2
variable and check nodes degrees which give rise to improved decoding threshold [1], [2]. Using density
evolution (DE) or extrinsic information transfer (EXIT) chart based optimization, well-designed IRA codes
perform only a small fraction of dB away from the capacity limits of binary-input channels [3], [4].
For higher order modulation, e.g., 2m-PAM or 22m-QAM, m= 1,2,· · · , bit-interleaved coded mod-
ulation (BICM), trellis-coded modulation (TCM) and superposition-coded modulation (SCM) have been
studied [5]–[7]. These conventional schemes are referred to as “binary coding oriented” : an off-the-shelf
binary channel code is determined in the first place, and then a many-to-one mapping is utilized to match 2m
binary coded digits to a PAM symbol. To approach the capacity limit, these schemes require an outer-loop
receiver iteration [8] that exchanges soft information between the soft-input soft-output demodulator and
a bank of channel-code decoders. As each decoder may involve an inner-loop iteration by itself, the total
number of decoding iterations amounts to the product of the numbers of inner-loop and out-loop iterations.
Most existing practical systems incline to avoid the outer-loop iteration to reduce the implementation cost
and latency, but at the expense of a significant gap to the ultimate performance.
Different from the coding-oriented schemes, Chiu proposed q-ary IRA modulation codes for q-PAM
inputs [9]. This scheme is referred to as “modulation-oriented”: q-PAM signaling is determined in the first
place, and an IRA code over GF(q) is adopted whose output q-ary coded digits are one-to-one mapped to
q-PAM symbols. Thanks to the one-to-one mapping, the outer-loop iteration is avoided while achieving
the near-capacity performance. Moreover, for prime q, IRA modulation codes are lattice codes without a
one-dimension shaping code, whose advance in the two-way relay channel setup was reported in [10].
A. Motivations and Necessity of Ring Codes in Multi-user Networks
For a variety of multi-user configurations, structured codes based on lattices have been exploited in
solving network information theory problems [11], such as Slepian-Wolf and Wyner-Ziv problems (source
coding with side information (SI) at receiver), dirty paper coding (DPC) problem (channel coding with
SI at transmitter) [12], [13], physical-layer network coding (PNC) or compute-and-forward (CF) [14],
interference alignment, multiple-access (MA), precoding for broadcast channel, and etc.. Using lattices
codes, compelling theoretical advances by exploiting “structured binning” over conventional random coding
have been reported, where the key notion is to efficiently compute the bin-indices [15]–[17]. The proofs
of these results were based on the existence of “Roger-good” and “Ployrev-good” lattice chains [13], but
no clues are given on the code construction for practical implementation.
To materialize the gains of structured binning in a practical multi-user wireless network with widely used
q= 2mlevel PAM (or 22m-QAM) signaling, codes over integer rings Z2mbecome particularly relevant.