To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Although a great deal of research effort has been expended on the design, construction, encoding, decoding, performance analysis, and applications of binary LDPC codes in communication and storage systems, very little has been done on nonbinary LDPC codes in these respects. The first study of nonbinary LDPC codes was conducted by Davey and MacKay in 1998. In their paper, they generalized the SPA for decoding binary LDPC codes to decode q-ary LDPC codes, called QSPA. Later, in 2000, MacKay and Davey introduced a fast-Fourier-transform (FFT)-based QSPA to reduce the decoding computational complexity of QSPA. This decoding algorithm is referred to as FFT-QSPA. MacKay and Davey's work on FFT-QSPA was further improved by Barnault and Declercq in 2003 and Declercq and Fossorier in 2007. Significant works on the design, construction and analysis of nonbinary LDPC codes didn't appear until the middle of 2000. Results in these works are very encouraging. They show that nonbinary LDPC codes have a great potential to replace widely used RS codes in some applications in communication and storage systems. This chapter is devoted to nonbinary LDPC codes.
Just like binary LDPC codes, nonbinary LDPC codes can be classified into two major categories: (1) random-like nonbinary codes constructed by computer under certain design criteria or rules; and (2) structured nonbinary codes constructed on the basis of algebraic or combinatorial tools, such as finite fields and finite geometries.
This chapter presents some important elements of modern algebra and combinatorial mathematics, namely, finite fields, vector spaces, finite geometries, and graphs, that are needed in the presentation of the fundamentals of classical channel codes and various constructions of modern channel codes in the following chapters. The treatment of these mathematical elements is by no means rigorous and coverage is kept at an elementary level. There are many good text books on modern algebra, combinatorial mathematics, and graph theory that provide rigorous treatment and in-depth coverage of finite fields, vector spaces, finite geometries, and graphs. Some of these texts are listed at the end of this chapter.
Sets and Binary Operations
A set is a collection of certain objects, commonly called the elements of the set. A set and its elements will often be denoted by letters of an alphabet. Commonly, a set is represented by a capital letter and its elements are represented by lower-case letters (with or without subscripts). For example, X = {x1, x2, x3, x4, x5} is a set with five elements, x1, x2, x3, x4, and x5. A set S with a finite number of elements is called a finite set; otherwise, it is called an infinite set. In error-control coding theory, we mostly deal with finite sets.
Combinatorial designs [1–8] form an important branch in combinatorial mathematics. In the late 1950s and during the 1960s, special classes of combinatorial designs, such as balanced incomplete block designs, were used to construct error correcting codes, especial majority-logic-decodable codes. More recently, combinatorial designs were successfully used to construct structured LDPC codes [9–12]. LDPC codes of practical lengths constructed from several classes of combinatorial designs were shown to perform very well over the binary-input AWGN channel with iterative decoding.
Graphs form another important branch in combinatorial mathematics. They were also used to construct error-correcting codes in the early 1960s, but not very successfully. Only a few small classes of majority-logic-decodable codes were constructed. However, since the rediscovery of LDPC codes in the middle of the 1990s, graphs have become an important tool for constructing LDPC codes. One example is to use protographs for constructing iteratively decodable codes as described in Chapters 6 and 8.
This chapter presents several methods for constructing LDPC codes based on special types of combinatorial designs and graphs.
Balanced Incomplete Block Designs and LDPC Codes
Balanced incomplete block designs (BIBDs) form an important class of combinatorial designs. A special subclass of BIBDs can be used to construct RC-constrained matrices or arrays of CPMs from which LDPC codes can be constructed. This section gives a brief description of BIBDs. For an in-depth understanding of this subject, readers are referred to [1–8].
The topics this book touches lie within the networking field, an exciting area that in the last 20 years has experienced a stunning growth and gained an increasing popularity. Just as previous ages of modern society have been marked by technological advancements that significantly shaped them, from transistors to personal computers, our life is now molded by emails, our work and leisure time clocked by websites, our children daily accompanied by the Internet. What lies behind this boiling surface? What infrastructures and communication rules allow us to connect to the Internet from home through an ADSL connection? How does information travel on a high-speed backbone from our office to an overseas destination? Through a rigorous yet practical approach, the aim of this volume is to provide all the concepts needed for a thorough knowledge of networking technologies, as well as to breed the development of agile skills in modern network design.
After laying the common language foundations and the basic concepts and terminology within the field, the book is committed to a critical treatment of the technologies, protocols and devices adopted in contemporary networks. A special emphasis is placed on building an effective competence in all subject areas: hence, each topic is complemented by guided and commented practices, where proficiencies are challenged through real problems. The aim is to strengthen the abilities needed for present-day network design. The chapter structure reflects the authors’ pedagogical view: first build good foundations and gain expertise in each topic, then consolidate and confront real networking issues.
