IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 45, NO. 6, JUNE 1997 625 Erasure Generation and Interleaving for Meteor-Burst Communications with Fixed-Rate and Variable-Rate Coding Carl W. Baum and Clint S. Wilkins Abstract— Erasure-generation techniques are investigated in conjunction with symbol interleaving as methods to improve the performance of meteor-burst communication systems. Erasure generation via Viterbi’s ratio-threshold test (RTT) and a Bayesian scheme are both considered. It is found that a system using fixedrate coding, interleaving, and erasure generation can significantly outperform more complex variable-rate coding schemes which do not use erasures. Index Terms— Meteor-burst communications, Reed–Solomon codes, variable-rate codes. I. INTRODUCTION M UCH attention has been devoted to the performance of meteor-burst systems using error-control coding [1]–[9]. Published work includes analysis of fixed- and variable-rate Reed–Solomon (RS) coding [3], [4] and automatic-repeat-request schemes [5], [6]. This paper investigates the use of erasure generation and symbol interleaving on the performance of meteor-burst systems that employ RS coding. Two erasure-generation techniques are considered. The first technique involves comparisons of envelope detector outputs and is known as Viterbi’s ratio-threshold test (RTT) [10]–[12]. The second technique is based on Bayesian decision theory and is an extension of a method used for mitigating partial-band interference in frequency-hop spread-spectrum communication systems [13]. II. SYSTEM AND CHANNEL MODELS The communications protocol considered here is the same as that described in [3], in which detection of a meteor trail requires that the transmitting terminal signal monitor the probe signal power. Once the probe is detected, a single packet of fixed information content is sent over the trail. We let denote the number of RS code words in a particular packet. All code words are singly extended and have length , which is also the alphabet size and a power of two. The system . employs -ary orthogonal modulation, where The meteor-burst channel is characterized by a time-varying signal amplitude and additive white Gaussian noise with two. The analysis of this paper sided power spectral density is limited to the performance of underdense trails, which occur Paper approved by S. B. Wicker, the Editor for Coding Theory and Techniques of the IEEE Communications Society. Manuscript received June 12, 1995; revised August 9, 1996. This paper was presented in part at the 1995 IEEE Military Communications Conference, San Diego, CA, November 5–8, 1995. The authors are with the Department of Electrical and Computer Engineering, Clemson University, Clemson, SC 29634-0915 USA. Publisher Item Identifier S 0090-6778(97)04170-6. far more frequently than other trails. For such trails, the signalis modeled as , to-noise ratio is an exponential decay constant in seconds and where is the initial signal-to-noise ratio for a particular trail. is approximately equal For a signaling rate of bits/s, during the transmission to the constant . of the th symbol in the packet, where This approximation introduces negligible error in analysis if . parallel envelope The demodulator consists of a bank of detectors followed by a decision device that, for each symbol, either declares that a particular symbol was sent or declares an erasure. The decision to erase or not is made independently for each channel symbol. For those symbols not erased, the envelope symbol that corresponds to the largest of the detector outputs is selected. We analyze two different erasure-generation schemes in this paper. The first scheme, the RTT, can be described as follows. Erase the th received symbol in the th code word if 2nd largest where is a fixed number between 0 and 1 and is the envelope detector output that corresponds to code symbol (for the th symbol position in the th code word). The second scheme will be referred to as the Bayesian scheme and is described as follows. Erase the th received symbol in the th code word if where is a threshold, is the zeroth-order modified and satisfy the relationship Bessel function, and (assuming the symbol is the th in the packet). The Bayesian erasure rule is obtained by utilizing decision–theoretic minimization techniques [13] on a risk function consisting of a linear combination of error and erasure probabilities. This minimization is motivated by the fact that a tight upper bound on the probability of not decoding correctly is a monotonic function of this linear combination [13]. Two types of packet configurations are considered in this paper. The first configuration assumes that fixed-rate coding is employed and utilizes block interleaving. The