Satelitte Beam
Satelitte Beam
Satelitte Beam
Abstract
arXiv:1610.00966v1 [cs.IT] 4 Oct 2016
We consider the rates achievable by a user in a multibeam satellite system for unicast applications, and
propose alternatives to the conventional single-user symbol-by-symbol detection applied at user terminals. Single-
user detection is known to suffer from strong degradation when the terminal is located near the edge of the
coverage area of a beam, and when aggressive frequency reuse is adopted. For this reason, we consider multiuser
detection, and take into account the strongest interfering signal. We also analyze two additional transmission
strategies requiring modifications at medium access control layer. We describe an information-theoretic framework
to compare the different strategies by computing the information rate of the user in the reference beam. Furthermore,
we analyze the performance of coded schemes that could approach the information-theoretic limits. We show that
classical codes from the DVB-S2(X) standard are not suitable when multiuser detection is adopted, and we propose
two ways to improve the performance, based on the redesign of the code and of the bit mapping.
G. Colavolpe and A. Ugolini are with are with Università di Parma, Dipartimento di Ingegneria dell’Informazione, Viale delle Scienze,
A. Piemontese is with the Department of Signals and Systems, Chalmers University of Technology, Gothenburg, Sweden (e-mail:
This work is funded by the European Space Agency, ESA-ESTEC, Noordwijk, The Netherlands. The view expressed herein can in no
way be taken to reflect the official opinion of the European Space Agency.
The paper was presented in part at the IEEE Intern. Conf. Commun. (ICC’15), London, UK, June 2015 and at the IEEE Intern. Workshop
on Signal Process. Advances in Wireless Commun. (SPAWC’15), Stockholm, Sweden, June 2015.
2
I. I NTRODUCTION
The recent years have witnessed the explosion of satellite services and applications, and the related
growing demand for high data rates. In particular, satellite systems, which are broadcast by nature, can be
also used for broadband interactive, and thus unicast, transmissions. The 2nd-generation specification of
the digital video broadcasting for satellite (DVB-S2) standard [1], developed in 2003, and its evolution,
approved in 2014 with the name of DVB-S2X [2], represent illuminating examples in this sense.
Next-generation satellite systems need new technologies to improve their spectral efficiency, in order
to sustain the increasing request of new services. The grand challenge is to satisfy this demand by living
with the scarcity of the frequency spectrum. Resource sharing is probably the only option, and can be
implemented by adopting a multibeam system architecture, which allows to reuse the available bandwidth
in many beams. The interference caused by resource sharing is typically considered undesirable, but a
way to dramatically improve the spectral efficiency is to exploit this interference, by using interference
In this paper, we consider the benefits of the adoption of multiuser detection at the user terminal in
the forward link of a multibeam satellite system. Our reference is a DVB-S2(X) system [1], [2], where
an aggressive frequency reuse is applied. Under these conditions, the conventional single-user detector
(SUD) suffers from a severe performance degradation when the terminal is located near the edge of the
coverage area of a beam, due to the high co-channel interference. On the other hand, the application of a
decentralized multiuser detector (MUD) at the terminal, able to cope with the interference, can guarantee
the required performance [3], [4]. Of course a computational complexity increase must be paid. A parallel
The literature on multiuser detection is wide, and in the area of satellite communications it essentially
focuses on the return link [6]–[12], i.e., on the link from the user terminals to the gateway, and includes
centralized techniques to be applied at the gateway. Less effort has been devoted to the forward link.
Recently, we investigated in [3] the benefits that can be achieved, in terms of spectral efficiency, when
high frequency reuse is applied in a DVB-S2 system, and multiuser detection is adopted at the terminal
to manage the presence of strong co-channel interference. In [4], the authors study the applicability of a
low complexity MUD based on soft interference cancellation [13]. In both papers, the advantage of the
3
In this paper, we generalize the analysis of [3] by supplying an information-theoretic framework which
allows us to evaluate the performance in terms of information rate (IR), without the need of lengthy
error rate simulations, and hence strongly simplifying the comparison of various strategies and scenarios.
The main results of this investigations are also reported in [14]. Furthermore, we consider two additional
transmission strategies, where the signals intended for the two beams cooperate to serve the two users
(one in the first beam and the other in the second one). In one case, the two users in the adjacent beams
are served consecutively in a time division multiplexing fashion, instead of being served simultaneously.
This approach is also considered in [5], [14]. In the other case, we consider the Alamouti space-time
block code [15], consisting in the two satellites exchanging the transmitted signals in two consecutive
transmissions.
