(t) is the pulse shape.
The signal constellation for BPM (or BPSK) is represented by the following binary
signal set {si ¼ bip(t)} (i ¼ 1,2; bi2{1,1}). The signal constellation for OOK is
10.6 Ultra-Wideband (UWB) Communications 885
Pulse position Pulse duration Bi-phase Pulse amplitude On-off keying Orthogonal pulse
modulation (PPM) modulation (PDM) modulation (BPM) modulation (PAM) (OOK) modulation (OPM)
represented by the signal set {si ¼ bip(t)} (i ¼ 1,2; bi2{0,1}). Finally, the signal
constellation for M-ary OPM is represented by the signal set {pi(t)} (i ¼ 1,. . .,M ),
wherein the waveforms pi(t) are mutually orthogonal. As an illustration, the mod-
ified Hermite polynomials are mutually orthogonal and can be used as symbols for
M-OPM as follows [84, 85]:
2 2 ½n=2
X
=4τ2 2 d
n
1 i ðt=τÞn2i
hn ðtÞ ¼ kn et t =2τ t2 =4τ2 2
2
τ e ¼ k n e τ , ð10:177Þ
dtn i¼0
2 ðn 2iÞ!i!
1 d n 2 n
Pn ð x Þ ¼ n n x 1 , x ¼ t=τ, ð10:178Þ
2 n! dx
where τ is the scaling factor. It is trivial to show that the 0-th and the first terms are
P0(x) ¼ 1 and P1(x) ¼ x. The higher-order terms can be obtained by applying the
following recurrent relation:
ð1
1
Pn ðxÞPm ðxÞdx ¼ δnm : ð10:180Þ
2n þ 1
1
Tð
s =2
sin Ωðt uÞ
Ψ n ð uÞ du ¼ ηn Ψ n ðtÞ, ηn 2 ð0; 1 ð10:181Þ
π ð t uÞ
T s =2
where the coefficient ηn is related to the energy concentration in the interval [-Ts/2,
Ts/2], and it is defined by:
TÐs =2
Ψ n ðtÞdt
T s =2
ηn ¼ Ð
1 : ð10:182Þ
Ψ n ðtÞdt
1
Tð
s =2 ð
1
and as such these functions are ideal for both UWB [85] and optical telecommu-
nication [97] applications. The second orthogonality condition indicates that these
systems are more tolerant to intersymbol interference (ISI), since they stay orthog-
onal outside of symbol duration. The following unique properties make OPSWFs
ideal for UWB and optical communications [85, 97]: the pulse duration is indepen-
dent on index n; the pulse bandwidth does not change much with index n; they
satisfy orthogonality and double-orthogonality principles; for sufficiently large
index n, the DC component tends to zero; and the pulse duration and bandwidth
occupied can be tuned simultaneously.
Similarly to CDMA systems, to each user in UWB communications, we allocate
a unique PN sequence of length N that is used to encode the pulses in either position
(PPM) or polarity (BPM). Let the PN sequence be denoted by {s}, while binary
sequence by {b}. Then the PPM-based UWB signal can be represented as:
10.6 Ultra-Wideband (UWB) Communications 887
1 X
X N 1
sPPM-UWB ðtÞ ¼ A pðt iNT s nT s cn T c τbi Þ, ð10:184Þ
i¼1 n¼0
where Ts is the symbol duration, while Tc is the chip duration. With p(t), we denoted
the arbitrary pulse shape, with some of the pulse shapes being discussed already.
Clearly, for PPM-based UWB communication, the PN sequence modulates the
positions in increments/decrements of multiple of Tc, while the information bit bm
introduces additional time shift bmτ. In BPM (BPSK)-based UWB communications,
the corresponding UWB signal can be represented as:
1 X
X N 1
sBPM-UWB ðtÞ ¼ A bi cn pðt iNT s nT s Þ, bi 2 f1; 1g, ð10:185Þ
i¼1 n¼0
X
N 1 X
N 1
s0 ðtÞ ¼ pðt nT s cn T c þ τÞ, s1 ðtÞ ¼ pðt nT s cn T c τÞ: ð10:186Þ
n¼0 n¼0
On the other hand, for BPM-based UWB system, the signal corresponding to
symbols 0 and 1 is given by:
Rx
AGC
(1+1)Tb bˆi
ADC ∫ ( ) dt
iTb t=iT
LNA s1(t)− s0(t)
Synchronization,
control
DAC
Fig. 10.48 A typical UWB receiver configuration. LNA low-noise amplifier, AGC automatic gain
control, ADC analog-to-digital conversion, DAC digital-to-analog converter
888 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
X
N 1
s1 ðtÞ ¼ cn pðt nT s Þ, s0 ðtÞ ¼ s1 ðtÞ: ð10:187Þ
n¼0
Regarding the UWB channel models suitable for indoor applications, the model
due to Saleh and Valenzuela [94] has been adopted in IEEE 802.15.3a. According
to Saleh-Valenzuela model, the multipath components arrive in clusters, while each
cluster is composed of several multipath rays. Clearly, the model has similarities
with wideband multipath channel model described in Chap. 2. The impulse
response can be represented as:
XX
hðtÞ ¼ c
a δðt τc τc, r Þ,
r c, r
ð10:188Þ
where ac,r is normalized multipath gain related to the ray r within the cluster c. In
Eq. 10.188, τc denotes the arrival time of the first ray within the cluster c, while τc,r
denotes the arrival time of the ray r within the cluster c. The magnitude distribution
in IEEE 802.15.3a has been assumed to be log-normal. The arrival time of the c-th
cluster τc, given τc-1, follows the exponential distribution:
where Λ is the cluster arrival rate. On the other hand, the arrival time of the r-th ray
within the c-th cluster follows as well the exponential distribution:
where now λ is the arrival rate of the rays within the cluster. The power delay profile
(PDP) is defined by double-negative exponential decaying functions:
τc τ c, r
Pc, r ¼ P0, 0 e Γ e γ , ð10:191Þ
where Γ and γ denote the cluster and ray time decay constants, respectively. For
additional details of this model, an interested reader is referred to [85, 94].
The multiband modulation represents an approach to modulate information in
UWB systems, by splitting the 7.5 GHz band into multiple smaller frequency bands.
The key idea is to efficiently utilize UWB spectrum by simultaneously transmitting
multiple UWB signals. This is applicable to both pulsed multiband and OFDM. To
deal with multipath effects, mentioned above, in IR-UWB we can use the RAKE
receiver, described in Sect. 10.1.2.3. On the other hand, in MB-OFDM, to deal with
multipath effects, we can use approaches described in Chap. 7.
The MB-OFDM system can be interpreted as a form of hybrid OFDM-FH
system, similar to the one described in the previous section, when the DS-CDMA
section is omitted. The key idea of MB-OFDM is to “spread” the information bits
across whole UWB spectrum, exploiting, therefore, frequency diversity and
10.6 Ultra-Wideband (UWB) Communications 889
Band Band Band Band Band Band Band Band Band Band Band Band Band Band
#1 #2 #3 #4 #5 #6 #7 #8 # 9 # 10 # 11 # 12 # 13 # 14
3432 3960 4488 5016 5544 6072 6600 7128 7656 8184 8712 9240 9768 10296 f [MHz]
OFDM Tx
Tx antenna
RF Tx
exp(j2πfc)
Time-frequency
coding
transmitted on band 1, the second OFDM symbol on band 2, the third OFDM
symbol on band 3, the fourth OFDM symbol on band 1, the firth OFDM symbol on
band 2, and the sixth OFDM symbol on band 3; and this sequence of bands within
the band group is repeated until the TFC is changed in time-frequency coding block.
The FH codes described in Sect. 10.1.3 can be also used as TFC codes in MB-
OFDM-based UWB communications. The binary data bits are scrambled, and then
encoded employing a convolutional code of rate 1/3, with constraint length K ¼ 7,
and generating polynomials g0 ¼ 1338, g1 ¼ 1658, and g2 ¼ 1718 (the subscript
denotes octal number system) [93]. Higher rate convolutional codes (of rate 11/32,
1/2, 5/8, and 3/4) can be obtained by puncturing. The number of subcarriers used in
MB-OFDM is 128, 100 of which are used to transmit QPSK data, 12 are pilots, and
10 are guard tones (the remained subcarriers are set to zero). The pilots are used for
channel estimation and carrier-phase tracking on the receiver side. To improve
performance of MB-OFDM scheme, LDPC-coded MB-OFDM can be used instead.
