Time-Invariant LDPC Convolutional Codes

02/15/2017 ∙ by Dimitris Achlioptas, et al. ∙ EPFL University of California Santa Cruz ETH Zurich 0

Spatially coupled codes have been shown to universally achieve the capacity for a large class of channels. Many variants of such codes have been introduced to date. We discuss a further such variant that is particularly simple and is determined by a very small number of parameters. More precisely, we consider time-invariant low-density convolutional codes with very large constraint lengths. We show via simulations that, despite their extreme simplicity, such codes still show the threshold saturation behavior known from the spatially coupled codes discussed in the literature. Further, we show how the size of the typical minimum stopping set is related to basic parameters of the code. Due to their simplicity and good performance, these codes might be attractive from an implementation perspective.



page 1

page 2

page 3

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

Spatially coupled codes have been shown to universally achieve the capacity for a large class of channels, [1, 2, 3, 4]. Many variants of such codes have been introduced to date. For the purpose of analysis it is convenient to consider highly random ensembles. For implementation purposes it is convenient to eliminate as much randomness as possible, e.g., by considering constructions based on protographs.

We ask how much “randomness” is required for such codes to perform well. A natural setting is to look at the origins of spatially coupled codes and to consider low-density parity-check (LDPC) convolutional codes with large constraint lengths. But rather than considering time-variant LDPC convolutional codes, we consider time-invariant such codes (and hence the number of parameters that describe such codes is very small). As we will see, even these extremely simple codes exhibit in simulations the threshold saturation phenomenon that is well-known from the standard spatially coupled codes discussed in the literature.

Let us recall. LDPC block codes are linear codes defined by parity-check matrices where the number of non-zero elements per parity-check is small and independent of the blocklength. Due to the small degrees of the checks such codes can be decoded “well” by a message-passing decoder. To be more precise: For well-designed ensembles, the threshold (when we consider ensembles of codes whose blocklength tends to infinity) under belief propagation decoding is close to the Shannon limit, [5, 6]. Nevertheless this threshold is typically strictly smaller than the threshold that would be achievable if we were able to implement maximum a posteriori (MAP) decoding, which is the optimal decoding strategy.

LDPC convolutional codes can be seen as convolutional codes (with very large constraint lengths) defined by parity-check equations with only a small number of non-zero taps (and the number of taps is independent of the constraint length). Standard convolutional codes are typically decoded by means of the Viterbi algorithm, whose complexity is exponential in the constraint length. For the codes that we consider the constraint length is hundreds or even thousands. Decoding via the Viterbi algorithm is therefore not feasible. But, just as for LDPC block codes, these codes can be decoded “well” via a message-passing algorithm due to the low-density nature of the parity-checks. There is one big difference to block codes, however. Whereas for block codes the iterative decoding threshold is generically strictly smaller than the MAP threshold, for convolutional codes with a proper “seeding” at the boundary, the two thresholds coincide. This phenomenon has been dubbed threshold saturation in the literature, [3] and has been observed (and in some cases proved) for various spatially coupled ensembles.

For the LDPC convolutional codes that are discussed in the literature, it is assumed that the filter coefficients are time variant. For some instances (like the ensembles that are most suitable for proofs) the amount of randomness that is required scales with the length of the code. For other instances, in particular for the type of spatially coupled codes that are defined by “unwrapping” a block code, the randomness is proportional to the memory of the code, [7].

We consider time-invariant LDPC convolutional codes. Each such code is defined by only bits, where is a “window” design parameter that determines the “effective” blocklength of the code. The parameter is equal to the number of streams of the code, and is the rate of the code. We show via simulations that, despite their extreme simplicity, such codes show the threshold saturation behavior known from standard spatially coupled codes discussed in the literature. Further, we show how the typical minimum stopping set size is related to the basic parameters of the code. Due to their simplicity and good performance, these codes might be attractive from an implementation perspective.

This paper has two objectives. First, we want to investigate how little randomness is needed in order to construct good spatially coupled codes. Second, we want to point out the strong analogy that exists between block and convolutional codes. In both cases, there are no polynomial time algorithms known that accomplish decoding close to capacity when we consider the dense case. But when we restrict ourselves to codes defined by sparse parity-check constraints then the message-passing algorithm works well. The major difference is that for block codes the iterative decoding threshold is generically strictly worse than the MAP threshold whereas for convolutional codes they generically coincide.

In order to bring out this analogy even clearer we will start from scratch and quickly review some basics of coding theory. This is done in Section II. In Section III we then describe the exact ensemble that we consider. It is particularly simple and suitable for analysis. In Section IV we show that the size of the minimum stopping sets that we should expect in such a code grows exponentially in the degree of the check nodes. Finally, in Section V we present some basic simulations. We limit ourselves to the binary erasure channel (BEC) for ease of exposition but the general phenomenon is not limited to this channel.