The title of this book, Channel Codes: Classical and Modern, was selected to reflect the fact that this book does indeed cover both classical and modern channel codes. It includes BCH codes, Reed–Solomon codes, convolutional codes, finite-geometry codes, turbo codes, low-density parity-check (LDPC) codes, and product codes. However, the title has a second interpretation. While the majority of this book is on LDPC codes, these can rightly be considered to be both classical (having been first discovered in 1961) and modern (having been rediscovered circa 1996). This is exemplified by David Forney's statement at his August 1999 IMA talk on codes on graphs, “It feels like the early days.” As another example of the classical/modern duality, finite-geometry codes were studied in the 1960s and thus are classical codes. However, they were rediscovered by Shu Lin et al. circa 2000 as a class of LDPC codes with very appealing features and are thus modern codes as well. The classical and modern incarnations of finite-geometry codes are distinguished by their decoders: one-step hard-decision decoding (classical) versus iterative soft-decision decoding (modern).
It has been 60 years since the publication in 1948 of Claude Shannon's celebrated A Mathematical Theory of Communication, which founded the fields of channel coding, source coding, and information theory. Shannon proved the existence of channel codes which ensure reliable communication provided that the information rate for a given code did not exceed the so-called capacity of the channel.
Weight enumerators or weight-enumerating functions are polynomials that represent in a compact way the input and/or output weight characteristics of the encoder for a code. The utility of weight enumerators is that they allow us to easily estimate, via the union bound, the performance of a maximum-likelihood (ML) decoder for the code. Given that turbo and LDPC codes employ suboptimal iterative decoders this may appear meaningless, but it is actually quite sensible for at least two reasons. One reason is that knowledge of ML-decoder performance bounds allows us to weed out weak codes. That is, if a code performs poorly for the ML decoder, we can expect it to perform poorly for an iterative decoder. Another reason for the ML-decoder approach is that the performance of an iterative decoder is generally approximately equal to that of its counterpart ML decoder, at least over a restricted range of SNRs. We saw this in Chapter 7 and we will see it again in Figure 8.5 in this chapter.
Another drawback to the union-bound/ML-decoder approach is that the bound diverges in the low-SNR region, which is precisely the region of interest when one is attempting to design codes that perform very close to the capacity limit. Thus, when attempting to design codes that are simultaneously effective in the floor region (high SNRs) and the waterfall region (low SNRs), the techniques introduced in this chapter should be supplemented with the techniques in the next chapter which are applicable to the low-SNR region.
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.
If you are involved in designing, building, selling or regulating UWB devices, this concise and practical guide to UWB technology, standards, regulation, and intellectual property issues will quickly bring you up-to-speed. Packed with practical insights, implementation guidelines, and application examples, Essentials of UWB is a must-have resource for wireless professionals working in the field.Written by key figures in the development of UWB, the book describes UWB technology, and evaluates its suitability for applications in communications, radar, and imaging. UWB radios, protocols and implementation are covered, and a thorough account of UWB industry organization completes the picture.This is an invaluable guide for engineers involved in UWB device design, as well as for product marketing managers, sales support engineers and technical managers. It will also appeal to engineers with a deeper technical understanding of UWB who want to gain knowledge of the broader environment and future evolutionary expectations.
Two-dimensional wavelets offer a number of advantages over discrete wavelet transforms when processing rapidly varying functions and signals. In particular, they offer benefits for real-time applications such as medical imaging, fluid dynamics, shape recognition, image enhancement and target tracking. This book introduces the reader to 2-D wavelets via 1-D continuous wavelet transforms, and includes a long list of useful applications. The authors then describe in detail the underlying mathematics before moving on to more advanced topics such as matrix geometry of wavelet analysis, three-dimensional wavelets and wavelets on a sphere. Throughout the book, practical applications and illustrative examples are used extensively, ensuring the book's value to engineers, physicists and mathematicians alike.
This book was first published in 2004. In many applications, images, such as ultrasonic or X-ray signals, are recorded and then analyzed with digital or optical processors in order to extract information. Such processing requires the development of algorithms of great precision and sophistication. This book presents a unified treatment of the mathematical methods that underpin the various algorithms used in remote image formation. The author begins with a review of transform and filter theory. He then discusses two- and three-dimensional Fourier transform theory, the ambiguity function, image construction and reconstruction, tomography, baseband surveillance systems, and passive systems (where the signal source might be an earthquake or a galaxy). Information-theoretic methods in image formation are also covered, as are phase errors and phase noise. Throughout the book, practical applications illustrate theoretical concepts, and there are many homework problems. The book is aimed at graduate students of electrical engineering and computer science, and practitioners in industry.