It has been shown in [92, 93] that the transmission distance over wireless channel of
LDPC-coded MB-OFDM can be increased by 29–73% compared to that of
MB-OFDM with convolutional codes. After pilot insertion and serial-to-parallel
conversion (S/P), inverse FFT (IFFT) operation, and parallel-to-serial (P/S) con-
version, cyclic extension and windowing are performed. After DAC and time-
frequency coding, the RF signal is transmitted over transmit (Tx) antenna. The
transmitted MB-OFDM-based UWB signal can be written as:
( )
X
N1 h i
sMB-OFDM-UWB ðtÞ ¼ Re sOFDM, n ðt nT OFDM Þexp j2πf ðn mod 6Þ t ,
n¼0
ð10:192Þ
where N is the number of OFDM symbols transmitted, while sOFDM, n(t) denotes the
n-th OFDM symbol of duration TOFDM transmitted on carrier frequency f n mod 6. As
discussed above, the carrier frequency changes over three frequencies assigned to
the band group, organized in sequences of length 6 (TFCs). The n-th OFDM symbol
is generated in a similar fashion as we described in Chap. 7.
The receiver configuration, shown in Fig. 10.51, is very similar to conventional
OFDM receiver (Fig. 7.6b), except from preselect filter that is used to select OFDM
signal of 528 MHz bandwidth at a given carrier frequency.
One of the important issues related to the UWB communications is the coexis-
tence of other wireless communication systems and the narrowband interference
(NBI) influence on UWB system performance. Even though that NBI bandwidth is
low compared to UWB signal bandwidth, the power of NBI is significantly higher
in that frequency band. To deal with multipath effects, we can use the RAKE
receiver, shown in Fig. 10.9, where different outputs of correlators are properly
weighted with weight vector w, so that the decision statistics will be based on the
following:
10.6 Ultra-Wideband (UWB) Communications 891
cos(ωct)
AGC
VGA Timing
Pre-select
filter LNA LPF ADC
Timing and Remove
frequency cyclic
synchronization extension
LPF ADC
Frequency-
sin(ωct) corrected signal
OFDM Rx
Output
QAM Channel
Descrambler Decoding Deinterleaver P/S FFT S/P
data de-mapping correction
w{ r, r ¼ s þ i þ z ð10:193Þ
where s is the desired signal vector, i the interference vector, and z is the noise
vector. The receiver output signal-to-interference-plus-noise ratio, denoted by
SINR, when NBI is ignored, by using maximum ratio combining (MRC) is given
by [85]:
N s Es
hh{
SINRMRC ¼ {
; Ri ¼ ii{ , Rz ¼ zz{ , ð10:194Þ
h ðRi þ Rz Þh
where Es is the symbol of energy, h is the channel fading coefficients, and Ns is the
number of bits per symbol. (Ri and Rz denote the covariance matrices of interfer-
ence and noise, respectively.) In MRC, however, the influence of interference is
ignored, representing suboptimum solution. The optimum weighting must be deter-
mined by minimizing the MSE, to obtain the following optimum weight vector for
the minimum MSE combiner (MMSEC) [85]:
N s Es ðRi þ Rz Þ1 h
w¼ , ð10:195Þ
1 þ N s Es h{ ðRi þ Rz Þ1 h
It has been shown in [85] that MRC results in significant performance degradation
compared to MMSEC, because it ignores the presence of NBI (due to WLAN
device).
Another effective, but low-complexity, approach to deal with NBI is to use the
notch filter of bandwidth B with transfer function [85]:
892 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
where fi is the center frequency of the NBI and u(x) is the unit-step function. The
corresponding impulse response is obtained as inverse Fourier transform (FT) of H
( f ):
Another relevant issue for UWB communications is their short reach. To extend
the transmission distance, the radio-over-fiber (RoF) technologies can be used, as
described in [98].
attention being paid to the jointly optimum MUD. The complexity of jointly
optimum MUD might be prohibitively high for certain application, and for such
application, we have introduced decorrelating receiver in 10.3.3, which can com-
pensate for multiuser interference but enhances the noise effect. To solve for this
problem, the linear MMSE receiver has been introduced as well in the same section
capable of dealing simultaneously with both multiuser interference and noise
effects. In Subsect. 10.3.4, we have described the successive cancelation and
multistage detection schemes, taking either preliminary or final decisions from
other users in detection process.
In section on optical CDMA (OCDMA), Sect. 10.4, we have introduced both
incoherent and coherent optical detection-based OCDMA schemes. Regarding the
incoherent optical detection-based schemes, we first have described how to design
various unipolar signature sequences and optical orthogonal codes (OOC), followed
by the description of basic incoherent OCDMA schemes including time spreading,
spectral amplitude coding (SAC), and wavelength hopping (WH) schemes. Related
to coherent optical detection-based OCDMA systems, we have described both pulse
laser-based and CW laser-based OCDMA systems.
In Sect. 10.5, the hybrid OFDM-CDMA systems have been described, taking the
advantages of both OFDM and CDMA concepts into account, in particular in
dealing with frequency-selective fading and narrowband interference while at the
same time supporting multiple users. The following three classes of hybrid OFDM-
CDMA systems have been introduced: multicarrier CDMA (MC-CDMA), OFDM-
CDMA, and OFDM-CDMA-FH systems.
In section on UWB communications, Sect. 10.6, we have described the concepts
and requirements for UWB communication as well as transmitter and receiver
configurations. In the same section, various modulation formats suitable for UWB
communications have been described. These have been categorized into time-
domain category (pulse-position nodulation and pulse-duration modulation) and
shape-based category (on-off keying, pulse-amplitude modulation, bi-phase mod-
ulation (BPM) or BPSK, and orthogonal pulse modulation). Regarding the pulse
shapes suitable for orthogonal pulse modulation (OPM), the modified Hermite
polynomials, Legendre polynomials, and orthogonal prolate spheroidal wave func-
tions (OPSWF) have been introduced. Further, the Saleh-Valenzuela UWB channel
model has been described, suitable for indoor applications. Both types of UWB
systems have been described in detail: the impulse radio UWB (IR-UWB), typically
DS-CDMA-based, and multiband OFDM (MB-OFDM).
References
1. Glisic S, Vucetic B (1997) Spread spectrum CDMA systems for wireless communications.
Artech House, Inc, Boston/London
2. Goldsmith A (2005) Wireless communications. Cambridge University Press, Cambridge, NY
3. Proakis JG (2001) Digital communications, 4th edn. McGraw-Hill, Boston
894 10 Spread Spectrum, CDMA, and Ultra-Wideband Communications
4. Haykin S (2014) Digital communication systems. John Wiley & Sons, Hoboken
5. Verdú S (1998) Multiuser detection. Cambridge University Press, Cambridge, NY
6. Pickholtz R, Schilling D, Milstein L (1982) Theory of spread-spectrum communications – a
tutorial. IEEE Trans Commun 30(5):855–884
7. Tse D, Viswanath P (2005) Fundamentals of wireless communication. Cambridge University
Press, Cambridge
8. Sklar B (2001) Digital communications: fundamentals and applications, 2nd edn. Prentice-
Hall, Inc., Upper Saddle River
9. Holmes JK, Chen CC (1977) Acquisition time performance of PN spread-spectrum systems.
IEEE Trans Commun COM-25(8):778–784
10. Simon MK, Omura JK, Scholtz RA, Levit BK (1985) Spread spectrum communications.
Computer Science Press, Inc., Rockville
11. Torrieri D (2015) Principles of spread-spectrum communication systems, 3rd edn. Springer
International Publishing, Switzerland
12. Ward RB (1965) Acquisition of pseudonoise signals by sequential estimation. IEEE Trans
Commun Technol COM-13(4):475–483
13. Price R, Green PE (1958) A communication technique for multipath channels. Proc IRE 46
(3):555–570
14. Turin GL (1980) Introduction to spread spectrum antimultipath techniques and their applica-
tion in urban digital radio. Proc IEEE 68(3):328–353
15. Sarwate DV, Pursley MB (1980) Crosscorrelation properties of pseudorandom and related
sequences. Proc IEEE 68(5):593–619
16. Golomb SW (2017) Shift register sequences: secure and limited-access code generators,
efficiency code generators, prescribed property generators, mathematical models, 3rd Revised
edn. World Scientific Publishing Co., Singapore
17. Drajic DB (2003) Introduction to statistical theory of telecommunications. Akademska Misao,
Belgrade. (In Serbian)
18. De Bruijn NG (1946) A combinatorial problem. Proc Koninklijke Nederlands Akademie wan
Wetenschappen 49(2):758–764
19. Good IJ (1946) Normal recurring decimals. J London Math Soc 21(3):169–172
20. Etzion T, Lempel A (1984) Algorithms for the generation of full-length shift-register
sequences. IEEE Trans Inform Theory IT-30(3):480–484
21. Seay TS (1982) Hopping patterns for bounded mutual interference in frequency hopping
multiple access. In: Proceedings of the IEEE military communications conference – progress
in spread spectrum communications (MILCOM ‘82), pp. 22.3–1–22.3-6, Boston
22. Lempel A, Greenberger H (1974) Families of sequences with optimal Hamming correlation
properties. IEEE Trans Inform Theory IT-20(1):90–94
23. Reed IS (1971) K-th order near-orthogonal codes. IEEE Trans Inform Theory IT-17
(1):116–117
24. Solomon G (1973) Optimal frequency hopping sequences for multiple access. Proc Symp
Spread Spectrum Commun 1:33–35
25. Popovic BM (1989) Comparative analysis of sequences for asynchronous code-division
multiplex with frequency hopping, Master Thesis, University of Belgrade, Serbian.