Finally, we show that the theoretical limits predicted by the information-theoretic analysis can be
approached by practical coded schemes. As expected, the Alamouti precoding based schemes work well
with the standard DVB-S2(X) modulation and coding formats (ModCods), designed for an interference-free
scenario. On the other hand, we observe that DVB-S2(X) ModCods are not suitable for multiuser detection
means of an extrinsic information transfer (EXIT) chart analysis [18]. We start by considering DVB-
S2(X) ModCods and quantify the loss with respect to the theoretical limits. Once identified the reasons
for this performance loss, we prove that a large gain can be obtained from a redesign of the code and/or
According to the information-theory literature, the multibeam satellite channel is a broadcast channel,
with the satellite serving multiple users on the ground. Particularly, we are in the case of a multiple-input
multiple-output (MIMO) broadcast channel, since we have multiple antennas at the transmitter (for the
different beams).1 Nevertheless, we do not use the results concerning the broadcast channel capacity since
we are not interested in the ultimate performance limits of the considered scenario. Our work focuses,
1
This definition of broadcast channel collides with the one commonly adopted in the satellite communication literature. In fact, in the
satellite community, a broadcast transmission refers to the case where one transmitter sends common information to several receivers, in
instead, on the gain that can be achieved by one specific user if it employs a more involved detector,
i.e., a MUD, when the receivers of the other users are not necessarily modified. In other words, we want
to understand if and when it is worth to use a MUD to decode also the signal which is not intended
for the reference user. For this aim, the theory of broadcast channels is not helpful and instead we
borrow ideas from the Multiple Access Channel (MAC) [16]. Furthermore, it is known that the sum-rate
capacity of the MIMO broadcast channel is achieved by means of dirty-paper coding [17], but nonlinear
precoding leads to several problems when going to the practical implementation in satellite systems, as
the channel estimation, the synchronization and the non-linear effects introduced by the satellite amplifier
In the following, Section II presents the system model and describes the three considered strategies and
related detection techniques. The information-theoretic analysis is addressed in Section III, and gives us
the necessary means for the computation of the IR for the reference beam. The EXIT chart analysis is
described in Section IV. Section V presents the results of our study, whereas conclusions are drawn in
Section VI.
We focus on the forward link (i.e., the link from the gateway to the user terminals through the satellite) of
a multibeam satellite communication system for broadband interactive services, as illustrated in Figure 1.
In this scenario, the service area is divided into small beams in order to reuse the frequency spectrum
and hence to improve the spectral efficiency. As an example, a 4-color frequency reuse scheme is shown
in Figure 2, where beams with the same color use the same bandwidth. In a 4-color frequency reuse
scheme, the interference is very limited and can be neglected at the receiver. Thus, at the receiver, a SUD
is employed. A more aggressive frequency reuse can be adopted with the aim of improving the system
spectral efficiency. Figure 3 depicts the case of a 2-color frequency reuse scheme. In this latter case, a
SUD is still used at the receiver although the interference can be significant.
Assuming an ideal feeder link (i.e., the link between the gateway and the satellite), Figure 4 depicts
a schematic view of the baseband model we are considering. Signals si (t), i = 1, . . . , K, are K signals
transmitted by a multibeam satellite in the same frequency band. The satellite is thus composed of K
5
11111
00000
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
11111
00000
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
00000
11111
Gateway
Figure 1: Forward link of a multibeam satellite system. Circles in the satellite service area represent
beams.
transmitters (i.e., transponders) and serves K users on the ground. The nonlinear effects related to the high
power amplifiers which compose the satellite transponders are neglected since a multibeam satellite often
works in a multiple carriers per transponder modality, and hence the operational point of its amplifiers
is far from saturation [1]. We consider the case where the users experience a high level of co-channel
interference, since we assume that they are located close to the edge of the coverage area of a beam and
that an aggressive frequency reuse is applied (i.e., a number of colors lower than 4).
6
s1 (t)
Transponder 1 User 1
Transmit antennas
+
channel
sK (t)
Transponder K User K
where γi are proper complex gains, assumed known at the receivers, and w(t) is the thermal noise.
Without loss of generality, we assume that “User 1” is the reference user and that r(t) is its received
signal. We also assume that γ1 = 1, that |γi | ≥ |γi+1 |, and that the satellite has no way to modify the
gains. The satellite could, in principle, change the power for each user, but this is not done in practice for
the following reason. In a unicast scenario, if we consider a given frequency bandwidth, different users
in a beam are served in time-division-multiplexing mode. Hence, different frames are sent to different
users. These users can have different propagation conditions (e.g., some of them can experience rain
7
attenuation) and interference. To take this into account, different ModCods are selected for the different
users, in the so-called ACM (Adaptive Coding and Modulation) mode. As a consequence, different frames
will use different modulation and coding formats. The gateway could also try to modify the power for
each transmitted frame, and thus for each user. However, satellite transponders are equipped with analog
automatic gain control circuits, which are very slow. A change in the power, frame by frame, would
introduce strange amplitude fluctuations that the system cannot cope with. Hence, a modification of the
power allocation is not an option, at least considering the present transponder architecture.
We will evaluate the performance of the reference user considering the following three strategies, which
Strategy 1. Signal si (t) is intended for user i, and we are interested in the evaluation of the performance
for “User 1”, whose information is carried by the signal with i = 1. For this case, we evaluate the IR
when “User 1” employs different detectors. In particular, we consider the case when “User 1” adopts:
• A SUD. Here, all interfering signals si (t), i = 2, . . . , K are considered as if they were additional
• A MUD for the useful signal and one interferer. In this case, the receiver is designed to detect
the useful signal and the most powerful interfering signal (that with i = 2 in our model), which
is assumed to adopt a fixed rate, whereas all the remaining signals are considered as if they were
additional thermal noise. Data related to the interfering signal are discarded after detection. This
case will be called MUD×2 in the following. The complexity will be clearly larger than that of the
The aim of this analysis is to evaluate the performance improvement that can be obtained by simply using
a more sophisticated receiver at the user terminal with no modifications of the present standard. In other
words, this strategy is perfectly compliant with the DVB-S2(X) standard, since it simply requires the
adoption of a different receiver. Our analysis can be easily extended to a MUD designed for more than
two users although, given the actual signals’ power profile, it has been shown in [3] that the MUD×2
Strategy 2. A different transmission strategy, requiring a modification at medium access control layer with
respect to the previous case, is adopted in this case. Hence, in order to adopt this strategy, a modification
8
of the DVB-S2(X) standard is required. Without loss of generality, we will consider detection of signals
s1 (t) and s2 (t) and users 1 and 2 only. As in scenario 1, the remaining signals are considered as additional
thermal noise. Instead of simultaneously transmitting signal s1 (t) to “User 1” and signal s2 (t) to “User 2”,
as in the previous scenario, we here serve “User 1” first by employing both signals s1 (t) and s2 (t) for a
fraction α (0 ≤ α ≤ 1) of the total time, and then “User 2” by employing both signals s1 (t) and s2 (t)
for the remaining fraction 1 − α of the total time. From a system point of view, in order to maximize the
throughput at system level, the best thing to do would be to serve the user with the best channel only.