Ii Binary Linar Codes

Ii-a Block Codes

Definition 1 ( Block Code – Parity View).

An linear binary block code can be defined by


is a binary matrix of dimensions . It is called the parity-check matrix.

There are very good codes in such an ensemble. In fact, if we allow MAP decoding then such codes achieve capacity for a large class of channels (e.g., the class of binary-input memoryless output-symmetric channels).

Unless such codes have further structure, no algorithms are known that can accomplish decoding close to the threshold in polynomial time. In fact, the best known generic decoding algorithms have complexity .

Ii-B Convolutional Codes

Let be the set of formal power sums in the indeterminate with binary coefficients and only non-negative powers of .

Definition 2 ( Convolutional Code – Parity View).

An convolutional code can be defined by


is a matrix of dimensions with entries that are polynomials in . It is called the parity-check matrix.

The memory of the code is defined as

and the constraint length is defined as

Optimal decoding of such codes is typically accomplished by running the so-called Viterbi algorithm. Its complexity is exponential in the constraint length. Similarly to block codes, convolutional codes are capacity-achieving for a wide range of channels under optimal decoding at least if we allow the filter tap coefficients to be time-variant, [8].

Ii-C Low-Density Parity-Check Block Codes

Much of the advance in modern coding theory and practice has come about by looking at sparse versions of block codes, [9, 10, 11]. More precisely, we consider codes defined via parity-check matrices where the parity-check matrix is sparse / has a low-density of non-zero entries. Many versions of such LDPC block codes have been discussed in the literature. In the simplest case we can assume that every row of has non-zero entries and every column has non-zero entries. This is called an -regular LDPC code.

For LDPC block codes decoding is typically done via a message passing algorithm. As we discussed in the introduction, such codes, if well designed, have thresholds very close to the Shannon capacity. But typically the threshold under iterative decoding is strictly smaller than the threshold under MAP decoding, [12].

Ii-D Low-Density Parity-Check Convolutional Codes

As for block codes, we can consider convolutional codes defined by low-density parity-check matrices. More precisely, we let the memory tend to infinity but we keep the number of non-zero tap coefficients per row constant, independent of the memory.

We then use a standard message-passing algorithm on the Tanner graph of the code, rather than a Viterbi algorithm. Since the check degrees are constant, the complexity of the message-passing algorithm is linear in the overall length of the code.

It is important to point out that the codes we consider are similar to the standard codes discussed in the literature, i.e., they are LDPC convolutional codes. But we consider time-invariant codes whereas typically time-variant versions are discussed in the literature. The exact construction we consider is described in the next section.

Iii Construction

In the previous section we discussed already the generic class of LDPC convolutional codes. The following construction is particularly convenient from the point of view of analysis. But we caution the reader than many other variants are possible and might in fact be preferable.

Definition 3 ( Ensemble).

The ensemble is an ensemble of codes of rate . Each code is defined on streams and has shift-invariant parity-checks. Each of these parity-checks has degree and it has exactly one tap for each of the streams. Each such tap is picked independently of all other choices uniformly at random from the set .

Let us go back to our previous definition of convolutional codes. The parameter is typically close but always slightly larger than the memory of the code. Further, we see that each code in this ensemble is defined by a parity-check matrix whose entries are monomials

where the degree of the monomial is a random variable uniformly distributed in

. Figure 1 below shows the standard filter diagram where the number of input streams , the number of shift-invariant parity-checks , and . Note that for the ensembles we consider should be hundreds or thousands. The and are typically small and only constrained by two facts: First, the rate is equal to . Second, as we will discuss in the next section, the size of the minimum stopping set grows (exponentially) in and so should not be too small.

Figure 1: Filter diagram: , , and .

The reader might wonder why we are making this choice and only allow monomials, whereas our previous generic definition allowed polynomials as long as only a small number of taps is non-zero. This choice is mainly motivated by the fact that this ensemble is particularly easy to analyze when we are looking at the size of the minimum stopping set. In practice even better performance can likely be achieved by allowing several non-zero taps and we leave the question of how to find “optimal” filter choices as an interesting open problem.

As we mentioned before, the main difference to the standard definition of LDPC convolutional codes in the literature is that the codes we consider are time-invariant. They are therefore defined by only a handful of integer numbers. More precisely, each code in the ensemble is determined by integer numbers in . Hence, bits sufficient to describe such a code. Consequently, an exhaustive search for for the “best" code in this ensemble needs to go over at most codes. If we think of as the “effective” blocklength then the construction complexity of such codes is polynomial in the blocklength, namely, of order .