interleaving is 0090–6778/97$10.00 1997 IEEE 626 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 45, NO. 6, JUNE 1997 limited to individual packets and is the standard “read in by rows, read out by columns” method for block interleaving. The second configuration assumes the use of variable-rate coding instead of interleaving. An algorithm that determines the optimal packet configuration for maximizing the probability of packet success with variable-rate coding and errorsonly decoding has been developed previously [3], [4]. The algorithm uses an iterative procedure that requires knowledge of code-word success probabilities. An issue arises when using erasures with variable-rate for the RTT coding—how should the erasure thresholds ( for the Bayesian scheme) be set? We consider two and methods. In the first method, the threshold is held constant throughout the duration of the packet. The variable-rate codeselection algorithm is run once for each candidate threshold, and the particular combination of threshold and packet configuration, that maximizes the probability of packet success, is chosen. We call this technique the prior-erasure method. In the second method, the thresholds are the same for all symbols in a code word, but different from code word to code word in a packet. Because the number of candidate thresholds is much larger than in the prior-erasure case, we simply use the packet configuration that is produced by the errors-only codeselection algorithm. From the resulting packet configuration, thresholds are chosen that maximize the probability of packet success. We refer to this technique as the posterior-erasure method. III. ANALYSIS OF Fig. 1. The effects of interleaving and erasure generation on performance of systems with fixed-rate coding ( = 0:5): have where “*” denotes discrete convolution and represents the vector Let denote the probability that the th code word does not decode successfully. It follows that SYSTEM PERFORMANCE The th code word in a packet is not decoded successfully if The packet is successfully decoded only if each code word within the packet is successfully decoded. Thus, the probability is given by of packet error where denotes the number of information symbols in the th code word and is equal to 2 if the th symbol in the code word is in error, 1 if it is erased, and 0 if it is denote the probability mass function for correct. Let , i.e, . It follows that if if ; and if ; is the probability of symbol error and is the where probability of erasure. For the RTT, closed-form expressions and have been determined previously [13]. For the for Bayesian technique, closed-form expressions have not been determined and, therefore, simulation is used to determine these probabilities. denote the probability that the sum of the Now, let number of erasures and twice the number of errors is equal to for the th code word in the packet. Observe that For the meteor-burst channel, the pendent random variables. Thus, for s are mutually indewe IV. NUMERICAL RESULTS The following performance results are for a system using ) RS codes, 700 information bits (140 information ( symbols) per packet, and a signaling rate of 16 000 bit/s. Our results are given for decay constant values and . These values are chosen because they are representative of slow- and fast-trail decay rates, respectively. Fig. 1 presents performance of erasure generation and interleaving combinations for fixed-rate coding with a (32, (slow 14) RS code under the assumption that decay). The (32, 14) code is chosen because it gives the best performance for all the schemes shown in the figure . The figure shows that both interleaving and when erasure generation significantly improve performance, and a combination of Bayesian erasure generation and interleaving gives the best performance. The results are plotted assuming that a single threshold is used for all code words in the packet, and the best single threshold is used. This threshold for the RTT ranges from BAUM AND WILKINS: ERASURE GENERATION AND INTERLEAVING FOR METEOR-BURST COMMUNICATIONS Fig. 2. The effects of interleaving and erasure generation on performance of systems with fixed-rate coding ( = 0:1): at dB to at dB; the to Bayesian threshold correspondingly ranges from Thus, the improved performance of the Bayesian scheme comes at a cost of increased sensitivity to parameters. In Fig. 2, a similar performance comparison is made for (fast decay). The (optimal) code in this case is a (32, 28) RS code. This figure shows that interleaving again provides significant performance gains. Erasure generation, however, is completely ineffective—the optimal erasure thresholds result and ). in no symbols being erased ( Fig. 3 presents the performance of variable-rate coding with