However, this would not be fair, since the user with the worst channel would never be served. Satellite
operators are typically interested in serving each of the two users for half of the time or in trying to
serve the users taking into account their different data rate needs. Signals s1 (t) and s2 (t) are independent
(although carrying information for the same user). The receiver of each user must jointly detect both
signals and its complexity is comparable to that of the MUD×2 described for the first scenario.
In strategies 1 and 2, s1 (t) and s2 (t) are properly phase-shifted in order to maximize the IR.2
Strategy 3. As in the first strategy, s1 (t) is for “User 1” and s2 (t) for “User 2”. We use two transponders
to implement the Alamouti precoder [15]. Unlike what happens in [15], we do not use the Alamouti
scheme to achieve a diversity gain, but as a way of orthogonalizing the two signals. In this scheme, the
two transmitters exchange the two information symbols in two successive transmission intervals. At the
receiver, two consecutive observed samples are properly processed in order to remove the interference,
and then fed to two SUDs. In this way, we can always transmit fully overlapped signals and perform
only lower complexity operations at the receiver. To preserve the orthogonality of the two signals, in this
approach, the same information has to be transmitted twice over two consecutive intervals. The IR is thus
In this section, we describe how to compute the IR related to “User 1” assuming the previously described
strategies. This analysis gives us the ultimate performance limits of the considered satellite system, which
We start considering strategy 1, and describe how to compute the IR of “User 1” assuming the MUD×2
receiver. The same technique can be used to compute the IR related to “User 2” and straightforwardly
extends to the case of MUD for more than two users. The channel model assumed by the receiver is
y = x1 + γ2 x2 + w , (2)
where xi is the M (i) -ary complex-valued symbol sent over the i-th beam and w collects the thermal
noise, with power N , and the remaining interferers that the receiver is not able to cope with. Symbols
x1 and x2 are mutually independent and distributed according to their probability mass function (pmf)
P (xi ). They are also properly normalized such that E{|xi |2 } = P , where P is the transmitted power per
user. The parameter γ2 is complex-valued and models the power imbalance and the phase shift between
the two signals. The random variable w is assumed complex and Gaussian. We point out that this is
an approximation exploited only by the receiver, while in the actual channel the interference is clearly
generated as in (1). The MUD×2 receiver has a computational complexity which is proportional to the
We are interested here in the computation of the maximum achievable rate R1 for “User 1” when
“User 2” adopts a fixed rate R2 , and the MUD×2 is employed. Rates are defined as Ri = r(i) log2 M (i) ,
where r(i) is the rate of the adopted binary code. The rates of the other K − 2 interferers do not affect our
results since, at the receiver, they are treated just as noise. This problem is quite different with respect
to the case of the MAC discussed in [16] where both rates (R1 , R2 ) are jointly selected. In this case, in
fact, the information coming from the second transmitter is not intended for “User 1”. Hence, the rate R2
The IR for “User 1” in the considered scenario is given by Theorem 1, whose proof is based on the
following two lemmas. An alternative proof can be found in [21]. The first one defines the maximum rate
R2
I2
I1 IJ R1
is achievable by “User 1” and is not a continuous function of P/N . Namely, a cut-off signal-to-noise
ratio SNRc exists such that IA = 0 for P/N ≤ SNRc and IA > 0 for P/N > SNRc with a discontinuity.
Proof: In [16], it is shown that the achievable region for the MAC is given by the region of points
An example of such a region is shown in Figure 5. If R2 is constrained to a given value, we derive from
We now prove that IA has a cut-off rate. Since, I(x2 ; y|x1 ) is a non-decreasing function of P/N [22],
IA (SNRc ) = 0.
On the other hand, for a small ε > 0, it holds R2 = I(x2 ; y|x1 ) − δ where δ > 0. It follows that
for ε → 0+ .