(in Serbian)
26. Shaar AA, Dvaiees PA (1984) A survey of one-coincidence sequences for frequency-hopped
spread-spectrum systems. IEEE Proc Commun Radar Signal Process Part F 131(7):719–724
27. Welch LR (1974) Lower bounds on the maximum cross correlation of signals (Corresp.) IEEE
Trans Inform Theory 20(3):397–399
28. Gold R (1967) Optimal binary sequences for spread spectrum multiplexing (Corresp.) IEEE
Trans Inform Theory 13(4):619–621
29. Gold R (1968) Maximal recursive sequences with 3-valued recursive cross-correlation func-
tions (Corresp.) IEEE Trans Inform Theory 14(1):154–156
30. Walsh JL (1923) A closed set of normal orthogonal functions. Amer J Math 45(1):5–24
References 895
58. Salehi JA, Chung FRK, Wei VK (1989) Optical orthogonal codes: design, analysis, and
applications. IEEE Trans Inform Theory 35(3):595–605
59. Petrovic R (1990) Orthogonal codes for CDMA optical fiber LAN’s with variable bit interval.
IEE Electron Lett 26(10):662–664
60. Maric SV (1993) A new family of optical code sequences for use in spread-spectrum fiber-
optic local area networks. IEEE Trans Commun 41(8):1217–1221
61. Maric SV (1993) New family of algebraically designed optical orthogonal codes for use in
CDMA fiber-optic networks. IEE Electron Lett 29(6):538–539
62. Yang G-C, Kwong WC (1995) Performance analysis of optical CDMA with prime codes. IEE
Electron Lett 31(7):569–570
63. Wei Z, Ghafouri-Shiraz H (2002) Proposal of a novel code for spectral amplitude-coding
optical CDMA systems. IEEE Photon Technol Lett 14:414–416
64. Yengnarayanan S, Bhushan AS, Jalali B (2000) Fast wavelength-hopping time-spreading
encoding/decoding for optical CDMA. IEEE Photon Technol Lett 12(5):573–575
65. Huang W, Nizam MHM, Andonovic I, Tur M (2000) Coherent optical CDMA (OCDMA)
systems used for high-capacity optical fiber networks-system description, OTDMA compari-
son, and OCDMA/WDMA networking. J Lightw Technol 18(6):765–778
66. Djordjevic IB, Vasic B (2003) Novel combinatorial constructions of optical orthogonal codes
for incoherent optical CDMA systems. J Lightw Technol 21(9):1869–1875
67. Djordjevic IB, Geraghty DF, Patil A, Chen CH, Kostuk R, Vasic B (2006) Demonstration of
spectral-amplitude encoding/decoding for multimedia optical CDMA applications. J Optic
Commun 27(2):121–124
68. Djordjevic IB, Vasic B (2003) Unipolar codes for spectral-amplitude-coding optical CDMA
systems based on projective geometries. IEEE Photon Technol Lett 15(9):1318–1320
69. Djordjevic IB, Vasic B (2004) Combinatorial constructions of optical orthogonal codes for
OCDMA systems. IEEE Commun Lett 8(6):391–393
70. Patil A, Djordjevic IB, Geraghty DF (2005) Performance assessment of optical CDMA
systems based on wavelength-time codes from balanced incomplete block designs. In: Pro-
ceedings of the 7th international conference on telecommunications in modern satellite, cable
and broadcasting services-TELSIKS 2005, pp 295–298, 28–30 Sept 2005, Nis, Serbia and
Montenegro
71. Djordjevic IB, Vasic B, Rorison J (2004) Multi-weight unipolar codes for spectral-amplitude-
coding optical CDMA systems. IEEE Commun Lett 8(4):259–261
72. Djordjevic IB, Vasic B, Rorison J (2003) Design of multi-weight unipolar codes for multime-
dia optical CDMA applications based on pairwise balanced designs. IEEE/OSA J Lightw
Technol 21(9):1850–1856
73. Shivaleela ES, Sivarajan KN, Selvarajan A (1998) Design of a new family of two-dimensional
codes for fiber-optic CDMA networks. J Lightw Technol 16(4):501–508
74. Shivaleela ES, Selvarajan A, Srinivas T (2005) Two-dimensional optical orthogonal codes for
fiber-optic CDMA networks. J Lightw Technol 23(2):647–654
75. Tancevski L, Andonovic I, Budin J (1995) Secure optical network architectures utilizing
wavelength hopping/time spreading codes. IEEE Photon Technol Lett 7(5):573–575
76. Jankiraman M, Prasad R (1999) Hybrid CDMA/OFDM/SFH: a novel solution for wideband
multimedia communications. In: Proceedings of the 4th ACTS mobile communication summit
‘99, Sorento, pp 1–7
77. Jankiraman M, Prasad R (2000) A novel solution to wireless multimedia application: the
hybrid OFDM/CDMA/SFH approach, Proc. 11th IEEE International Symposium on Personal
Indoor and Mobile Radio Communications (PIMRC 2000), 2: 1368–1374, London
78. Jankiraman M, Prasad R (2000) Wireless multimedia application: the hybrid OFDM/CDMA/
SFH approach. In: Proceedings of the 2000 I.E. sixth international symposium on spread
spectrum techniques and applications (ISSTA 2000), 2: 387–393, Parsippany
79. Van Nee R, Prasad R (2000) OFDM wireless multimedia communications. Artech House,
Boston/London
References 897
80. Prasad R (2004) OFDM for wireless communications systems. Artech House, Boston/London
81. Yee N, Linnartz J-P, Fettweis G (1993) Multi-carrier CDMA in indoor wireless networks. In:
Proceedings of the fourth international symposium on personal, indoor and mobile radio
communications (PIMRC’93), pp. 109–113, Yokohama
82. Chouly A, Brajal A, Jourdan S (1993) Orthogonal multicarrier techniques applied to direct
sequence spread spectrum CDMA systems. In: Proceedings IEEE global telecommunications
conference 1993 (GLOBECOM ’93), including a communications theory mini-conference, vol
3, pp 1723–1728, Houston
83. Fazel K (1993) Performance of CDMA/OFDM for mobile communication system. In: Pro-
ceedings of the 2nd IEEE international conference on universal personal communications, vol
2, pp 975–979, Ottawa
84. Nikookar H, Prasad R (2009) Introduction to ultra wideband for wireless communications.
Springer Science & Business Media B.V, Dordrecht
85. Ghavami M, Michael LB, Kohno R (2007) Ultra wideband signals and systems in communi-
cation engineering. John Wiley & Sons Ltd, Chichester
86. Siwiak K, McKeown D (2004) Ultra-wideband radio technology. John Wiley & Sons Ltd,
Chichester
87. Nekoogar F (2005) Ultra-wideband communications: fundamentals and applications. Prentice
Hall Press, Upper Saddle River
88. Batra A, Balakrishnan J, Dabak A, Gharpurey R, Lin J, Fontaine P, Ho J-M, Lee S,
Frechette M, March S, Yamaguchi H (2004) Multi-band OFDM physical layer proposal for
IEEE 802.15 Task Group 3a, Doc. IEEE P802.15–03/268r3
89. Batra A, Balakrishnan J, Aiello GR, Foerster JR, Dabak A (2004) Design of a multiband
OFDM system for realistic UWB channel environments. IEEE Trans Microw Theory Tech 52
(9):2123–2138
90. Shin O-O, Ghazzemzadeh SS, Greenstein LJ, Tarokh V (2005) Performance evaluation of
MB-OFDM and DS-UWB systems for wireless personal area networks. In: Proceedings of the
2005 I.E. international conference on ultra-wideband, vol 1, pp 214–219, Zurich
91. Win MZ, Scholtz RA (2000) Ultra-wide bandwidth time-hopping spread-spectrum impulse
radio for wireless multiple–access communications. IEEE Trans Commun 48(4):679–691
92. Png K-B, Peng X, Chin F (2004) Performance studies of a multi-band OFDM system using a
simplified LDPC code. In: Proceedings of the 2004 international workshop on ultra wideband
systems & 2004 conference on ultrawideband systems and technologies (UWBST &
IWUWBS), vol 1, pp 376–380, Kyoto
93. Kim S-M, Tang J, Parhi KK (2005) Quasi-cyclic low-density parity-check coded multiband-
OFDM UWB systems. In: Proceedings of the 2005 I.E. international symposium on circuits
and systems, vol 1, pp 65–68, Kobe
94. Saleh AAM, Valenzuela R (1987) A statistical model for indoor multipath propagation. IEEE J
Select Areas Commun 5(2):128–137
95. Arfken GB, Weber HJ (2005) Mathematical methods for physicists, 6th edn. Elsevier/Aca-
demic Press, Amsterdam/Boston
96. Slepian D (1978) Prolate spheroidal wave functions, Fourier analysis and uncertainty V: the
discrete case. Bell Syst Tech J 57:1371–1430
97. Djordjevic IB (2013) On the irregular nonbinary QC-LDPC-coded hybrid multidimensional
OSCD-modulation enabling beyond 100 Tb/s optical transport. IEEE/OSA J Lightw Technol
31(16):2969–2975
98. Shieh W, Djordjevic I (2010) OFDM for optical communications. Elsevier/Academic, Amster-
dam/Boston
Appendix
This chapter is mostly devoted to the abstract algebra fundamentals [1–15], needed
in Chap. 9. Only the most important topics needed for better understanding of the
error correction are covered. The chapter is organized as follows: In Sect. A.1, we
introduce the concept of groups and provide their basic properties. In Sect. A.2, we
introduce the concept of fields, while in Sect. A.3 the concept of vector spaces.
