Abstract

As the Internet-of-Things (IoT) has expanded, multiple solutions have attempted to address the issues of the Low Power Wide Area (LPWA) networks physical layer. In a previous work, we proposed the Turbo-FSK, a constant envelope modulation with orthogonal alphabet that allows the receiver to operate at very low levels of power (high sensitivity performance) and very low levels of energy per bit . The scheme was demonstrated to approach Shannon’s limit as close as 0.29 dB. However, the scheme lacks flexibility in terms of spectral efficiency (always lower than 10−1 bits/s/Hz), especially compared to the recently standardized Narrow-Band IoT (NB-IoT) solution. In this work, we propose an evolution of the initial scheme, so-called Coplanar Turbo-FSK (C-TFSK). In order to increase the spectral efficiency of the system, two new features are introduced: a modulation combining linear and orthogonal properties where only subsets of the alphabet are orthogonal and a puncturing mechanism. Several aspects of the scheme are then studied under asymptotic hypothesis, such as the influence of the linear component of the alphabet and the effects of puncturing. The high flexibility in terms of spectral efficiency, the short distance to Shannon’s limit, and the constant envelope property make the C-TFSK a serious contender for the physical layer of the IoT.

1. Introduction

The Internet-of-Things (IoT) is in the process of global expansion but the definition of its technical features is still in progress [1]. According to the definition from the International Telecommunication Union (ITU) [2], the IoT will interconnect existing networks as well as evolving technologies. In this context, Low Power Wide Area (LPWA) networks [3, 4] are expected to represent approximately 10% of the overall IoT connections [5]. Requirements for LPWA include long range communication and low energy consumption at the device level, i.e., long battery life. Low consumption can be achieved by reducing the constraints on the power amplifier using a constant envelope waveform or by reducing the energy per bit of the considered modulation [6]. Long range is obtained by decreasing the required received power, also called the sensitivity level.

The problem of achieving a low sensitivity level can be solved by ensuring a low data rate transmission [7]. It is commonly obtained following two possible strategies: reducing the bandwidth or reducing the level of Signal-to-Noise Ratio (SNR) required for the given Quality of Service (QoS). The first strategy leads to narrow-band signaling, the keystone of the Sigfox LPWA solution [8]. The second strategy is pursued by reducing the spectral efficiency of the selected technique (expressed in bits/s/Hz) or by reducing the , the SNR per bit, required for the QoS. A commonly used technique to reduce the spectral efficiency is use of the repetition code (repetition factor), used, for example, in the IEEE 802.15.4k standard [9]. Repetitions are recombined at the receiver side, which lowers the level of sensitivity while maintaining a required constant. The required can be reduced by using Forward Error Correction (FEC) [10]. FEC is usually associated with a loss in spectral efficiency and introduces the notion of capacity.

The maximum achievable data rate over Additive White Gaussian Noise (AWGN) for an arbitrarily small level of error, also called the capacity, was established by Shannon [11]. Many research works have focused on approaching the capacity through the use of FEC [10]. A system operating close to the capacity ensures an efficient if not optimal use of the spectral and energetic resource. Another formulation of the limit expresses the relationship between the minimum achievable , and the maximum achievable spectral efficiency with [12]This expression illustrates the perpetual trade-off between spectral efficiency and energy efficiency, which is related to the required . It also gives the ultimate limit in , obtained when tends towards and is equal to dB. Having a high spectral efficiency will result in a high , and inversely operating a low requires the technique to have a low spectral efficiency. For the LPWA context, ensuring both a low spectral efficiency and a low level of required will lead to a low level of sensitivity. Moreover, an efficient use of the resource is guaranteed if the long range transmission technique approaches the capacity.

When it comes to existing solutions, the Narrow-Band IoT (NB-IoT) solution from the 3rd-Generation Partnership Project (3GPP) [1316] combines the elements necessary for an efficient LPWA solution. Through the use of the powerful Turbo Code (TC) [17, 18], a low and a short distance to capacity can be achieved. The additional use of a repetition factor ensures low levels of sensitivity by reducing the spectral efficiency [19]. The variable number of repetitions and the possibility of puncturing parity bits generated by the TC allow for a wide range of spectral efficiencies. With a constant bandwidth, applications demanding higher data rates are supported by increasing the spectral efficiency, while reducing the range of the transmission.