Discussion: The proof of the lemma can be done graphically by considering the intersection of the
When R2 > I(x2 ; y|x1 ) clearly the rate of “User 2” cannot be achieved. However, we also have to
account for this case, and therefore we consider also the achievable rate I(x1 ; y), which is the relevant
rate when “User 2” is just considered as interference. In this case, the receiver exploits the statistical
knowledge of the signal s2 (t) but does not attempt to recover the relevant information. Particularly, the
Lemma 2. The rate IS (P/N ) = I(x1 ; y) as a function of P/N is always greater than 0 and satisfies
Proof: The proof is straightforward. It can be done by observing that I(x1 ; y) ≤ I(x1 ; y|x2 ) and that
The computation of the IRs I(x1 ; y|x2 ), I(x2 ; y|x1 ), I(x1 , x2 ; y), I(x1 ; y) in the presence of interferers
with i > 2 not accounted for at the receiver can be performed by using the achievable lower bound based
12
R1 IA
I(x1 ; y|x2 ) IS
max. R1
I(x1 ; y)
on mismatched detection [23]. Having defined IA and IS as the maximum rates achievable by “User 1”
when the signal for the other user can be perfectly decoded, or not, we can now compute the IR for
Theorem 1. The achievable information rate for a single user on the two users multiple access channel,
Proof: The proof is based on Lemma 1 and 2. In fact, IA and IS are the maximum rates achievable
by “User 1” when the signal for “User 2” can be perfectly decoded, or not. An alternative graphical proof
can be derived from Figure 6, which plots the rate achievable by “User 1” as a function of R2 , for a
generic fixed value of P/N . We clearly see that inequality (6) is satisfied.
N
P |γ2 |2
G P
if R2 ≥ G ,
2N +P |γ2 | N
where G(x) = log2 (1 + x). All curves are shown in Figure 7, for the case of |γ2 | = 0.79, R2 = 1/2,
and the overall bound is given by the red curve. We can see from the figure that this bound is clearly
13
3.5
G(P/N
)
2
G (1 + |γ2 | )P/N − R2
3 G P/(N + |γ2 |2 P )
max. R1
2.5
IR [bit/symb]
1.5
0.5
0
-10 -5 0 5 10
P/N [dB]
Figure 7: Maximum rate achievable by “User 1”, for K = 2, Gaussian symbols, and R2 = 1/2.
continuous.
When a SUD is employed at the terminal, the theoretic analysis can be based on the following discrete-
time model
y = x1 + w , (7)
where w includes the thermal noise and the interferers that the receiver ignores. Note that we again use
mismatched detection [23] here, i.e., in the Montecarlo average to compute I(x1 ; y) we use the received
samples y coming from the real channel whereas the detector is assumed to be designed for the auxiliary
channel model (7). As known, the complexity of the SUD is much lower than that of the multiuser
receiver, and is proportional to M (1) . The computation of the IR I(x1 ; y) allows us to select the maximum
rate for “User 1” when the co-channel interference is not accounted for.
We now consider strategy 2 and, without loss of generality, we consider the fraction α of time when
14
both signals s1 (t) and s2 (t) are used to send information to “User 1”. The receiver is based on the channel
model (2), but now the rate of signal s2 (t) is not fixed. Since s1 (t) and s2 (t) are independent, we are
exactly in the case of the MAC and, by properly selecting the rate of the two signals, any point of the
capacity region can be achieved [16]. Clearly, since s1 (t) and s2 (t) are now both intended for the same
user, we are interested in selecting the two rates in such a way that the sum-rate I(x1 , x2 ; y) is maximized.
In strategy 3, due to the adoption of the Alamouti precoding, two consecutive samples at the terminal
yA,1 = x1 + γ2 x2 + wA,1
where wA,1 , wA,2 include independent Gaussian noise samples and the remaining interferers. After the
and is still a sufficient statistic for detection. The noise samples w̃A,i are statistically equivalent to wA,i .
The information carried by ỹA,2 is discarded and the IR for “User 1” is that of an interference free channel
with SNR (1 + |γ2 |2 )P/N , divided by 2 for the reason already explained.
In this section, we analyze the convergence behaviour of the considered strategies based on multiuser
detection by means of an EXIT chart analysis [18]. The aim is to evaluate the effectiveness of iterative
decoding/detection schemes in strategy 1 and strategy 2, and to design novel practical systems with
In the following description, we assume the presence of only two independent signals, those processed
by the receiver of “User 1”, but the results in Section V are generated according to the general model (1).
Each transmitted signal is obtained through a concatenation of a code with a modulator through a
bit interleaver. The information data of signal i is encoded by encoder Ci of rate r(i) into codeword vi ,
which is interleaved and mapped through a modulator Mi onto a sequence of M (i) -ary symbols xi . Here
the channel model is the vectorial extension of the model (2) which allows us to consider sequences of
15
−1
symbols. The iterative decoding/detection scheme consists of a multiuser detection module CMU , and 2 a
posteriori probability decoders C1−1 and C2−1 matched to encoders C1 and C2 of the two transponders. The
The soft-input soft-output (SISO) MUD exchanges soft information with the two decoders C1−1 and
C2−1 , in an iterative fashion. More generally, the detector and the decoders can also be composed by SISO
blocks. In this work, we focus on low-density parity-check (LDPC) codes, whose decoder is composed
of sets of variable and check nodes (the variable-node decoder (VND) and check-node decoder (CND)).
Iterative decoding is performed by passing messages between variable and check nodes.