Further, Sect. A.4 is devoted to algebra of finite fields, which is of high importance
in forward error correction. Sect. A.5 is related to the pulse-position modulation
(PPM), relevant in UWB communications and deep-space optical communications.
The fundamentals of the z-transform, needed in Chaps. 3 and 6, are provided in
Sect. A.6.
A.1 Groups
Definition D1 A group is the set G that together with an operation, denoted by “+”,
satisfies the following axioms:
1. Closure: 8 a, b 2G ) a + b 2G.
2. Associative law: 8 a, b, c 2G ) a + (b + c) ¼ (a + b) + c.
3. Identity element: ∃ e 2G such that a + e ¼ e + a ¼ a 8 a 2G.
4. Inverse element: ∃ a1 2G 8 a 2G, such that a + a1 ¼ a1 + a ¼ e.
We call a group Abelian or a commutative group, if the operation “+” is also
commutative: 8 a, b 2G ) a + b ¼ b + a.
Theorem T1 The identity element in a group is the unique one, and each element
in the group has a unique inverse element.
Proof. If the identity element e is not unique one, then there exists another one e’:
e’ ¼ e’ + e ¼ e, implying that e’ and e are identical. In order to show that a group
element a has a unique inverse a1, let us assume that it has another inverse element
a11: a11 ¼ a11 + e ¼ a11 + (a + a1) ¼ (a11 + a) + a1 ¼ e + a1 ¼ a1, thus
implying that the inverse element in the group is unique.
Examples:
• F2 ¼ {0,1} and “+” operation is in fact the modulo-2 addition, defined by
0 + 0 ¼ 0, 0 + 1 ¼ 1, 1 + 0 ¼ 1, and 1 + 1 ¼ 0. The closure property is satisfied,
0 is identity element, 0 and 1 are their own inverses, and operation “+” is
associative. The set F2 with modulo-2 addition forms, therefore, a group.
• The set of integers forms a group under the usual addition operation on which
0 is identity element, and for any integer n, n is its inverse.
• Consider the set of codewords of binary linear (N,K ) block code. Any two
codewords added per modulo-2 form another codeword (according to the defi-
nition of the linear block code). All-zeros codeword is identity element, and each
codeword is its own inverse. The associative property also holds. Therefore, the
all group properties are satisfied, and the set of codewords form a group, and this
is the reason why this is called the group code.
The number of elements in the group is typically called the order of the group. If
the group has a finite number of elements, it is called the finite group.
Definition D2 Let H be a subset of elements of group G. We call H subgroup of
G if the elements of H themselves form the group under the same operation as that
defined on elements from G.
In order to verify that the subset S is the subgroup, it is sufficient to check the
closure property and that an inverse element exists for every element of subgroup.
Theorem T2 (Lagrange’s Theorem) The order of a finite group is an integer
multiple of any of its subgroup order.
Example: Consider the set Y of N-tuples (received words on a receiver side of a
communication system), each element of the N-tuple being 0 or 1. It can easily be
verified that elements of Y forms a group under modulo-2 addition. Consider a
subset C of Y with elements being the codewords of a binary (N,K ) block code.
Then C forms a subgroup of Y, and the order of group Y is divisible by the order of
subgroup C.
There exist groups, whose all elements can be obtained as power of some
element, say a. Such a group G is called the cyclic group, and the corresponding
element a is called the generator of the group. The cyclic group can be denoted by
G ¼ <a >.
Example: Consider an element α of a finite group G. Let S be the set of elements
S ¼ {α, α2, α3,. . ., αi,. . .}. Because G is finite, S must be finite as well, and therefore,
not all powers of α are distinct. There must be some l, m (m > l ) such that αm ¼ αl so
that αm α-l ¼ αl αl ¼ 1. Let k be the smallest such power of α for which αk ¼ 1,
meaning that α, α2,. . ., αk are all distinct. We can verify now that set S ¼ {α, α2,. . .,
αk ¼ 1} is a subgroup of G. S contains the identity element, and for any element αi,
the element αki is its inverse. Given that any two elements αi, αj2S, the
corresponding element obtained as their product, αi+j 2S if i + j k. If i + j > k,
Appendix 901
then αi+j•1 ¼ αi+j• αk, and because i + jk k, the closure property is clearly
satisfied. S is, therefore, the subgroup of group G. Given the definition of cyclic
group, the subgroup S is also cyclic. The set of codewords of a cyclic (N,K ) block
code can be obtained as a cyclic subgroup of the group of all N-tuples.
Theorem T3 Let G be a group and {Hi|i2I} be a nonempty collection of subgroups
with index set I. The intersection \i2I Hi is a subgroup.
Definition D3 Let G be a group and X be a subset of G. Let {Hi|i2I} be the
collection of subgroups of G that contain X. Then the intersection \i2I Hi is called
the subgroup of G generated by X and is denoted by <X>.
Theorem T4 Let G be a group and X nonempty subset of G with elements {xi | i2I}
(I is the index set). The subgroup of G generated by X, <X>, consists of all finite
products of the xi. The xi elements are known as generators.
Definition D4 Let G be a group and H be a subgroup of G. For any element a2G,
the set aH ¼ {ah|h2H} is called the left coset of H in G. Similarly, the set Ha ¼ {ha|
h2H} is called the right coset of H in G.
Theorem T5 Let G be a group and H be a subgroup of G. The collection of right
cosets of H, Ha ¼ {ha|h2H}, forms a partition of G.
Instead of formal proof, we provide the following justification. Let us create the
following table. In the first row, we list all elements of subgroup H, beginning with
the identity element e. The second column is obtained by selecting an arbitrary
element from G, not used in the first row, as the leading element of the second row.
We then complete the second row by “multiplying” this element with all elements
of the first row from the right. Out of not previously used elements, we arbitrary
select an element as the leading element of the third row. We then complete the
third row by multiplying this element with all elements of the first row from the
right. We continue this procedure until exploit all elements from G. The resulting
table is as follows.
h1=e h2 … hm-1 hm
g2 h 2g 2 … hm-1g2 hm g2
g3 h 2g 3 … hm-1g3 hm g3
… … … … …
gn h 2g n … hm-1gn hm gn
The each row in this table represents a cosset, and the first element in each row is
a cosset leader. The number of cossets of H in G is in fact the number of rows, and it
is called the index of H in G, typically denoted by [G:H]. It follows from the table
above |H| ¼ m, [G:H] ¼ n, and |G| ¼ nm ¼ [G:H]|H|, which can be used as the proof
of Lagrange’s theorem. In other words, [G:H] ¼ |G|/|H|.
Definition D5 Let G be a group and H be a subgroup of G. H is normal subgroup of
G if it is invariant under conjugation, that is, 8 h2H and g2G, the element ghg1
2H.
902 Appendix
A.2 Fields
Definition D6 A field is a set of elements F with two operations, addition “+” and
multiplication “∙”, such that:
1. F is an Abelian group under addition operation, with 0 being the identity
element.
2. The nonzero elements of F form an Abelian group under the multiplication
operation, with 1 being the identity element.
3. The multiplication operation is distributive over the addition operation:
8a, b, c 2 F ) a ðb þ cÞ ¼ a b þ a c:
Examples:
• The set of real numbers, with operation + as ordinary addition and operation ∙ as
ordinary multiplication, satisfy above three properties, and it is therefore a field.
• The set consisting of two elements {0,1}, with modulo-2 multiplication and
addition, given in the table below, constitutes a field known as Galois field and is
denoted by GF(2).
• The set of integers modulo-p, with modulo-p addition and multiplication, forms
a field with p elements, denoted by GF( p), providing that p is a prime.