An alternative strategy is to consider ultralow rate FEC schemes, such as Super Orthogonal Turbo Codes (SOTC) [20] or Turbo-Hadamard Codes (THC) [21]. The use of orthogonal codes can actually be shown to reach the capacity for an infinite size of alphabet [12]. As this leads to a spectral efficiency tending towards , the use of orthogonal codes alone is not practical. Nevertheless, through the use of a combination of orthogonal Hadamard codes, a convolutional code, and a turbo receiver, THC have been demonstrated to get as close as 0.29 dB from the for a spectral efficiency equal to  bits/s/Hz [22]. The joint optimization of modulation and coding scheme had also been studied in the context of deep space communication [23]. In this case Pulse Position Modulation (PPM) is considered, and a turbo-like code is optimized to bridge the gap to Shannon capacity. However, this scheme is not well optimized for the next generation of IoT communications as the size of the codeword is quite important (4000 bits). Moreover PPM is not well adapted compared to constant amplitude modulation when state of the art power amplifier is used. In a previous work, we proposed the Turbo-FSK modulation [7, 19, 24], which is inspired by the THC and can be either viewed as a bit interleaved coded modulation (BICM) or parallel concatenated trellis-coded modulation (PCTCM) [25] scheme with orthogonal signaling. Low consumption of the transmitter is ensured by a constant envelope signal and a low complexity encoder. Turbo-FSK is adapted to the LPWA context [26] as it ensures low levels of sensitivity to be reached while approaching the channel capacity [27]. However, unlike the technologies relying on the use of a powerful FEC combined with a repetition factor, Turbo-FSK is restrained to low levels of spectral efficiency. This limits the number of possible applications for the solution.

In this paper, we propose an extension of the initial Turbo-FSK technique presented in [7]. An alphabet of modulation combining orthogonal and linear properties, the so-called Orthogonal with Coplanar Subsets (OCS) alphabet, is introduced. It allows achieving higher levels of spectral efficiencies. After giving a general definition of the alphabet, its application to Frequency Shift Keying (FSK) signaling is reviewed. The use of this alphabet as a substitution for the FSK alphabet in the Turbo-FSK scheme is considered, leading to the Coplanar Turbo-FSK (C-TFSK) modulation. In addition to the more spectrally efficient alphabet, C-TFSK also includes a puncturing mechanism which trades performance for a shorter transmitted sequence. The introduction of these two new features increases the possible number of configurations for C-TFSK. Additionally, it improves the flexibility of the scheme and makes it a serious contender for IoT technology. The scheme is analyzed using the EXtrinsic Information Transfer (EXIT) chart tool [28], which has already been introduced for the Turbo-FSK [27]. It should be noted that minimum distance analysis is also a powerful tool for Trellis-Coded-Modulation scheme but is not straightforward to derive for our PCTCM-like scheme (it has been partially done in [29] [24] (page 38) for more basic scheme). The performance evaluation presented in this work is limited to the AWGN channel. However, this is motivated by the following reasons. (i) This type of channel is convenient to consider for the theoretical study of the structure of the code. (ii) For low throughput scenarios it can be reasonable to consider the transmission channel as nonfrequency selective channel. It is particularly true for small bandwidth and terrestrial networks. It should be however mentioned that performance evaluation of C-TFSK under frequency selective channels demonstrated that the scheme is competitive versus standard Orthogonal Frequency Division Multiplexing (OFDM) signaling [30].

The paper is organized as follows. Section 2 is dedicated to the presentation of the OCS alphabet and Section 3 to the C-TFSK transmitter and the receiver’s architecture. In Section 4, various features of the scheme are studied and Section 5 concludes the paper.

2. Orthogonal with Coplanar Subsets Modulation

The modulation mapping procedure consists in associating binary words of size to a symbol (or codeword) taken from the alphabet of modulation of size . There are two main families of modulations: linear modulations and orthogonal modulations. For linear modulations, the alphabet is constructed from a base symbol which is multiplied by various complex values. Since the symbols belong to the complex plane, there is a coplanar relation between the symbols of the alphabet. Linear modulations are spectrally efficient, both the spectral efficiency and the required increase with the size of alphabet, without limitation. Quadrature Amplitude Modulation (QAM) and Phase Shift Keying (PSK) modulation are examples of linear modulations. For orthogonal modulations, symbols of the alphabet are orthogonal to each other (the scalar product is equal to ). These modulations are energy efficient as the energy efficiency increases with the size of the alphabet, but inversely the spectral efficiency decreases with an increasing size of alphabet. Theoretically, orthogonal modulations can reach for an infinite size of alphabet [12]. However, this is not conceivable for a practical system, as the spectral efficiency would tend towards . FSK and Pulse Position Modulation (PPM) are examples of orthogonal modulations.