The global iterative detection/decoding process can then be tracked using a multi-dimensional EXIT
chart [18]. Alternatively, the EXIT functions of the constituent decoders and of the MUD can be properly
combined and projected into a two-dimensional chart [24]. Similar to a system composed by only two
SISO blocks, the convergence threshold of our system can be visualized as a tunnel between the two
The system in Figure 8 can represent both strategy 1 and strategy 2. We recall that in the first scenario
the information to recover is conveyed by signal 1 only, while the rate of the other signal is fixed. Our
design will be thus aimed at finding a good code C1 , while the code for the other signal cannot be changed
and will be chosen among those foreseen by the DVB-S2(X) standard. For strategy 2, the scheme in
Figure 8 is representative of the fraction of time in which both signals are carrying information for
“User 1”. In this case, we assume to have the freedom to choose the code of the two signals and also to
V. N UMERICAL R ESULTS
In this section, we will first compare the three described strategies in terms of IR under different
conditions. We will then try to approach the information-theoretic results with practical modulation and
coding formats.
A. Information-Theoretic Analysis
We assume as reference system the DVB-S2 standard [1]. We choose a 2-color frequency reuse scheme
to generate a high co-channel interference. We assume that “User 1” is located close the edge of the
16
C1 v1 π1 M1 x1 π1−1 C1−1
−1
CMU
C2 v2 π2 M2 x2 π2−1 C2−1
w
γ
Case λ2 λ3 λ4 λ5 λ6
1 0 dB 25 dB 25 dB 27 dB 30 dB
2 2 dB 26 dB 26 dB 27 dB 30 dB
3 4 dB 27 dB 26 dB 27 dB 30 dB
coverage area of its beam. To identify the interference, we define the signal-to-interference power ratio as
λi = |γ1 |2 /|γi |2 ,
and consider three realistic cases which have a different power profile, and are listed in Table I. These
distributions correspond to 3 different positions for “User 1” and are typical of the forward link of a
For the first two strategies, we assume that “User 1” adopts a QPSK modulation, therefore the signal
with i = 1 in strategy 1, and signals 1 and 2 in strategy 2 use a QPSK. This is reasonable since we are
considering the presence of a strong interfering signal and thus a modulation with a low cardinality will
be selected. “User 1”, in strategy 3, adopts a 16APSK modulation so that we have the same receiver
complexity as in strategy 2. In the case of strategy 1, the performance is heavily affected by the rate of
“User 2”: in order to fix the rate of signal 2, we consider the ModCod distribution shown in Figure 9.
The other signals adopt the following modulation formats in all strategies: 8PSK for signals with i = 3, 4
and 6, and 16APSK for the signal with i = 5 (although only their power really matters). In the case of
0.25
0.2
pmf (ModCod)
0.15
0.1
0.05
0
QPSK-1/4
QPSK-1/3
QPSK-2/5
QPSK-1/2
QPSK-3/5
QPSK-2/3
QPSK-3/4
QPSK-4/5
QPSK-5/6
8PSK-3/5
8PSK-2/3
8PSK-3/4
8PSK-5/6
16APSK-2/3
16APSK-3/4
16APSK-4/5
Figure 9: Typical ModCod distribution.
Figures 10–12 show the IR, measured in bit per symbol, of “User 1” as a function of P/N for the
three considered interference profiles listed in Table I. In the case of strategy 1, we evaluate both the IR
achievable by a SUD and that achievable by the MUD×2 algorithm, and the reported curves are obtained
by computing the IRs when “User 2” adopts the ModCods in Figure 9 and then averaging according to
their distribution.
Our results show that we cannot identify the strategy which universally achieves the best performance.
In particular, the figures show that “User 1” has the best IR in strategy 2 and strategy 3 in the first
case, where the interference of the second signal is very strong, while in the third case it has higher
IR in strategy 1 for low-to-medium SNR values. In the second case the three strategies offer similar
performance when the MUD is applied in strategy 1. As expected, in strategy 1 the adoption of the
MUD gives a better result than the SUD, and this is at the price of an increased complexity. In case 3,
18
2.5
SUD, Strategy 1
MUD, Strategy 1
Strategy 2
2 Strategy 3
IR [bit/symb]
1.5
0.5
0
−10 −5 0 5 10 15 20
P/N [dB]
Figure 10: Information rate of “User 1” for case 1.
the SUD gives very good IRs and hence it is the best choice to compromise between complexity and
It is worth noting that, while all the proposed strategies are very effective when “User 1” is close to
the edge of the beam, this is not always true if the user is located at the center of the beam. In Figure 13,
we report the IR in a case in which the power of the signal s2 (t) is very low. The related signals’ power
profile is given in Table II. In this case, the best strategy is the classical one, and the IR in the case of
strategy 2 is highly degraded since half of the data for “User 1” cannot be recovered, due to the very
low value of |γ2 |. This fact calls for a performance evaluation at system level.
19
2.5
SUD, Strategy 1
MUD, Strategy 1
Strategy 2
2 Strategy 3
IR [bit/symb]
1.5
0.5
0
−10 −5 0 5 10 15 20
P/N [dB]
Figure 11: Information rate of “User 1” for case 2.
Table II: Interference profile when “User 1” is at the center of the beam.
