19.11.2014 Views

mohatta2015.pdf

signal processing from power amplifier operation control point of view

signal processing from power amplifier operation control point of view

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

158 ADVANCED TOPICS<br />

Thus, for MAPSD, we can also form an LLR by taking the log of the ratio of the<br />

two symbol metrics.<br />

Now for an example. Referring to Table 7.1, the signed soft value for s% would be<br />

log(0.969975/1.4529) = -0.4043. Similarly, the signed soft value would be 0.5120<br />

for «2·<br />

How do we use LLRs in decoding? Because the likelihood of the symbol being<br />

+ 1 is in the numerator, we can think of the LLR as the log of the symbol metric<br />

for the symbol being +1. The symbol metric for the symbol being —1 is simply the<br />

negative of the LLR. As a result, we can perform decoding by correlating the soft<br />

values to the hypothetical message values. A correlation is obtained by forming<br />

products of corresponding values and summing. Thus, for the MAPSD case, the<br />

message metric for message 1 would be (+l)(-0.4043) + (-1)(0.5120) = -0.9163.<br />

7.2.2.2 The (7,4) Hamming code There are different kinds of FEC codes. One<br />

kind is a block code, in which the message symbols are divided up into blocks, and<br />

each block is encoded separately. For example, consider a Hamming code in which 4<br />

information bits (¿j, ¿2, ¿3 and ¿4) are encoded into 7 modem bits (a 7-bit codeword),<br />

sometimes called a (7,4) Hamming code. This is done by also transmitting 3 check<br />

bits (ci, C2 and C3), which are computed as<br />

C\ = ¿l¿2¿4<br />

C 2 = íi¿3¿4<br />

C.-j = ¿2*3*4- ( 7·10)<br />

If no errors occur during detection, then the detected values will also satisfy these<br />

equations. Otherwise, an error will have been detected. Note that there can be<br />

errors in the check bits as well as the information bits.<br />

If we are sure only one error has occurred, there is a way to detect it without soft<br />

information. This particular Hamming code has the property that it can correct<br />

single errors using only the hard decisions. It works like this. We form a syndrome<br />

by forming products<br />

Si = Cl¿l¿2¿4<br />

Si = C2¿ii:s¿4<br />

S-Λ = C;iÍ2Í\iÍA· (7.11)<br />

If there are no errors, then all three syndrome values should be +1. Why? Consider<br />

Si. We know that ¿i¿2¿4 = Ci, so that ci¿i¿2¿4 should equal c\ which is always +1.<br />

Similar arguments apply to the other syndromes.<br />

If one or more of the syndrome elements are —1, we know there has been an<br />

error. It turns out that the Hamming code is designed to tell us the location of<br />

the error, assuming only one error occurred. First, we need to think of the bits as<br />

having the positions shown in Table 7.5. Second, we need to map the +1 and —1<br />

syndrome values to 0 and 1, i.e.,<br />

Third, we can determine the position of the error using<br />

Bfc = (l-S fc )/2. (7.12)<br />

p = Bi + 2B 2 + 4B.S. (7.13)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!