Linear and orthogonal modulations, due to their complementary spectral efficiencies and required ranges, seem to be fundamentally opposed. We propose nevertheless the definition of the hybrid OCS modulation, which holds properties from both modulations. This alphabet is a generalization of the modulation presented in [31]. The hybridization of FSK modulation and a linear modulation was also presented in [3235], but no channel coding was considered. The work [36] considered the use of binary and multidimensional TCs associated with a hybrid FSK and QAM modulation.

2.1. Definition of the Alphabet of Modulation

The alphabet of modulation is denoted by and contains elements. While having an orthogonal alphabet would require a total of orthogonal dimensions, we relax the orthogonality constraint for subsets of the alphabet only. These subsets contain symbols (with ) and are denoted by with , where is the number of orthogonal dimensions, with . Two symbols from two distinct subsets are orthogonal, but two symbols from the same subset belong to the same complex plane and are thus coplanar. Considering two symbols and from the alphabet (with ), the definition of the alphabet leads towhere is a complex number proportional to the coplanarity relation between two symbols from the same subset and is the scalar product operator (it should be noticed that the number of orthogonal dimension is equal to the number of chips and not since we need to use the complex scalar product instead of the real one) defined as follows:with denoting the conjugate of complex number .

In the alphabet, each subset is equivalent to a linear modulation with elements. Orthogonality holds between the subsets only.

We consider the baseband model. Through the addition of the linear components, the number of orthogonal dimensions have been divided by and so was the number of samples (or chips) required to represent each symbol. chips are now required to represent one symbol. Symbols from the alphabet are expressed aswith being a function of and , where is the length- base vector of the subset . The coefficient , with , is taken from the complex plane and represents the linear modulation. The spectral efficiency of the modulation , expressed in bit/s/Hz, is given by the ratio between the number of information bits contained in one symbol and the number of chips per symbols. It is given byThe second form of the expression offers a better understanding of the effect of the modulation. While keeping a constant value for , the spectral efficiency increases with the value of , which reminds us of the property of linear modulation. However, increasing the size of alphabet for a constant (i.e., increasing , the number of orthogonal dimensions) reduces the spectral efficiency, similarly to orthogonal modulations.

2.2. Likelihood of a Symbol

Probabilistic demodulation is considered. The likelihood of all the symbols from the alphabet must be evaluated. The observation of the symbol is given bywhere is a zero-mean circular complex Gaussian white noise. The elements of are i.i.d. Gaussian random variables with zero mean and variance equal to . Assuming that was transmitted, the likelihood of the symbol is given bywhere is a constant independent of . Following the definition of the vector given in (4), the summation of the scalar product over is expressed:where represents the projection of the received vector on the subset which includes .

Additionally, the definition of the symbols in (4) yields

Using (8) and (9) in (7), the likelihood of the symbol is expressed:

Maximum Likelihood (ML) decision could be performed by searching the symbol which has the greatest likelihood.

2.3. Application to FSK Signaling

In practice, common modulations can be chosen to represent both orthogonal and linear parts of the OCS modulation. For the considered application C-TFSK, we select the FSK modulation as orthogonal modulation. For this specific case, the vectors can be picked as rows or columns from the Discrete Fourier Transform (DFT) matrix of size . The coplanar value can take any complex value. However, we will consider the case where roots of the unity are selected in order for the modulation to have a constant envelope. The values are given by , which reminds us of the construction of the PSK modulation alphabet. In Figure 1, the alphabet of modulation for the case of and is depicted. For this example, the vectors are of size . In the figure, an entire line of symbols corresponds to a subset and rows are orthogonal to each other. The spectral efficiency, given by (5), is equal to . Due to the choice of the FSK modulation as orthogonal modulation and roots of the unity as coplanar points, this modulation has a constant envelope.