This book provides a comprehensive description of the methodologies and the application areas, throughout the range of digital communication, in which individual signals and sets of signals with favorable correlation properties play a central role. The necessary mathematical background is presented to explain how these signals are generated, and to show how they satisfy the appropriate correlation constraints. All the known methods to obtain balanced binary sequences with two-valued autocorrelation, many of them only recently discovered, are presented in depth. The authors treat important application areas including: Code Division Multiple Access (CDMA) signals, such as those already in widespread use for cell-phone communication, and planned for universal adoption in the various approaches to 'third-generation'(3G) cell-phone use; systems for coded radar and sonar signals; communication signals to minimize mutual interference ('cross-talk') in multi-user environments; and pseudo-random sequence generation for secure authentication and for stream cipher cryptology.
Do you want your wireless network to be profitable? Wireless operators will find this practical, hands-on guide to network deployment invaluable. Based on their own extensive experience, the authors describe an end-to-end network planning process to deliver the guaranteed Quality of Service (QoS) that enables today's wireless IP services such as VoIP, WWW and streaming video. The trade-off between enhanced user experience and operator cost is explored in the context of an enhanced business model. Comprehensive examples are provided for:GSM/GPRS/EDGEWCDMA-UMTS/HSDPAOFDM-WiMAX/LTEmesh WiFipacket backhaulTopics addressed include: capacity/peak data ratesservice latency link budgetslifecycle costsnetwork optimisationWith a focus on practical design, the book is ideal for radio and core network planners, designers, optimisers and business development staff at operators and network equipment manufacturers. Extensive references also make it suitable for graduate and postgraduate students.
Are you fully up-to-speed on today's modern spectrum management tools? As regulators move away from traditional spectrum management methods, introduce spectrum trading and consider opening up more spectrum to commons, do you understand the implications of these developments for your own networks? This 2007 book was the first to describe and evaluate modern spectrum management tools. Expert authors offer insights into the technical, economic and management issues involved. Auctions, administrative pricing, trading, property rights and spectrum commons are all explained. A series of real-world case studies from around the world is used to highlight the strengths and weaknesses of the various approaches adopted by different regulators, and valuable lessons are drawn from these. This concise and authoritative resource is a must-have for telecom regulators, network planners, designers and technical managers at mobile and fixed operators and broadcasters, and academics involved in the technology and economics of radio spectrum.
The increasing popularity of wireless networks makes interference and cross-talk between multiple systems inevitable. This book describes techniques for quantifying this, and the effects on the performance of wireless networks operating in the unlicensed bands. It also presents a variety of system-level solutions, obviating the need for new hardware implementations. The book starts with basic concepts and wireless protocols before moving on to interference performance evaluation, interference modeling, coexistence solutions, and concluding with common misconceptions and pitfalls. The theory is illustrated by reference to real-world systems such as Bluetooth and WiFi. With a number of case studies and many illustrations, this book will be of interest to graduate students in electrical engineering and computer science, to practitioners designing new WLAN and WPAN systems or developing new techniques for interference supression, and to general users of merging wireless technologies.
Multi-application smart cards have yet to realise their enormous potential, partly because few people understand the technology, market, and behavioural issues involved. Here, Mike Hendry sets out to fill this knowledge gap with a comprehensive and accessible guide. Following a review of the state-of-the-art in smart card technology, the book describes the business requirements of each smart-card-using sector, and the systems required to support multiple applications. Implementation aspects, including security, are treated in detail and numerous international case studies cover identity, telecoms, banking and transportation applications. Lessons are drawn from these studies to help deliver more successful projects in the future. Invaluable for users and integrators specifying, evaluating and integrating multi-application systems, the book will also be useful to terminal, card and system designers; network, IT and security managers; and software specialists.
Do you need to get quickly up to speed on cognitive radio? This concise, practical guide presents the key concepts and challenges you need to know about, including issues associated with security, regulation, and designing and building cognitive radios. Written in a descriptive style and using minimum mathematics, complex ideas are made easily understandable, providing you with a perfect introduction to the technology and preparing you to face its many future challenges.
If you need to maximize efficiency in wireless network planning, an understanding of radio propagation issues is vital, and this 2007 reference guide is for you. Using real-world case studies, practical problems and minimum mathematics, the author explains simply and clearly how to predict signal strengths in a variety of situations. Fundamentals are explained in the context of their practical significance. Applications, including point-to-point radio links, broadcasting and earth-space communications, are thoroughly treated, and more sophisticated methods, which form the basis of software tools for both network planning and spectrum management, are also described. For a rapid understanding and insight into radio propagation, sufficient to enable you to undertake real-world engineering tasks, this concise book is invaluable for network planners, hardware designers, spectrum managers, senior technical managers and policy makers who are either new to radio propagation or who need a quick reference guide.