The best and worst fixederasure generation for rate coding results from Fig. 1 are also included. The figure shows that a combination of erasure generation and variablerate coding outperforms the best fixed-rate system, but the performance gains are not particularly large. Furthermore, the best fixed-rate system performs better than the variablerate/errors-only system. There is little difference between prior- and posterior-erasure performance. A packet configurations for the systems in this figure vary and as a function of the code-selection and as a function of dB, the errorserasure techniques. For example, at only decoding and the RTT posterior-erasure schemes use 12 code words, whereas the RTT prior-erasure scheme uses 16 code words, and the Bayesian prior-erasure scheme uses 18. dB, all but the Bayesian-prior erasure scheme use At 13 code words; the latter scheme uses 16. There is also a difference in erasure thresholds. For the RTT posterior-erasure scheme, the thresholds (which vary for each code word in the packet) vary from roughly 0.9 at the beginning of the packet to about 0.8 at the end; the thresholds For the RTT do not change significantly as a function of is nearly optimal prior-erasure scheme, the fixed over all cases shown in the figure. However, once again, the Bayesian scheme is more sensitive to threshold, ranging from at dB to at dB. . In this Fig. 4 compares the various schemes for case, we see that the variable-rate coding schemes signifi- 627 Fig. 3. The effects of interleaving and erasure generation on performance of systems with variable-rate coding ( = 0:5): Fig. 4. The effects of interleaving and erasure generation on performance of systems with variable-rate coding ( = 0:1): cantly outperform the fixed-rate schemes, and the Bayesian prior-erasure scheme gives the best performance. The packet configurations in all cases use seven or eight code words, and much less redundancy is used (so as to finish using the channel before the fast decay makes communication impossible). A single recommendation for a “best” meteor-burst system is difficult to provide. Although variable-rate coding performs extremely well when the channel degrades rapidly, determination of the decay rate is required to use the codeselection algorithm. Determination of a reasonably accurate value of may be difficult in practice, especially since the exponential decay model is itself only an approximation. The tradeoff between performance and sensitivity and the RTT and Bayesian methods is also difficult to quantify. Regardless, we can safely conclude that erasure generation and interleaving significantly benefit fixed-rate systems, whereas erasure generation significantly benefits variablerate systems. 628 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 45, NO. 6, JUNE 1997 REFERENCES [1] J. Z. Schanker, Meteor Burst Communications. Norwood, MA: Artech House, 1990. [2] D. L. Schilling, Meteor Burst Communications: Theory and Practice. New York: Wiley, 1993. [3] M. B. Pursley and S. D. Sandberg, “Variable-rate coding for meteorburst communications,” IEEE Trans. Commun., vol. 37, pp. 1105–1112, Nov. 1989. [4] , “A correction and an addendum for ‘Variable-rate coding for meteor-burst communications,’ ” IEEE Trans. Commun., vol. 43, pp. 2866–2867, Dec. 1995. [5] , “Incremental-redundancy transmission for meteor-burst communications,” IEEE Trans. Commun., vol. 39, pp. 689–702, May 1991. [6] , “Variable-rate hybrid ARQ for meteor-burst communications,” IEEE Trans. Commun., vol. 40, pp. 60–73, Jan. 1992. [7] J. J. Metzner, “Improved coding strategies for meteor-burst communications,” IEEE Trans. Commun., vol. 38, pp. 133–136, Feb. 1990. [8] S. Y. Mui, “Coding for meteor-burst communications,” IEEE Trans. Commun., vol. 39, pp. 647–652, May 1991. [9] S. Davidovici and E. G. Kanterakis, “Performance of a meteor-burst communication system using packet messages with variable data rates,” IEEE Trans. Commun., vol. 37, pp. 6–17, Jan. 1989. [10] A. J. Viterbi, “A robust ratio-threshold technique to mitigate tone and partial band jamming in coded MFSK systems,” in IEEE Military Commun. Conf. Rec., Oct. 1982, pp. 22.4.1–22.4.5. [11] K. G. Castor and W. E. Stark, “Performance of diversity/Reed–Solomon coded SSFH communications with errors/erasures via ratio thresholding,” in Proc. 23rd Annu. Allerton Conf. Commun., Control, Comput., Oct. 1985, pp. 869–877. [12] L. F. Chang and R. J. McEliece, “A study of Viterbi’s ratio-threshold AJ technique,” in IEEE Military Commun. Conf. Rec., Monticello, IL, Oct. 1984, pp. 11.2.1–11.2.5. [13] C. W. Baum and M. B. Pursley, “Bayesian methods for erasure insertion in frequency-hop communications with partial-band interference,” IEEE Trans. Commun., vol. 40, pp. 1231–1238, July 1992.