Encoding for members of the ensemble is particularly simple if the code has the so-called “stair-case” property (defined below). Recall that we have shift-invariant parity-checks, each having taps, one on each stream. We can use the last streams to contain information bits, and the bits on the first streams can be evaluated deterministically using the bits on the last streams. Assume now that we can order (label) the shift-invariant parity-checks from to in a way that the associated tap of the -th check on the -th stream is placed before the tap of the -th check on the -th stream (we name this configuration “staircase”). The encoding can then be done in the order determined by the “staircase”.

Iv Stopping Sets

Recall that every code in the ensemble is defined by only bits which determine the “filters”. The parity-checks are then defined by all shifts of these filters. This means that there is a lot of “dependence” among the various parity-checks. Does such a code have a large error floor?

We will investigate this question for the BEC by giving a bound on the size of minimum stopping set, see [13], for a typical realization, where “typical” refers to the randomness in picking the non-zero taps.

Lemma 1 (Minimum Stopping Set Size).

With probability

, every stopping set contained in a randomly chosen code generated from the ensemble has size at least .

Note: The term contains constants that depend on . In general, as will be clear from the proof, the larger the larger we will have to choose .


We begin by describing some basic properties of the positions of the taps when is large enough. We will use Figure 2 as our running example. Recall that a code in the ensemble is specified by streams as well as shift-invariant parity-checks. We denote the -th shift-invariant parity-check by . From now on we will use the two phrases “check type ” and “shift-invariant parity-check ” interchangeably. A check type is determined by taps, one for each stream. Let us denote by the tap on stream that is associated to check . From now on, we assume that the -th stream is placed on the horizontal line in the two dimensional plane. The taps on each stream are placed at integer positions such that any two consecutive taps differ by a unit. Consider two distinct taps and that are connected to check . We denote by

the vector whose starting point is

and whose endpoint is (see Figure 2). It is a -dimensional vector with integer components. The first component contains the difference of the stream indices. The second component contains the difference of the time indices.

stream 1

stream 2

stream 3

Figure 2:

It is not hard to show that, with probability , all the vectors are distinct. Consider now a stopping set and assume without loss of generality (w.l.o.g.) that it contains a variable node on the first stream. Let us denote this variable by . Recall now that each check has exactly one connection to each stream. Hence, for each , there is a check node of type (appropriately shifted) that is connected to . But whenever this happens, the corresponding check must have at least one more non-zero variable that it is connected to at this time, since otherwise we do not have a stopping set. Equivalently, we can say that for each , there exists a vector such that if we start at , and move along , then we end up at a variable node which is also part of the stopping set. This itself already leads to a lower bound on the size of a stopping set (namely the bound ) since, as we mentioned above, the various vectors are with high probability distinct.

But we can get better bounds by continuing to “grow out” the stopping set (think of a tree rooted at ). So assume that we start at the variable . This variable has children that are distinct with high probability. Now let us look at the children of these children and so on, up to depth , .

More precisely, given any sequence of distinct check types , we can associate a sequence of vectors such that if we start at node and move along the path created by these vectors then all the nodes that we visit along this path belong to the stopping set. If all these nodes were all distinct (for all such paths of distinct types) we would get a very simple lower bound on the stopping set. As we will see now, it can happen that some of the nodes are in fact the same. But we will be able to lower bound the number of distinct such nodes.

Define the set as

Note that we allow the empty (null) sequence to be included in . We now construct a rooted tree (rooted in whose vertices are members of . This tree has the empty string as its root node, and every is adjacent to as its parent node. In this way the depth of a node is equal to . Consider any path in the tree that starts at the root node and ends at a sequence . Define for each . We also denote the root node by . Therefore, the path can be represented as .

Recall from above that we can assume w.l.o.g. that the stopping set has a node on the first stream which we denote by . From what we have discussed up to now, given any stopping set we can assign to each sequence a number such that the following property holds. For any path , consider the following trajectory: we start at node and move along the vectors for each , one after the other, then all the variable nodes that we visit along the way should belong to the stopping set.

We need to count the number of repetitions among the variables for (and this leads to a lower bound on the size of the stopping set). Consider two sequences and . With probability , we have only if and the two sets of vectors and are the same (up to a permutation). With this condition, for a sequence , the number of repetitions of can be upper bounded as follows. For , let

Note that . The number of repetitions of is upper bounded by . We can thus upper bound the number of repetitions by

By using the inequality , we can further write , and thus


Finally, the number of sequences with length is precisely . Putting all these together, we obtain the following lower bound on the size of any stopping set (which holds with probability ):

where we have used (1) and Stirling’s bounds. ∎

V Simulation Results

We now get to our numerical experiments. More precisely, we consider the “terminated” case: on each stream the number of variable nodes is , and on both sides of each stream additional variable nodes are fixed to be (seeding). We assume that the all-zero codeword was transmitted over the binary erasure channel (BEC) with parameter and we use the peeling decoder, see [11].