• For any q that is an integer power of prime number p (q ¼ pm, m – an integer),
there exists a field with q elements, denoted as GF(q). (The arithmetic is not
modulo-q arithmetic, except when m ¼ 1.) GF( pm) contains GF( p) as a subfield.
Addition and multiplication in GF(3) and GF(22) are defined as follows:
Appendix 903
+ 0 1 2 ∙ 0 1 2
0 0 1 2 0 0 0 0
1 1 2 0 1 0 1 2
2 2 0 1 2 0 2 1
+ 0 1 2 3 ∙ 0 1 2 3
0 0 1 2 3 0 0 0 0 0
1 1 0 3 2 1 0 1 2 3
2 2 3 0 1 2 0 2 3 1
3 3 2 1 0 3 0 3 1 2
Theorem T7 Let Zp denote the set of integers {0,1,. . .,p1}, with addition and
multiplication defined as ordinary addition and multiplication modulo-p. Then Zp is
a field if and only if p is a prime.
Definition D7 Let V be a set of elements with a binary operation “+” and let F be a
field. Further, let an operation “∙” be defined between the elements of V and the
elements of F. Then V is said to be a vector space over F if the following conditions
are satisfied 8 a, b 2 F and 8 x, y 2 V:
1. V is an Abelian group under the addition operation.
2. 8 a 2 F and 8 x 2 V, then a ∙ x 2 V.
3. Distributive law:
a ðx þ yÞ ¼ a x þ a y:
ða þ bÞ x ¼ a x þ b x:
4. Associative law:
ða bÞ x ¼ a ðb xÞ:
Examples:
• Consider the set V, whose elements are n-tuples of the form v ¼ (v0,v1,. . .,vn1),
vi 2F. Let us define the addition of any two n-tuples as another n-tuple obtained
by component-wise addition and multiplication of n-tuple by an element from F.
Then V forms vector space over F, and it is commonly denoted by Fn. If F ¼ R
(R – the field of real number), then Rn is called the Euclidean n-dimensional
space.
• The set of n-tuples whose elements are from GF(2), again with component-wise
addition and multiplication by an element from GF(2), forms a vector space over
GF(2).
• Consider the set V of polynomials whose coefficients are from GF(q). Addition
of two polynomials is the usual polynomial addition, addition being performed
in GF(q). Let the field F be GF(q). Scalar multiplication of a polynomial by a
field element from GF(q) corresponds to the multiplication of each polynomial
coefficient by the field element, carried out in GF(q). V is then a vector space
over GF(q).
Consider a set V that forms a vector space over a field F. Let v1,v2,. . .,vk be
vectors from V, and a1,a2,. . .,ak be field elements from F. The linear combination of
the vectors v1,v2,. . .,vk is defined by a1v1+ a2v2 + . . . + akvk.
The set of vectors {v1,v2,. . .,vk} is said to be linearly independent if there does
not exist a set of field elements a1,a2,. . .,ak, not all ai ¼ 0, such that a1v1+
a2v2 + . . . + akvk ¼ 0.
Example: The vectors (0 0 1), (0 1 0), and (1 0 0) (from F3) are linearly independent.
However, the vectors (0 0 2), (1 1 0), and (2 2 1) are linearly dependent over GF
(3) because they sum to zero vector.
Let V be a vector space and S be subset of the vectors in V. If S is itself a vector
space over F under the same vector addition and scalar multiplication operations
applicable to V and F, then S is said to a subspace of V.
Theorem T7 Let {v1,v2,. . .,vk} be a set of vectors from a vector space V over a
field F. Then the set consisting of all linear combinations of {v1,v2,. . .,vk} forms a
vector space over F and is, therefore, a subspace of V.
Example: Consider the vector space V over GF(2) given by the set {(0 0 0), (0 0 1),
(0 1 0), (0 1 1), (1 0 0), (1 0 1), (1 1 0), (1 1 1)}. The subset S ¼ {(0 0 0), (1 0 0), (0 1
0), (1 1 0)} is a subspace of V over GF(2).
Example: Consider the vector space V over GF(2) given by the set {(0 0 0), (0 0 1),
(0 1 0), (0 1 1), (1 0 0), (1 0 1), (1 1 0), (1 1 1)}. For the subset B ¼ {(0 1 0), (1 0 0)},
the set of all linear combinations is given by S ¼ {(0 0 0), (1 0 0), (0 1 0), (1 1 0)}
and forms a subspace of V over F. The set of vectors B is said to span S.
Definition D8 A basis of a vector space V is a set of linearly independent vectors
that spans the space. The number of vectors in a basis is called the dimension of the
vector space.
In the example above, the set {(0 0 1), (0 1 0), (1 0 0)} is the basis of vector space
V and has dimension 3.
Appendix 905
A ring is a set of elements R with two operations, addition “+” and multiplication
“∙”, such that (i) R is an Abelian group under addition operation, (ii) multiplication
operation is associative, and (iii) multiplication is associative over addition.
The quantity a is said to be congruent to b to modulus n, denoted as a b (mod
n), if a–b is divisible by n. If x a (mod n), then a is called a residue to x to modulus
n. A class of residues to modulus n is the class of all integers congruent to a given
residue (mod n), and every member of the class is called a representative of the
class. There are n classes, represented by (0), (1), (2),. . ., (n–1), and the represen-
tative of these classes are called a complete system of incongruent residues to
modulus n. If i and j are two members of a complete system of incongruent residues
to modulus n, then addition and multiplication between i and j are defined by
i + j ¼ (i + j)(mod n) and i∙j ¼ (i∙j)(mod n).
A complete system of residues (mod n) forms a commutative ring with unity
element. Let s be a nonzero element of these residues. Then s possesses inverse if
and only if n is prime, p. Therefore, if p is a prime, a complete system of residues
(mod p) forms a Galois (or finite) field and is denoted by GF( p).
Let P(x) be any given polynomial in x of degree m with coefficients belonging to
GF( p), and let F(x) be any polynomial in x with integral coefficients. Then F(x)
may be expressed as F(x) ¼ f(x) + p∙q(x) + P(x)∙Q(x), where f(x) ¼ a0 + a1x + a2x2
+ . . . + am–1xm–1, ai2GF( p).
This relationship may be written as F(x) f(x) mod {p,P(x)}, and we say that
f(x) is the residue of F(x) modulus p and P(x). If p and P(x) are kept fixed but f(x)
varied, pm classes may be formed, because each coefficient of f(x) may take p values
of GF( p). The classes defined by f(x) form a commutative ring, which will be a field
if and only if P(x) is irreducible over GF( p) (not divisible with any other polyno-
mial of degree m–1 or less).
The finite field formed by pm classes of residues is called a Galois field of order pm
and is denoted by GF( pm). The function P(x) is said to be minimum polynomial for
generating the elements of GF( pm) (the smallest degree polynomial over GF( p)
having a field element β2GF( pm) as a root). The nonzero elements of GF( pm) can be
represented as polynomials of degree at most m–1 or as powers of a primitive root α
such that:
m
1
αp ¼ 1, αd 6¼ 1 ðfor d dividing pm 1Þ:
A primitive element is a field element that generates all nonzero field elements as
its successive powers. A primitive polynomial is irreducible polynomial that has a
primitive element as its root.
Theorem T8 Two important properties of GF(q), q ¼ pm are;
The roots of polynomial xq11 are all nonzero elements of GF(q).
Let P(x) be an irreducible polynomial of degree m with coefficients from GF( p)
and β be a root from the extended field GF(q ¼ pm). Then all the m roots of P(x) are:
906 Appendix
2 m1
β, βp , βp , . . . , βp :
1, 0 t < 1
rectðtÞ ¼ :
0, otherwise
where {ak} represents a sequence of symbols being transmitted, while P denotes the
average power. The symbol error probability for equal probability of transmitted
symbols is given as [17]:
rffiffiffiffiffiffiffiffiffiffiffiffi
P M
Ps ’ ðM 1Þerfc ,
2 2Rs σ 2
Rb Rb Rb log2 M
S¼ ¼ ¼ ¼ ,
B 1=ðT s =MÞ MRs M
which is lower than efficiency of M-ary QAM. The low bandwidth efficiency of M-
ary PPM can be improved by multi-pulse PPM [19], where w (w > 1) out of
M possible time slots are used. The symbol interval Ts is now related to bit interval
Tb by:
M
T s ¼ T b log2 :
w
M
log2
Rb Rb Rb w
S¼ ¼ ¼ ¼ :
B 1=ðT s =MÞ M M
1= T b log2 =M
w
The z-transform plays the same role in discrete time (DT) systems as the Fourier
and Laplace transforms play in continuous time (CT) systems. It converts the
difference equations into algebraic ones in z-plane. By using the z-transform, the
convolution sum in time domain can be converted to product of z-transforms of
input and impulse response. This section is based on References [22–24].