3. Coplanar Turbo-FSK

The alphabet introduced previously is now applied to the Turbo-FSK principle presented in [19]. After reviewing the operations performed at the transmitter side, the receiver is presented.

3.1. Transmitter

The architecture of the transmitter is presented in Figure 2. is the information block size, and it is divided into binary words of size (thus ). The transmitter is composed of similar stages and the stage is considered. The operations performed by one stage are presented.

3.1.1. Encoder

The information block is interleaved with the function , where int stands for internal, as this interleaver corresponds to the interleaver used for the turbo process. The words of length are then encoded using the encoder presented in Figure 3. The encoder in each branch adds one parity bit to each length- information word and an extra word to force the memory state back to . The rate of the code (one branch) iswhere the approximation is valid for large sizes of . The size of the encoded words is denoted as , with . For each stage, the sequence of binary words of length is to be modulated. Each binary word of size will be associated with one of the elements of the alphabet of modulation , referred to as codewords. The encoder needs to be systematic as the codewords will be mapped to a physical waveform. Omitting the systematic bits as in the case of Turbo-Hadamard [21] cannot be considered when dealing with nonbinary transmitted codewords. Contrary to usual efficient binary coding scheme, note that the systematic bits are then sent multiple times and that more than stages should be considered for turbo-encoders. However, the performance of this type of architecture has been demonstrated previously for Turbo-Hadamard (see [29] Figure 3) as well as for the Turbo-FSK scheme (see [19, 30]). In order to increase the spectral efficiency of the scheme, a puncturing step is also considered.

3.1.2. Puncturing

Puncturing commonly consists in removing some parity bits of the encoded sequence. Only the systematic bits and a reduced number of parity bits are sent. For the considered scheme, removing some parity bits would involve changing the size to for some specific words. However, the size of the words to be modulated should be kept to a constant value, equal to . In order to fulfill this condition, entire words of size are punctured. If the first stage is not punctured, then every systematic bit is sent at least once. Every other stage is punctured at a rate . This rate may differ depending on the stage. The overall puncturing rate is denoted by and is equal towith .

In order to avoid puncturing too many consecutive codewords and induce holes in the trellis, a block interleaver of size is used. The block is interleaved by filling a matrix of size row by row, and the same matrix is read column by column to form the interleaved output. Considering the puncturing rate of stage to be , the actual step of puncturing consists in selecting only the first binary words. The use of the block interleaver scatters the punctured binary words over the whole sequence.

3.1.3. Modulation

After puncturing, the overall sequence consists of binary words of size . These words are mapped to the alphabet of codewords of size . The alphabet is chosen as the OCS alphabet with FSK as orthogonal modulation, as described in Section 2.3. The number of elements in each subset is and the number of frequencies is given by the ratio . The size of the alphabet is given by . With the spectral efficiency of the modulation as defined by (5), the overall spectral efficiency of the scheme is given byunder the assumption of critically sampled and spaced frequency shift signals, i.e., an orthogonal basis built from discrete Fourier series. Following the relation , the number of information bits per codeword is given byThe spectral efficiency can be approximated, for large sizes of information block , withThis expression includes the main parameters which define the scheme: the number of stages , the size of alphabet , the number of elements in each orthogonal subset , and the puncturing rate (the number of frequencies, denoted previously by , is obtained with ). The introduction of puncturing and a linear component allows for higher ranges of spectral efficiency. Increasing the size or the puncturing rate clearly increases the spectral efficiency. Typically, multiplying by with a constant size of alphabet increases the spectral efficiency by factor 2. By setting and without puncturing, the scheme is strictly equivalent to the Turbo-FSK from [19, 26].

3.1.4. Trellis

A trellis is established due to the use of the accumulator in the encoding process. Each input information word is associated with one of the possible transitions. As there are possible encoded words, each transition has branches. The mapping performed between the binary words of length and the codewords from the alphabet can be represented on the trellis.

An example of trellis for the case of and is depicted in Figure 4. For this configuration, there are branches for each transition. The mapping is then done so that each transition corresponds to a unique orthogonal subset. All the parallel branches are mapped by codewords belonging to the same subset. Since FSK is considered for the orthogonal modulation, the vectors are lines of the DFT matrix of size .