Figure 3 shows the empirical bit erasure probability versus the channel parameter , for the cases and . The empirical average is over random samples from the ensemble (where the randomness is over the choice of code and the channel realization). As we can see, the curves become steeper and steeper in the waterfall region and move rightward as becomes larger and larger. This is consistent with the fact that is proportional to the “effective” block length.

In addition we see in this figure the error floor due to small stopping sets. We can compare this error floor to our analytic predictions. Note that the “slope” of the error floor curve tells us the size of the stopping set that causes this error floor. I.e., if the curve has the form then is the size of the stopping set. For

we get an estimate of

and for we have the estimate . These results are consistent with our lower bound of Lemma 1 in Section IV, since .

Figure 3: and .

The cases and are shown in Figure  4. Note that in order to see the error floor in this case one would have to simulate the curves to considerably lower probabilities since even for and we have already . We see that compared to the case the threshold is even closer to the Shannon capacity, consistent with the threshold saturation phenomenon.

Figure 4: and .

Vi Conclusions

We introduced time-invariant low-density convolutional codes. These codes are defined by a very small number of bits. We have seen that despite their simplicity these codes perform very well. We have given some simple lower bound on the minimum stopping set size of such codes which grows exponentially in the number of shift-invariant parity-checks.


The work of W. Liu and R. Urbanke is supported by grant No. 200021_166106 of the Swiss National Science Foundation. The work of H. Hassani is partially supported by a fellowship from Simons Institute for the Theory of Computing, UC Berkeley.


  • [1] A. J. Felström and K. S. Zigangirov, “Time-varying periodic convolutional codes with low-density parity-check matrix,” IEEE Trans. Inform. Theory, vol. 45, no. 6, pp. 2181–2190, Sept. 1999.
  • [2] M. Lentmaier, A. Sridharan, K. S. Zigangirov, and J. D. J. Costello, “Iterative decoding threshold analysis for LDPC convolutional codes,” IEEE Trans. Inform. Theory, vol. 56, no. 10, pp. 5274–5289, Oct. 2010.
  • [3] S. Kudekar, T. Richardson, and R. Urbanke, “Threshold saturation via spatial coupling: Why convolutional ldpc ensembles perform so well over the bec,” in 2010 IEEE International Symposium on Information Theory, June 2010, pp. 684–688.
  • [4] A. Yedla, Y. Y. Jian, P. S. Nguyen, and H. D. Pfister, “A simple proof of Maxwell saturation for coupled scalar recursions,” IEEE Transactions on Information Theory, vol. 60, no. 11, pp. 6943–6965, Nov 2014.
  • [5] M. Luby, M. Mitzenmacher, A. Shokrollahi, D. A. Spielman, and V. Stemann, “Practical loss-resilient codes,” in Proc. of the 29th annual ACM Symposium on Theory of Computing, 1997, pp. 150–159.
  • [6] T. Richardson, A. Shokrollahi, and R. Urbanke, “Design of capacity-approaching irregular low-density parity-check codes,” IEEE Trans. Inform. Theory, vol. 47, no. 2, pp. 619–637, Feb. 2001.
  • [7] R. M. Tanner, “A recursive approach to low complexity codes,” IEEE Trans. Inform. Theory, vol. 27, no. 5, pp. 533–547, Sept. 1981.
  • [8] A. J. Viterbi and J. K. Omura, Principles of Digital Communication and Coding.   McGraw-Hill, 1979.
  • [9] R. G. Gallager, “Low-density parity-check codes,” IRE Trans. Inform. Theory, vol. 8, pp. 21–28, Jan. 1962.
  • [10] C. Berrou, A. Glavieux, and P. Thitimajshima, “Near Shannon limit error-correcting coding and decoding,” in Proc. of the IEEE Int. Conf. Commun. (ICC), Geneve, Switzerland, May 1993, pp. 1064–1070.
  • [11] T. Richardson and R. Urbanke, Modern Coding Theory.   Cambridge University Press, 2008.
  • [12] C. Méasson, A. Montanari, and R. Urbanke, “Maxwell’s construction: The hidden bridge between maximum-likelihood and iterative decoding,” in Proc. of the IEEE Int. Symposium on Inform. Theory (ISIT), Chicago, 2004, p. 225.
  • [13] C. Di, D. Proietti, T. Richardson, E. Telatar, and R. Urbanke, “Finite length analysis of low-density parity-check codes on the binary erasure channel,” IEEE Trans. Inform. Theory, vol. 48, pp. 1570–1579, Jun. 2002.