X
1
Z fx ð nÞ g ¼ xðnÞzn ¼ XðzÞ:
n¼1
The set of values for which the summation above converges is called the region
of convergence (ROC). Generally speaking, the ROC is an annular region of the
entire complex plane defined by r1 < |z| < r2. Two important types of sequences are
left-handed and right-handed ones. A right-handed sequence is one for which x
(n) ¼ 0 for all n < n0, where n0 is a positive or negative finite integer. If n0 0, the
resulting sequence is causal or a positive-time sequence. A left-handed sequence is
one for which x(n) ¼ 0 for all n n0, where n0 is positive or negative finite integer.
If n0 0, the resulting sequence is anticausal or a negative-time sequence.
Appendix 909
X
N
xðnÞ ¼ ðai Þn uðnÞ:
i¼1
X
N
z
XðzÞ ¼ ,
i¼1
z ai
where the ROC of i-th term is given as the exterior of a circle with radius jaij:
Ri ¼ {z: jzj > jaij}. The overall ROC is obtained as intersection of ROCs Ri as:
N
ROC : R ¼ \ Ri ¼ fz : jzj > maxðjai jÞg:
i¼1
Suppose now that an anticausal sequence x(n) can be written as a sum of time-
shifted complex exponentials:
X
N
xðnÞ ¼ bin uðn 1Þ:
i¼1
X
N
z
XðzÞ ¼ ,
i¼1
z bi
where the ROC of i-th term is given as the interior of a circle of radius |bi|: Li ¼ {z: |
z| < |bi|}. The overall ROC is obtained as intersection of ROCs Ri by:
N
ROC : L ¼ \ Li ¼ fz : jzj < minðjbi jÞg:
i¼1
Finally, suppose now that a sequence x(n) contains both right- and left-handed
subsequences. Its ROC is determined by intersection of right- and left-handed
subsequences as follows:
min | bi |
max | ai | x
x x Re{z}
x x x
x Right-hand x
poles
x
Lef t-hand Lef t-hand
poles poles
ROC
where C is a closed path, while f(z) exists on and inside of C. If there are (k + 1)-th
order derivatives of f(z), for poles of multiplicity k that are enclosed by the contour
C, while f(z) does not have the poles outside C, then the following is valid:
8
þ < 1 dk1
f ðzÞ
dz ¼ ðk 1Þ! dzk1 ½ f ðzÞjz¼z0 , z0 inside of C :
1
2πj ðz z0 Þk :
C 0, z0 outside of C
The partial fraction method can be used to determine the inverse z-transform
when X(z) is expressed as a rational function of z. The key idea behind this method
is to express X(z) as a sum:
where the inverse z-transforms of i-th terms (i ¼ 1,. . .,K ) are available in the table
of z-transform pairs (see Table A2).
912 Referencs
References
Alamouti coding scheme (cont.) Backward recursion, 705, 707, 710, 738, 773
two transmit and one receive antennas, turbo codes, 705, 706, 709
593, 594 turbo equalization, 772–774
Alamouti-type PT-coding scheme, 594 Bahl-Cocke-Jelinek-Raviv (BCJR), 303, 320,
All-zero prefix, 506 705, 737
Amplification factor, 228 Baker-Hausdorff formula, 87
Amplified spontaneous emission (ASE) noise Balanced coherent optical detection, 2-D
vector, 23, 211, 478, 479, 595 modulation schemes, 464, 490
Amplitude modulation (AM), 2, 13 Balanced detector, 241
Amplitude phase-shift keying (APSK), 338 Bandwidth efficiency, 332, 337, 343, 344, 354,
Amplitude-shift keying (ASK), 13, 335 505–507
Analog-to-digital conversion (ADC), 15, 508, Baseband (BB) portion, 516
509, 539, 540, 544, 561, 564–566 Basic 2 2 optical hybrid with two-phase
Andrews spectral density, 100 trimmer, 462
Angular-spectral propagation method, 91 Bayes’ rule, 638
Antenna arrays, 261, 263, 264, 266 B-block-fading channel model, 657
Antipodal signaling, 332, 403, 404 BCH codes
Antireflection (AR) coatings, 230 binary, 676
A posteriori probability (APP), 634 codeword vector, 676
Arimoto-Blahut algorithm (ABA), 378, 786 decoding algorithms, 675, 678
Arithmetic coding-based nonuniform error-correction capability, 676, 677
signaling, 380, 381 error-evaluator polynomial, 680
Array factor (AF), 264 error locator polynomial, 678
Array gain (AG), 357, 578, 579, 582, 592, generator polynomial, 676
594, 604 Hamming distance, 675
Array waveguide gratings (AWGs), 237, 878 Massey-Berlekamp algorithm, 678, 679
Asymmetric split-step Fourier method parity-check matrix, 676, 677
(ASSFM), 181 shift register, 679
Asymmetric split-step method (ASSM), 87, 93 structure, 675
Asymptotic coding gain, 695, 741 BCJR-based APP decoder architecture, 739
Asynchronous CDMA, 845, 846, 850, 856, 861 Beam-forming strategy, 603–605
Asynchronous coherent optical detection, 239 Bell Laboratories layered space-time (BLAST)
Atmospheric turbulence, 85, 86, 92 architectures, 615
Autocorrelation constraint, 876 D-BLAST, 620, 621
Autocorrelation function, 97, 824, 835 H-BLAST, 620, 621
in-phase component, 142 receivers (interfaces), 630–632
random binary sequence, 835 V-BLAST, 620
Automatic gain control (AGC), 15, 21, BICM. See Bit-interleaved coded modulation
266–268, 547 (BICM)
Avalanche photodiodes (APDs), 12, 20, Bilinear transform, 250
224, 225 Binary LDPC codes, 25, 717–720
Average error probability, 412, 413 bipartite (Tanner) graph, 715
Average fade duration (AFD), 149 decoding (see Decoding binary LDPC
Average symbol error probability, 281, 357 codes)
EGC, 591 degree distribution polynomials, 715
MRC, 586–588 girth, 715
receiver diversity, 579 Hamming code, 715
SC, 580–582 k-dimensional subspace, 714
TC, 584 large-girth quasi-cyclic, 728–729
low-density parity-check matrix, 716
m n parity-check matrix, 715
B n-dimensional vector space, 714
Backward metrics QC-LDPC code, 716
turbo codes, 708 regular, 714
turbo equalization, 771–773 variable nodes, 715
Index 915
Exponential distribution of arrival time, 888 Few-mode fibers (FMFs), 8, 184, 359, 367,
Extended carrier mode, 543 563, 578, 598
Extended-PAD (X-PAD), 529 FH serial search acquisition, 838
External modulators, 12, 20, 212 Fiber attenuation, 159
Extra QoS class, 549 Fiber Bragg grating (FBG), 878
Extrinsic absorption, 159 Fiber nonlinearities, 7, 14, 20, 23
Extrinsic information, turbo code, 703 classification, 172
FWM, 176
Kerr effect, 171, 173
F nonlinear effects, 173
Fabry-Perot (FP) lasers, 12, 20, 215, phase shift, 175
216, 236 SPM, 174, 175
Factor graphs’ theory, 640–642 stimulated scattering effects, 172
APP functions, 634 Fiber-optics communications, 767
channel without memory (memoryless continuous wave laser diode, 369
channel), 636, 638 FCFs, 367
ISI channel, 636 FMFs, 367
iversion function, 635 Laguerre-Gauss (LG) vortex, 367
LBCs, 641 Laguerre polynomial, 367
linear ISI channel (linear channel with LDPC codes, 368
memory), 636, 638 OAM, 367, 368
MAP detection/decoding, 633 principle of orthogonality, 367
MAP detection of uncoded signals for receiver architecture of discrete-time
MIMO channels, 640 energy-efficient hybrid D-
marginalization operation, 634, 635 dimensional modulation, 371
MIMO receiver SDMA multiplexer, 369
H/V-BLAST architecture, 640–642 Slepian sequences, 368
LMMSE interface, 640, 641 spin angular momentum, 367
zero-forcing interface, 640, 641 TEM00 mode, 367
non-normal form, 635 transmitter architecture of discrete-time
normal graph, 635 energy-efficient hybrid D-
optical/wireless MIMO channel, 636, 637 dimensional modulation, 369
optimum receiver, 633 Fifth generation (5G)
repetition node, 635 advanced FEC, 11
space-time coded MIMO (with interleaver), coherent optical detection, 7, 8, 11, 20, 21,
645, 646 23, 24
trellis channel codes, 641–645 DSP, 8, 20
Fade margin (FM), 412 FCC, 5
Fading, 415, 416 100 GbE, 8
Far-field region/Fraunhofer region, 60, 61 100 Gb/s to 1 Tb/s data rates, 7, 8
Fast emerging RF technology, 549 400 Gb/s Ethernet, 8
Fast-fading channels, 157 massive MIMO, 5
Fast Fourier transform (FFT), 355 multilevel modulation, 8, 11, 20