When the chosen alphabet is orthogonal without any linear component (i.e., ), the choice of mapping has no influence. The distance between the branches in the trellis is a constant as all branches are in different orthogonal dimensions. However, when considering , this is no longer the case. Codewords belonging to the same subset are not orthogonal between each other. The distance between the various symbols of the alphabet is modified by the introduction of a linear component. When mapping the binary words to the codewords, consideration must be taken on the orthogonality of the trellis, i.e., on the distances between the symbols associated with the transitions.

Using the mapping presented in Figure 4, the transitions in the trellis are ensured to be further apart, as the distance between the orthogonal subsets is larger than the minimum distance in each subset. This may not be the case for other mappings or for other values of and . The influence of the choice of mapping on the performance is studied later.

3.2. Receiver
3.2.1. Derivation of the Receiver

First of all, we consider in this work a coherent receiver perfectly synchronized in time and frequency. As in conventional turbo receivers, the Bahl, Cocke, Jelinek, and Raviv (BCJR) algorithm [37] is used in order to compute the -A Posteriori Probabilities (APP) ratios of the information bits. The -APP are given bywhere is the received codewords sequence and the bit at index of the information word at time index . The derivations of the receiver are similar to the case of Turbo-FSK presented in [7]. The use of the BCJR introduces the terms , , and similarly to [17]. The final expression of the -APP iswhere (resp., ) is the group of codewords that encodes information words for which the bit is equal to (resp., ). is the likelihood of the codeword and the a priori probability of the codeword, given by the other decoders. Considering the chosen OCS alphabet, for which the symbols likelihood was developed in Section 2.2, (10), and with , the product can be expressed asIn this expression, both the orthogonal and linear components of the codeword appear.

3.2.2. Architecture

The architecture of the receiver is depicted in Figure 5. The stage observations are first retrieved. For each stage, the observation consists in codewords of length . The detail of one stage is depicted in Figure 6. The detector computes both the correlation on the orthogonal dimensions and the two first terms of (18) in order to estimate a quantity related to the likelihood of the codewords. The result is a matrix of size . Then, the depuncturing block appends extra lines to the aforementioned matrix, corresponding to the same number of punctured codewords at the transmitter side. For these lines, the likelihoods are equal; i.e., the receiver considers each codeword to be equally probable. Interleaving is then applied and scatters the appended lines over the whole sequence. This step requires the receiver to know the puncturing rate as well as the puncturing pattern for each stage. When considering the trellis representation, puncturing consists in not transmitting some sections of the trellis. The receiver then considers every branch of the punctured sections to be equally probable. This procedure is similar to the puncturing and depuncturing process widely considered with Turbo codes [38].

The detector and the puncturing management provide the of the likelihood part of (18). It is fed to the decoder, which first computes the of the a priori part (the third term) of (18) by combining the a priori log ratios. After summation, the of (18) is fed to the BCJR algorithm, which estimates the -APP of the information bits using (17). The extrinsic ratio is then computed and stored for use at the following iteration. After interleaving, the -APP are fed to the next decoder. Complexity of the BCJR algorithm can be reduced by using the common max-log approximation. It avoids the computation of exponential functions, which are required when computing the Maximum A Posteriori (MAP) algorithm. For the case where the FSK orthogonal alphabet is selected, the correlation on the orthogonal dimensions may be done using the Fast Fourier Transform (FFT) algorithm. The detector would then consist in a FFT operation followed by normalization and real part selection operations.

The initial motivation for C-TFSK was to introduce flexibility in terms of spectral efficiency. Starting from the initial Turbo-FSK scheme, a specific puncturing procedure is introduced in order to reduce the number of transmitted codewords by a factor , the puncturing rate. The alphabet of codewords is also modified by introducing linear components, so that the size of the codewords is divided by , while the number of elements of the alphabet stays equal to . The introduction of these linear components may also be interpreted as a reduction in the orthogonality of the alphabet. In the next section, we propose a study of the performance of the scheme.

4. Analysis

The design of the scheme gives parameters to study: the alphabet size , the size of the linear modulation , the number of stages , the puncturing rate , and the choice of mapping on the trellis. In this section, each parameter is studied and the performance of the scheme according to this parameter is assessed. The EXIT chart for Turbo-FSK, presented in [27], was demonstrated to be able to predict the asymptotic behavior of the decoder and that performance when the block size is shortened follows the same trend. Its use for the analysis of the C-TFSK is considered.

