mohatta2015.pdf
signal processing from power amplifier operation control point of view
signal processing from power amplifier operation control point of view
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
158 ADVANCED TOPICS<br />
Thus, for MAPSD, we can also form an LLR by taking the log of the ratio of the<br />
two symbol metrics.<br />
Now for an example. Referring to Table 7.1, the signed soft value for s% would be<br />
log(0.969975/1.4529) = -0.4043. Similarly, the signed soft value would be 0.5120<br />
for «2·<br />
How do we use LLRs in decoding? Because the likelihood of the symbol being<br />
+ 1 is in the numerator, we can think of the LLR as the log of the symbol metric<br />
for the symbol being +1. The symbol metric for the symbol being —1 is simply the<br />
negative of the LLR. As a result, we can perform decoding by correlating the soft<br />
values to the hypothetical message values. A correlation is obtained by forming<br />
products of corresponding values and summing. Thus, for the MAPSD case, the<br />
message metric for message 1 would be (+l)(-0.4043) + (-1)(0.5120) = -0.9163.<br />
7.2.2.2 The (7,4) Hamming code There are different kinds of FEC codes. One<br />
kind is a block code, in which the message symbols are divided up into blocks, and<br />
each block is encoded separately. For example, consider a Hamming code in which 4<br />
information bits (¿j, ¿2, ¿3 and ¿4) are encoded into 7 modem bits (a 7-bit codeword),<br />
sometimes called a (7,4) Hamming code. This is done by also transmitting 3 check<br />
bits (ci, C2 and C3), which are computed as<br />
C\ = ¿l¿2¿4<br />
C 2 = íi¿3¿4<br />
C.-j = ¿2*3*4- ( 7·10)<br />
If no errors occur during detection, then the detected values will also satisfy these<br />
equations. Otherwise, an error will have been detected. Note that there can be<br />
errors in the check bits as well as the information bits.<br />
If we are sure only one error has occurred, there is a way to detect it without soft<br />
information. This particular Hamming code has the property that it can correct<br />
single errors using only the hard decisions. It works like this. We form a syndrome<br />
by forming products<br />
Si = Cl¿l¿2¿4<br />
Si = C2¿ii:s¿4<br />
S-Λ = C;iÍ2Í\iÍA· (7.11)<br />
If there are no errors, then all three syndrome values should be +1. Why? Consider<br />
Si. We know that ¿i¿2¿4 = Ci, so that ci¿i¿2¿4 should equal c\ which is always +1.<br />
Similar arguments apply to the other syndromes.<br />
If one or more of the syndrome elements are —1, we know there has been an<br />
error. It turns out that the Hamming code is designed to tell us the location of<br />
the error, assuming only one error occurred. First, we need to think of the bits as<br />
having the positions shown in Table 7.5. Second, we need to map the +1 and —1<br />
syndrome values to 0 and 1, i.e.,<br />
Third, we can determine the position of the error using<br />
Bfc = (l-S fc )/2. (7.12)<br />
p = Bi + 2B 2 + 4B.S. (7.13)