cyclic prefix, 503, 504 Next Generation Mobile Networks
window synchronization, 509 Alliance, 4
Fast-frequency hopping (FFH), 25, 819 OFDM, 8, 13, 16, 21, 23, 26
Fast information channel (FIC), 530 OTN, 8
Fast low-latency access with seamless handoff polarization multiplexing, 8, 11
OFDM (FLASH-OFDM), 4 WSDN, 5
FCC, 5 Finite impulse response (FIR), 246, 426
Feedback shift register, 830, 831 Finite-state Markov channel (FSMC) model,
Few-core fibers (FCFs), 8, 359, 367, 598 152
Few-mode-few-core fiber (FMFC), 8 First generation (1G)
922 Index
Nonbinary MAP detection, 769–771, 804 indoor wireless optical communications, 563
Nonbinary min-max algorithm, 723 IP traffic in nationwide networks, 560
Non-ergodic capacity, 656–657 OBM, 560
Nonlinear propagation simulation of turbo OBM-OFDM enabling ultra-high-speed
equalization, 774–777 optical transport, 561, 562
Nonlinear scattering effects, 20 optical domain-based approaches, 561
Nonlinear Schr€odinger equation, 20 PONs, 563
Nonlinear-optimized signal constellation RF OFDM transmitter, 561
design-based coded modulation, RoF systems, 563
790–794 superchannel band groups, 561
Non-normal form of factor graph, 635 TbE ports, 560
Non-overlapping subcarriers traffic growth, 560
FDM fashion, 353 WDM, 561
real-valued signals, 352, 353 OFDM-CDMA, 26, 893
Nonuniform distributed symbols, 380 OFDM-CDMA-FH systems, 26, 893
Nonuniform signaling OFDM parallel channel decomposition and
arithmetic coding-based nonuniform channel modelling
signaling, 380, 381 ASE noise process, 510
conventional data transmission schemes, 379 balanced coherent detection, 510
Huffman code, 380, 381 bank of matched filters, 510
Maxwell-Boltzmann distribution, 380 channel coefficient, 511, 513
nonbinary LDPC coded modulation, 381, chromatic dispersion, 511
382 coherence time and bandwidth, 514
in optical communication systems, 380 DPS, 514, 515
receiving constellation diagram, 382 first-order PMD, 512
shaping gain, 380 frequency domain, 511, 512
square-QAM, 380 guard interval, 510
to transmit symbols, 379 Jones matrix, 512, 514
Nonzero-dispersion-shifted fibers (NZDSFs), magnitude response, 514
161, 164 multipath fading radio channel, 513
Nordic mobile telephone (NMT), 3 never completely fades, 513
Normal graph, 635 orthogonality principle, 511
Normalization of stokes, 45 phase error, 510
Normalized frequency (V parameter/V quasi-static, 510
number), 227 received signal, 510
Normalized index difference, 52, 226 Rician distribution, 515
Normalized propagation constant b, 227 time-varying impulse response, 513
Notch filter, 891 WSS-US, 513, 515
Numerical aperture (NA), 52, 226 OFDM system types
Numerically controlled oscillator (NCO), 540 CO-OFDM systems, 553–555
Nyquist overlapping subcarriers, 497 DDO-OFDM, 555–557
On-off keying (OOK), 332, 601
Open eye condition, 859, 861
O Operating points of Mach-Zehnder modulator,
Observation vector, 328, 401, 406, 409, 410 220, 221
OFDM-based super channel transmission Optical add-drop multiplexers (OADMs),
digital hierarchy enabling ultra-high-speed 8, 210
optical transport, 561, 563 Optical amplifiers, 12
4-D modulator, 561 applications, 229
electrical bandwidth, 560 EDFA, 232
electrical domain-based approaches, 561 gain saturation, 229
FMFs, 563 optical gain, 228
GOFDM, 563 Raman amplifier, 231, 232
Index 931
R Receiver diversity
Radar technique, 129 average symbol error probability, 579
Radiation condition, 60 CDF, 580
Radiation pattern, 64, 66, 263, 264 diversity gain, 580
Radiation vector, 60 EGC, 590–591
Radio transmission, 2 linear combiners, 578–580
Radio-over-fiber (RoF), 563, 892 MRC, 585–590
Radix-2 and radix-4 algorithms, 498 outage probability, 580
Raised cosine (RC) spectrum, 419–421, 504 SC, 580–584
RAKE receiver, 828–830 single-branch SNR ratio, 579
Raman amplifiers, 8, 9, 11, 12, 20, 231, 232 TC, 583–585
Raman scattering, 20, 178, 179 Receiver in D-BLAST architecture, 632
Random MIMO channels capacity Receiver shaping, 360, 603
channel matrix, 653 Receivers maximizing signal-to-noise ratio,
correlated fading channel capacity, 658 393–396
ergodic capacity, 654–656 Reconfigurable OADMs (ROADMs), 8, 9
MIMO-OFDM channel capacity, 658, 659 Recursive systematic convolutional (RSC)
non-ergodic capacity, 656–657 code, 684, 701, 702, 705, 757, 758
Randomness criteria, 830, 892 Reduced-complexity correlation receiver, 330
Random phase screen, 103 Reed-Müller (RM) code, 700
Rank determinant criterion, 610 Reed Solomon (RS) code, 535, 840
Rapid acquisition by sequential estimation BER performance, 697
(RASE), 827 burst errors, 696
Rate-adaptive LDPC coding codeword length, 695
BER performance, 733 error-correction capability, 696
FPGA, 732–736 generator polynomial, 695, 696
GLDPC coding in FPGA, 735–740 locator field, 695
irregular NB-QC-LDPC codes, 729 minimum distance, 695
irregular QC-LDPC codes, 731 Monte Carlo simulations, 697
LLRs, 732 nonbinary BCH codes, 695, 696
Monte Carlo simulation, 732 undetected error probability, 696
next generation, optical networks, 730 weight distribution, 695
nonbinary (NB) irregular QC-LDPC code, 729 Reflectance, 50
pairwise-balanced design, 729 Reflection coefficient, 120
parity-check matrix, 729 Refraction and diffraction operator, 87, 88
partial reconfiguration, 731 Reflection-induced noise, 187
PBD blocks, 730 Refractive index, 96
power of permutation matrix, 730 Regular Markov chain, 295, 296
re-encoding, 732 Relative intensity noise (RIN), 187–189, 241
spatially coupled LDPC code, 731 Release 8 (2008 Q4), 548
Rayleigh distribution, 374 Repetition MIMO, 601
Rayleigh fading, 146, 150 Repetition node, 635
average bit error probability, 582 Resampling, 255
distance, 69 Retarded potentials, 58
EGC, 590, 591 Reynolds number, 93, 94
MRC, 585, 586, 589 RF OFDM signal processing, 517
SC, 581, 582 RF OFDM transmitter, 516
scattering, 6 Rich-scattering model, 606, 607
TC, 584 Rician distribution, 147–149, 515
Ray tracing approximation, 119 Rician fading, 151, 587
Receiver architecture of discrete-time energy- Rician parameter, 515
efficient hybrid D-dimensional Rolloff factor, 420
modulation, 371 Root-mean-squared (RMS), 154, 170
936 Index
Rotated Q-coordinate delayed signal Separately correlated MIMO model, 606, 658
constellation principle, 542 Serial connection of PMs, 344
Rotationally symmetric optical channels, Serial-to-parallel (S/P) conversion, 648
376, 377 Set partitioning
Rotation of a polarizing element, 56 MCM, 749
Rotation operation, 401, 459 TCM, 741, 746
Rotator, 53 Shack-Hartmann wavefront sensor, 483–485
Rytov approximation, 107 Shadowing effect, 16, 19, 20, 27, 133, 134
Rytov method of small perturbations, 105 Shannon capacity, 281, 283, 288, 319
Rytov standard deviation, 115 Shannon-McMillan-Breiman theorem, 303
Rytov variance, 107, 311 Shape-based schemes, 884
Shaping gain, 380, 743
Short message service (SMS), 3
S Shot-noise mean-square value, 193
Saint-Venant’s hypothesis, 77 Signal constellations, 326, 337–344
Saleh-Valenzuela indoor UWB channel model, Signal generation, OFDM, 498–499
888, 893 Signal space theory
Scalable OFDM (SOFDM), 548 FSK, 331–332
Scalar wave equation, 57 geometric representation of signals,
Scale factor-CRC (SCF-CRC) bits, 529 324–326
Scattered pilot, 538 M-ary PAM, 332–335
Scattering model, 124–126, 129, 215 modulators and demodulators, 326–331
Scattering of electromagnetic waves, 124 passband digital wireless/optical
Schmidl-Cox approach, 517, 519 transmission, 335–337