The impact of the choice of how to map codewords on the trellis is first studied. The puncturing mechanism, introduced for the C-TFSK scheme, is then studied. It allows for gains in spectral efficiency, at the expense of some performance loss, which is evaluated for some use cases. Finally, some configurations of the scheme are compared to the maximum achievable spectral efficiency for a given , and the flexibility in terms of spectral efficiency of the C-TFSK is demonstrated. The starting value of the waterfall can be estimated by computing the threshold of the decoder (also called the turbo cliff position). It is the minimum level of required for the decoder to be able to correct all the erroneous bits, regardless of the interleaver size and the number of iterations performed. It represents the asymptotic behavior of the decoder.

Table 1 summarizes the content of the section and mentions what are the changing or constant parameters for each subsection. For all simulations, FSK is used as orthogonal modulation and PSK as linear modulation. When Bit Error Rate (BER) performance is computed, a random interleaving function is selected.

4.1. Influence of the Choice of Trellis Mapping

As presented when describing the trellis, the introduction of linearity in the alphabet can also be interpreted as a loss of orthogonality. For the initial case of the Turbo-FSK, the codewords of the alphabet are orthogonal to each other. When using the OCS modulation, only subsets (each containing codewords) are orthogonal to each other. The choice of the mapping of the binary words of length on the alphabet of size can be expected to have an impact on the performance. In order to quantify that impact, various trellis and mappings are compared. The thresholds are estimated using the EXIT chart technique. No puncturing is applied (i.e., ) and the values are taken as roots of the unity.

4.1.1. Trellis Classification

Since the alphabet has elements and there are branches in the trellis ( branches per transition), the total number of mapping strategies is equal to . As this value increases exponentially (for example, ), we focus our analysis on three types of mapping rules.

The first type, denominated mapping, is characterized by the group of orthogonal vectors , andwhere and is the group of branches corresponding to the transition from to . This means that two different transitions are mapped by codewords from different subsets. This mapping ensures orthogonality between the transitions. The example of mapping for and given in Figure 4 belongs to the mapping, with, e.g., . In Figure 7(a), the case of and is represented for a mapping.

The second type of mapping considered is the L mapping. It is characterized by the group withWith this mapping, two different transitions are mapped by codewords with different , but that may belong to the same subset. There is no orthogonality between the transitions, but there is orthogonality between the branches of a transition. L mapping for the case of and is depicted in Figure 8, with, for example, . In Figure 7(b), the case of and is represented for L mapping.

The third mapping, denominated X mapping, is a hybrid mapping. For each transition, the branches are mapped in of the orthogonal dimensions, and each orthogonal dimension can be modulated by of the linear values. The mapping is selected so that pairs of orthogonal dimensions are modulated by the linear values. An X mapping for the case of and is depicted in Figure 7(c), and another for the case of and is depicted in Figure 9. This mapping somehow mixes the two mappings and L. The pair of transitions and is orthogonal to the pair and , but the two transitions and are mapped by codewords in the same orthogonal subsets.

The three mapping types correspond to several of the possible mappings, and two different mappings of the same type may lead to variation in performance. However, each mapping defines a general structure for the trellis, and the study will help evaluate the impact of the mapping on the performance.

4.1.2. Threshold Comparisons

In order to estimate the asymptotic performance, thresholds of the C-TFSK with various parameters and mappings are computed. The EXIT chart technique was used to estimate the thresholds, in a similar process to the one presented in [26]. For each size of alphabet , four trellis mappings are considered: the three mappings previously introduced and the fully orthogonal mapping, where each branch is orthogonal to all the other branches. This mapping is strictly equivalent to the Turbo-FSK ().

For the first comparison, we consider the C-TFSK where the number of orthogonal subsets is kept constant and equal to . The number of elements in the subsets increases with as . The estimated thresholds for values of spanning from to and with the parameter are depicted in Figure 10. The trellis depicted and presented previously actually corresponds to some of the mappings used for these simulations: the case with mapping is depicted in Figure 7(a); the case with mapping is depicted in Figure 4, the case with L mapping is depicted in Figure 7(b), the case with L mapping is depicted in Figure 8, and the case with X mapping is depicted in Figure 9.