Case λ2 λ3 λ4 λ5 λ6
4 27 dB 27 dB 26 dB 27 dB 30 dB
B. Code Design
We now consider practical ModCods for multiuser detection and for the Alamouti precoder, and we
focus on the gap between practical and theoretical performance. In the following, we do not consider
the SUD of strategy 1. As shown by the information-theoretic analysis, it is not easy to compare the
three strategies, since the best strategy depends on the power profile of the interfering signals, the rates
of the signals, and the SNR. Figure 14 shows the IR in case 1. In strategy 1, the IR curve is no more
20
2.5
SUD, Strategy 1
MUD, Strategy 1
Strategy 2
2 Strategy 3
IR [bit/symb]
1.5
0.5
0
−10 −5 0 5 10 15 20
P/N [dB]
Figure 12: Information rate of “User 1” for case 3.
the average IR with respect to the distribution in Figure 9, but the signal s2 (t) is assumed to adopt an
8PSK. We first consider ModCods based on the LDPC codes of rate 1/2 and 3/43 with length 64800 bits
of the DVB-S2 standard, with the related interleavers. In strategy 1, we use the rate 3/4 LDPC code for
signal s2 (t), in order to simulate the most probable ModCod according to the distribution in Figure 9. In
the first two strategies, we consider iterative detection and decoding and allow a maximum of 50 global
iterations. The BER results have been computed by means of Monte Carlo simulations and are reported
These results show that schemes based on the Alamouti precoding and the codes of the standard
have good performance, being the loss with respect to the corresponding IR curve around 1 dB. This is
because interference is perfectly removed at the receiver. On the contrary, the loss of practical ModCods
3
The adoption of these two code rates for “User 1” corresponds to IR 1 and 1.5 bit/symbol, respectively.
21
2.5
SUD, MUD, Strategy 1
Strategy 2
Strategy 3
2
IR [bit/symb]
1.5
0.5
0
−10 −5 0 5 10 15 20
P/N [dB]
Figure 13: Information rate of “User 1” when it is located at the center of the beam (case 4).
with respect to the IR limits is high for both strategies 1 and 2, being about 2 and 4 dB at IR = 1 and
1.5 bit/symbol, respectively. This is due to the fact that DVB-S2(X) codes have been optimized for an
interference-free scenario.
In the following sections, we try to reduce this loss by redesigning the code of “User 1”. Furthermore,
we propose a bit mapping which is jointly implemented for signals 1 and 2 in strategy 2, where we have
greater design freedom since both signals are for “User 1”. Our design approach is based on EXIT charts:
this tool is able to point out the limits of the DVB-S2 based ModCods and provide very useful insights
1) LDPC design for iterative detection/decoding: Figure 15 shows the EXIT chart for strategy 2 in
case 1. The mutual information (MI) curve of the MUD has been obtained for P/N = 3 dB, while the
considered codes have rate 1/2. Let us first focus on the MI curve of the LDPC code of the DVB-S2
22
2.5
IR, Strategy 1
IR, Strategy 2
IR, Strategy 3
2 ModCods, Strategy 1
ModCods, Strategy 2
ModCods, Strategy 3
IR [bit/symb]
1.5
0.5
0
−10 −5 0 5 10 15 20
P/N [dB]
Figure 14: IR and ModCods of “User 1” in case 1. ModCods are based on DVB-S2 LDPC codes.
standard. The EXIT chart analysis reveals that the DVB-S2 codes do not fit the detector, which means
that codes designed for systems employing single-user detection in an interference-free scenario are not
the best choice for the considered MUD schemes. The EXIT chart of strategy 1 has similar features.
The EXIT chart analysis clearly suggests that in our scenario we need an LDPC that is more powerful at
23
1
MUD
MUD, new mapping
New LDPC
0.8
MI at the output of the MUD
DVB-S2 LDPC
0.6
0.4
0.2
0
0 0.2 0.4 0.6 0.8 1
MI at the input of the MUD
Figure 15: EXIT chart for strategy 2 in case 1 at P/N = 3 dB.
Table IV: BER versus information rate. Performance of new LDPC codes compared to DVB-S2 codes in
case 1.
rate IR th. DVB Code (gap) New Code (gap) phase shift
the beginning of the iterative process, to have a better curve matching between detector and decoder. This
is not surprising, since, in interference-limited channels, a SISO detector is effectively able to mitigate
the interference when the information coming from the decoders is somehow reliable. In other words,
we mainly need a good head start. We adopt the heuristic technique for the optimization of the degree
24
distribution of the LDPC variable and check nodes proposed in [25]. This method consists of a curve fitting
on EXIT charts. We optimize the VND and CND distribution, limiting for simplicity our optimization
procedure to codes with uniform check node distribution and only three different variable node degrees.
Using this approach, for each strategy in case 1 we design a rate-1/2 and a rate-3/4 LDPC code,
whose parameters are summarized in Table III. The EXIT curve of the new LDPC code with rate-1/2 for
strategy 2 is shown in Figure 15. We found other degree distributions with better EXIT curves matching
but with poor error floor when used with finite block length.4
The codes of length 64800 are then obtained by using the PEG algorithm [27]. In the simulations using
the new codes with rate 3/4, we decreased the SNR used by the MUD by 0.5 and 0.25 dB in strategy 1
and strategy 2, respectively. In effect, the increase of the noise variance to be set at the receiver improves
the performance at high IR where the presence of interference not accounted by the MUD is more critical
than for lower IRs. Moreover, for strategy 2 we used two different codes, but with the same degree
distribution, for the two signals in order to increase the diversity between them.
Table IV summarizes the BER results at IR 1 and 1.5 bit/symbols in terms of convergence threshold,
defined as the P/N corresponding to a BER of 10−4 . We also report the achievable IR limit in P/N
obtained through the information-theoretic analysis and the phase shift between the signals s1 (t) and s2 (t).