Scintillation index, 107, 109, 114 Signal-to-distortion ratio (SDR), 527
Scrambler, 531, 533 Signal-to-noise ratio (SNR), 17, 279, 357, 578,
SDM in free-space optical (FSO) 581, 582
communications, 370–373 Signal transmission decoder configurations, 330
SDM in wireless communications, 365–366 Signature waveforms, 842–846
Second generation (2G) Simplified path loss model, 130
1.3 μm telecommunication window, 6 Single-branch SNR ratio, 579
single-mode lasers, 7 Single-carrier-based standards, 533
SMF, 7–9, 12, 14, 18, 20 Single E-O I/Q modulator, 344, 347, 348
SMS, 3 Single E-O polar modulator, 345, 347–349
TDMA-based standards, 3, 16, 18 Single input single output (SISO), 14, 360, 603,
Secondary electron-hole pairs, 224 714
Selection combining (SC) Single-mode fiber (SMF), 7–9, 12, 14, 18, 20,
array gain, 582 166, 212
average bit error probability vs. average Single-mode lasers, 7
SNR, 582, 584 Singleton bound, 674, 675, 695
average symbol error probability, 580–582 Singular value decomposition (SVD), 359
BPSK, 582 Slepian sequences, 368
CDF, 580, 581 Sliding-MAP equalizer, 382
maximum SNR, 580 Sliding-window multidimensional turbo
outage probability, 580–583 equalization, 771–774
SNR, 581, 582 SLM-based backpropagation method, 489
Self-coherence function, 72 SLM-based configurations, 374
Self-phase modulation (SPM), 10 Slow-fading channels, 156
Sellmeier equation, 160, 162 Slow-frequency hopping (SFH), 25, 819
Semiconductor lasers, 9, 12 Smart antennas, 577
Semiconductor optical amplifiers (SOAs), 213, Snell’s law, 48, 50, 51
230, 309, 878 Soft-input/soft-output (SISO) decoders, 702
Semiconductor photodiodes, 225 SONET/SDH standards, 11
Index 937
SPA decoding over an arbitray channel, 645 Spectral efficiency (SE), 618, 749, 753, 780
Space charge region (SCR), 225 Spectrally efficient modulation schemes, 337
Space-frequency block coding (SFBC)-based Spherical coordinates, 37
MIMO, 647, 649, 650 Spherical electromagnetic waves, 60
Space/spatial diversity, 578 Spin angular momentum, 367
Space-time coding (STC) Split-step Fourier method, 180
alamouti code (revisited), 612–614 Spontaneous emission, 191
channel matrix, 606, 607 Spontaneous emission noise and noise beating
coding gain, 610 components
delay diversity scheme, 607 demultiplexer, 194
design, 606 interchannel cross-talk, 193, 194
determinant criterion, 610 optical amplifier noise figure, 191
diversity gain, 610 optical filter, 196
Euclidean distance criterion, 611 quantum shot noise, 192, 193
Frobenius (Euclidean) norm, 607, 608 Spread factor, 157
fully correlated model, 606 Spreading sequences, 830–836
Hermitian matrix, 609 Spread spectrum (SS), 25
Hermitian nonnegative definite matrices, 607 despreading criterion, 814
linear space-time block codes, 614–615 digital communications, 814
ML detection, 607 DS-SS, 817, 818
orthogonal designs, 612–614 FH-SS, 819
output matrix, 606 jamming signal, 816
PEP, 608 m-th transmitted signaling waveform, 815
rank determinant criterion, 610 processing gain, 817
Rayleigh fading assumption, 609 spreading criterion, 814
rich-scattering model, 606, 607 Spread spectrum multiple access (SSMA), 842
Separately correlated model, 606 S/P serial-to-parallel conversion, 307
STTCs, 615, 616 Square- and cross-QAM transmitters, 21,
Space-time decoder extrinsic massage, 645 347–351, 380, 383
Space-time trellis codes (STTCs), 615–617 constellations, 338, 339
Spatial coherence radius, 73, 105 optical communications
Spatial diversity scheme, 357 improved E-O I/Q modulator, 347–349
Spatial division multiplexing (SDM), 8, 13, 19, parallel E-O I/Q modulators, 348, 350
22, 24, 27, 578 single E-O I/Q modulator, 347, 348
BLAST architectures, 619–622 single E-O polar modulator, 347–349
channel matrix, 618 tandem-QAM transmitter, 348, 351
detector, 618 Star-QAM transmitters, 21, 338, 340, 341, 346,
fiber-based optical communication systems, 347
367–370, 617 constellations, 338
FSO communications, 370–373 optical communications
MG-STCM, 622–625 E-O I/Q modulator, 347
mode-multiplexed four-dimensional (4-D) E-O PMs, 346
coded modulation, 618, 619 MZM, 346
optical communications, 618 signal constellation, 346
SE, 618 single I/Q modulator, 347
transmitter configurations, 618 8-star-QAM, 346
wireless MIMO communications, 365, 366, 16-star-QAM modulator, 346, 347
617 State of polarizations (SOPs), 361, 502, 576
Spatial frequencies, 90 Stationary channel, 300
Spatial interference cancelation, 633 Stationary information capacity, 301
Spatial light modulator (SLM), 372, 373, 488 Stationary property, 298
Spatially coupled LDPC code, 731 Stationary source, 298, 300
Spectral amplitude coding (SAC), 875, 877 STC-based MIMO system, 645
938 Index
Steepest descent algorithm, 431 Symmetric split-step Fourier method, 88, 182
Stimulated Brillouin scattering (SBS), 10, 172 Symmetric split-step method (SSSM), 87, 93
Stimulated emission, 213–215, 228 Synchronization, 837, 880, 882
Stimulated Raman scattering (SRS), 172, 231 carrier synchronization, 441, 442, 444
Stochastic-gradient blind equalization CDMA, 845, 847, 848, 851, 857
algorithm, 439 coherent optical detection, 239
Stokes vector representation, 43 costas loop, 441, 444
Stream rotator, 620, 621 symbol synchronization, 441
Subcarrier-based OPLL, 470, 472 Syndrome
Subcarrier-multiplexing (SCM), 11, 13, 19, 27 BCH code, 679
Subcarrier recovery, 519 components, 677
Subcarrier spacing, 534 decoding, 713
Subharmonics’ method, 103 LBC, 672
Suboptimum MIMO receivers for coded Massey-Berlekamp algorithm, 679
signals System architecture evolution (SAE), 548
BLAST receivers (interfaces), 630–632 Systematic code, 670, 671, 690
decision-feedback receivers (interfaces), Systematic form of convolutional code, 688
630–632 System (transfer) function, 245, 246
iterative receiver (interface), 633
linear receivers (interfaces), 628
LMMSE interface (receiver), 629–630 T
spatial interference cancelation, 633 Tandem-QAM transmitter, 348, 351
zero-forcing receivers (interfaces), 628 Tanner codes, 725, 726
Successive cancelation, 872, 873, 893 Tanner graph cycle, 642, 643
Sum-product algorithm (SPA), 24, 717, 719 Tanner-Wilberg-Loeliger-Koetter (TWLK)
channels with memory, 638–640 graph, 644
FFT-qSPA, 722 Tatarskii’s approach, 98
girth, 637 Tatarskii spectral density, 113
Log-qSPA, 723 Tatarskii spectrum, 100
MAP detection problem, 638, 640 Tau-dither loop (TDL), 827, 828
MD-FFT-qSPA, 723 Telecommunications Industry Association
message originating from the repetition (TIA), 3, 132
node, 637 TEM00 mode, 367
sum-product rule, 637, 639 Terabit Ethernet (TbE) ports, 560
types of messages, 637 Theorem of irrelevance, 393
Sum-product rule, 637, 639 Thermal noise, 190
Superchannel band groups, 561 Thin plano-convex lens, 81, 82
Superchannel optical OFDM structure, 504, Third generation (3G)
560 CDMA2000, 3
Superposition principle, 57, 70 DCFs, 7
Surface acoustic wave (SAW) filter, 539 DSF, 7
Surfaces of constant phase, 38 EDFAs, 7–9, 20
Survivor path, trellis coded modulation, 683, 3GPP LTE, 3
747 HSPA technology, 3
Switch and stay combiner (SSC), 583 IMT-2000, 3, 4
Symbol duration, 534 mobile protocols, 3
Symbol error probability 1.55 μm telecommunication window, 7
average, 400 OADMs, 8
Q-function, 402 optical solitons, 7
rotation operation, 401 UMTS, 3
translation operation, 401 WDM, 7
Symbol field, 675, 677, 695 Threaded space-time architecture, 622
Symbol interleaved turbo TCM, 756–758 Three- and four-level pumping schemes, 215
Index 939