The results show that the gap between the theoretical and the convergence thresholds can be reduced thanks
2) Joint bit mapping for strategy 2: After the observation of the poor match between the curves in the
EXIT chart, in Section V-B1 we have seen how to improve the threshold by properly changing the code.
Here we propose an alternative approach which is focused on the MI curve of the detector. In particular,
we propose a joint mapping of the bits of the two signals in strategy 2, which works exceptionally well
in conjunction with the DVB-S2 codes. The idea comes from the fact that transmitting a single signal
with Gray mapping gives rise to a practically horizontal EXIT curve for the detector [28], that is exactly
Let us assume that M (1) = M (2) = M and that the two signals are phase shifted of an angle equal to
4
In order to improve the finite length performance, the optimization of the code degree distributions could be used jointly with other
1
1 2
+
0 0
= 0
−1
−1 −2
−1
−1 0 1 −2 −1 0 1 2
−1 0 1
1
1 2
1
+
0 0
= 0
−1
−1 −2
−1
−1 0 1 −2 −1 0 1 2
−1 0 1
Figure 16: Joint constellations resulting from two QPSK (top) and from two 8PSK (bottom) constellations.
π/M . This last choice grants a simple design of the mapping for the resulting constellation and an IR
that is close the optimal one. Given two M PSK constellations, it is easy to see that, if we rotate one of
them by π/M , the resulting joint constellation is formed by M/2 circles, each composed of 2M equally
spaced points. Two examples are shown in Figure 16, for M = 4 (top) and 8 (bottom). We then need
to design a good mapping for the joint constellation. Since we have M 2 points, we need log2 (M 2 ) bits.
We choose to use the first log2 (M/2) bits to identify the circle, and the remaining log2 (2M ) bits to label
the points on each circle. Mapping is Gray on each circle and also between adjacent circles. The selected
joint mapping is shown in Figure 17 for two QPSK constellations, where the first bit identifies the circle,
and the remaining three bits label the points. The EXIT curve of the MUD with joint mapping has smaller
slope than that related to the classical mapping, and it is shown in Figure 15.
A similar approach can be applied in strategy 1, but in this case we can modify only the mapping of
signal s1 (t). An example is shown in Figure 18, for two QPSK constellations: on the left we show the
26
1011 1001
1.5
0110 0100
−0.5
1110 0111 0101 1100
−1
−1.5
1111 1101
−2
−2 −1.5 −1 −0.5 0 0.5 1 1.5 2
classical mapping, on the right the new mapping, where in red we have the bits of “User 1” and in black
the bits of “User 2”, which we are not allowed to modify. We can see that the new mapping is more
similar to a Gray mapping than the standard one, in the sense that the distance among adjacent symbols
is decreased.
The BER performance of the joint mapping in strategy 2 is reported in Figure 19 for the three power
27
2 2
1 1
−1.5 −1.5
1011 1010 1111 1110
−2 −2
−2 −1.5 −1 −0.5 0 0.5 1 1.5 2 −2 −1.5 −1 −0.5 0 0.5 1 1.5 2
Figure 18: Joint mappings for strategy 1. Classical (a) and new (b) mapping.
profiles in Table I. Both signals s1 (t) and s2 (t) adopt QPSK modulation and DVB-S2 codes with rate 1/2.
The results are compared with the curves of the standard which refer to the classical mapping and with
the related IR thresholds. We observe that the joint mapping improves the performance of the reference
curves and the gap with respect to the IR threshold is around 1 dB in all cases.
VI. C ONCLUSIONS
We considered the forward link of a multibeam satellite system, and investigated different transmis-
sion/detection strategies to increase the achievable rate in the presence of strong co-channel interference.
As expected, multiuser detection allows a significant gain with respect to single-user detection when the
user terminal is close to the edge of the coverage area of its beam. However, it is surprising that the
other two strategies requiring modifications at medium access control layer, that based on the use of
two transponders to serve consecutively two users and that based on the use of the Alamouti precoder,
can sometimes provide even larger gains, although when the interference is negligible (i.e., when the
user terminals is in the center of the beam) a significant loss has to be expected from their use. The
conclusive picture is thus complex, since our results show that a transmission/detection strategy which is
28
100
case 1
case 2
case 3
10−1
BER
10−2
Convergence th. case 1
10−4
1 2 3 4 5 6
P/N [dB]
Figure 19: BER curves for “User 1” in the case of strategy 2 for the three interference patterns.
Comparison between joint mapping (continuous line) and classical mapping (continuous line with circles).
universally superior to the others does not exist, but the performance depends on several factors, such as
the SNR, the interference profile, and the rate of the strongest interferer. This fact outlines the importance
of the proposed analysis framework, which can avoid to resort to computationally intensive simulations.
Its extension to perform a system analysis, averaging the results on all possible interference profiles within
Finally, we bore evidence that DVB-S2(X) codes, designed for an interference-free scenario, are not
suited when a significant interference is present. A proper redesign of the code and/or of the bit mapping
R EFERENCES
[1] ETSI EN 302 307-1 Digital Video Broadcasting (DVB), Second generation framing structure, channel coding and modulation systems
for Broadcasting, Interactive Services, News Gathering and other broadband satellite applications, Part I: DVB-S2. Available on ETSI
[2] ETSI EN 302 307-2 Digital Video Broadcasting (DVB), Second generation framing structure, channel coding and modulation systems
for Broadcasting, Interactive Services, News Gathering and other broadband satellite applications, Part II: S2-Extensions (DVB-S2X).
[3] S. Andrenacci, M. Angelone, E. A. Candreva, G. Colavolpe, A. Ginesi, F. Lombardo, A. Modenini, C. Morel, A. Piemontese, and
A. Vanelli-Coralli, “Physical layer performance of multi-user detection in broadband multi-beam systems based on DVB-S2,” in Proc.
[4] G. Cocco, M. Angelone, and A. I. Perez-Neira, “Co-channel interference cancellation at the user terminal in multibeam satellite systems,”
in Proc. 7th Advanced Satell. Mobile Syst. Conf. and 13th Intern. Workshop on Signal Proc. for Space Commun. (ASMS&SPSC 2014),
[5] M. Caus, A. I. Perez-Neira, M. Angelone, and A. Ginesi, “An innovative interference mitigation approach for high throughput satellite
systems,” in Proc. IEEE Intern. Work. on Signal Processing Advances for Wireless Commun., (Stockholm, Sweden), pp. 515–519,
June-July 2015.
[6] A. Piemontese, A. Graell i Amat, and G. Colavolpe, “Frequency packing and multiuser detection for CPMs: how to improve the spectral
efficiency of DVB-RCS2 systems,” IEEE Wireless Commun. Letters, vol. 2, pp. 74–77, Feb. 2013.
[7] B. F. Beidas, H. El Gamal, and S. Kay, “Iterative interference cancellation for high spectral efficiency satellite communications,” IEEE
[8] G. Colavolpe, D. Fertonani, and A. Piemontese, “SISO detection over linear channels with linear complexity in the number of interferers,”
IEEE J. Sel. Topics in Signal Proc., vol. 5, pp. 1475–1485, Dec. 2011.
[9] M. L. Moher, “Multiuser decoding for multibeam systems,” IEEE Trans. Veh. Tech., vol. 49, pp. 1226–1234, July 2000.
[10] N. Letzepis and A. J. Grant, “Capacity of the multiple spot beam satellite channel with Rician fading,” IEEE Trans. Inform. Theory,
[11] J. Arnau and C. Mosquera, “Multiuser detection performance in multibeam satellite links under imperfect CSI,” in Proc. Asilomar
Conf. Signals, Systems, Comp., (Pacific Grove, CA), pp. 468–472, Nov. 2012.
[12] D. Christopoulos, S. Chatzinotas, J. Krause, and B. Ottersten, “Multi-user detection in multibeam mobile satellite systems: A fair
performance evaluation,” in Proc. Vehicular Tech. Conf., (Dresden, Germany), pp. 1–5, June 2013.
[13] P. D. Alexander, A. J. Grant, and M. C. Reed, “Iterative detection on code-division multiple-access with error control coding,” European
[14] G. Colavolpe, A. Modenini, A. Piemontese, and A. Ugolini, “On the application of multiuser detection in multibeam satellite systems,”
in Proc. IEEE Intern. Conf. Commun., (London, UK), pp. 898–902, June 2015.
[15] S. M. Alamouti, “A simple transmit diversity technique for wireless communications,” IEEE J. Select. Areas Commun., vol. 16,
[16] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York: John Wiley & Sons, 2nd ed., 2006.
30
[17] G. Caire and S. Shamai (Shitz), “On the achievable throughput of a multiantenna Gaussian broadcast channel,” IEEE Trans. Inform. The-
[18] S. ten Brink, “Convergence behavior of iteratively decoded parallel concatenated codes,” IEEE Trans. Commun., vol. 49, pp. 1727–1737,
Oct. 2001.
[19] G. Colavolpe, A. Modenini, A. Piemontese, and A. Ugolini, “Multiuser detection in multibeam satellite systems: Theoretical analysis
and practical schemes,” in Proc. IEEE Intern. Work. on Signal Processing Advances for Wireless Commun., (Stockholm, Sweden),
[20] S. Verdú, Multiuser Detection. Cambridge, UK: Cambridge University Press, 1998.
[21] W. Nam, D. Bai, J. Lee, and I. Kang, “Advanced interference management for 5G cellular networks,” IEEE Commun. Mag., vol. 52,
[22] D. Guo, S. Shamai, and S. Verdú, “Mutual information and minimum mean-square error in Gaussian channels,” IEEE Trans. In-
[23] N. Merhav, G. Kaplan, A. Lapidoth, and S. Shamai, “On information rates for mismatched decoders,” IEEE Trans. Inform. Theory,
[24] F. Brännström, L. K. Rasmussen, and A. J. Grant, “Convergence analysis and optimal scheduling for multiple concatenated codes,”
IEEE Trans. Inform. Theory, vol. 51, pp. 3354–3364, Sept. 2005.
[25] S. ten Brink, G. Kramer, and A. Ashikhmin, “Design of low-density parity-check codes for modulation and detection,” IEEE Trans.
[26] G. Liva, W. E. Ryan, and M. Chiani, “Quasi-cyclic generalized LDPC codes with low error floors,” IEEE Trans. Commun., vol. 56,
[27] H. Xiao and A. H. Banihashemi, “Improved progressive-edge-growth (PEG) construction of irregular LDPC codes,” IEEE Commun.
[28] S. ten Brink, “Designing iterative decoding schemes with the extrinsic information transfer chart,” AEU Int. J. Electronic. Commun.,