Since one of the properties of the linear modulations is to have an energy efficiency decreasing with the order of the modulation, a loss in performance is expected when increasing the value of . For all cases but , the threshold of the C-TFSK is indeed higher than the threshold of the Turbo-FSK, for all types of mapping rules. However, the loss varies depending on the selected mapping. More particularly, the L mapping (which totally gives up orthogonality between the transitions) has a threshold more than dB higher than the Turbo-FSK case for (i.e., ), while using the X mapping reduces this gap to dB. This mapping performs better than the mapping for larger sizes of alphabet, with a gain of dB for . Figure 10 emphasizes the importance of choosing mappings that maintain a certain degree of orthogonality between the transitions in the trellis. However, preserving complete orthogonality between the transitions (i.e., mapping) reveals itself to be less interesting than introducing linearity between some transitions (i.e., X mapping).

The case (thus ) shows interesting results. Indeed, for this size of alphabet, the C-TFSK performs better than the Turbo-FSK. Also, the L mapping outperforms the two other mappings and offers dB of gain versus the Turbo-FSK. The trellis for this mapping and configuration is depicted in Figure 7(b).

In order to explain these differences in performance, it is necessary to study the distance between the various codewords in the alphabet. A useful representation is the projection of all codewords of the alphabet on one of the orthogonal dimensions . For an arbitrary size of alphabet and , this projection is depicted in Figure 11. There are points: the coplanar values and points at coordinates . These points correspond to all the vectors that are orthogonal to the considered subset . This representation also gives an indication of the distances between the various codewords. With a normalized constellation, the distance between, e.g., and is . But the distance between and is equal to and the distance between and is equal to . Since the L mapping with associates each transition with one of the four possible , transitions are further apart than when simple orthogonality is considered.

With these considerations on the -PSK modulation and its potential gain versus the Turbo-FSK scheme, we wish to study this size of linear modulation versus various values of . The parameter is selected, and alphabet sizes spanning from to are chosen (equivalent to sizes of FSK spanning from to ). The same mappings are considered, and the estimated thresholds are depicted in Figure 12. Up to an alphabet size equal to , the L mapping outperforms the other mappings, with a gain of dB versus the Turbo-FSK for . For (i.e., -FSK), the C-TFSK (regardless of the mapping) has a lower threshold than the Turbo-FSK, but the difference is much less significant. For , the thresholds of the C-TFSK are no longer lower than the Turbo-FSK. The impact of having larger distances due to the choice of linear modulation is reduced when large numbers of orthogonal subsets are considered. Considering the L mapping, the distance between the transitions is the same when and when , but each transition has orthogonal branches per transition in the first case and in the second case.

As expected when first considering the use of a linear component, some performance loss is observed for large sizes of . Nonetheless, the impact of the loss of orthogonality can be reduced by selecting an appropriate mapping that maintains some orthogonal properties between the transitions. Also, using the parameter is beneficial for the performance when a relatively small number of orthogonal subsets are considered (up to ).

In addition to the three parameters that are , , and , the selected mapping must be considered for the C-TFSK, and there are possible mappings. This makes the scheme arduous to study, and only a small proportion of the parameters have been explored. It is possible for another configuration to exceed the initial Turbo-FSK, but this configuration has not been found yet. For the rest of the study, the X mapping is considered, as it seems to offer the best compromise in terms of performance.

4.2. Effects of Puncturing

The puncturing procedure included in the design of C-TFSK offers additional flexibility in data rate, which may be required for potential applications. In classical coding schemes, puncturing is done at the bit level. In the case of C-TFSK, puncturing must be applied at binary words level, as they are associated with a nonbinary nonsystematic waveforms in the modulation process. Overall, the puncturing mechanism reduces the number of transmitted symbols. At the receiver side, entire sections of the trellis are unknown. For these sections, the likelihood of all the codewords from the alphabet is considered equal. While a gain in spectral efficiency is achieved, the receiver has less information from the channel to work with. Using puncturing usually has a negative impact on the performance.

The case of and is selected. Using the parameter and an X mapping, different puncturing patterns are considered, for which the parameters are given in Table 2. Puncturing rates spanning from to are considered, as well as cases where the puncturing rate of the different branches is equal or varies. The BER performance with is depicted in Figure 13. As expected, increasing the puncturing rate induces a loss in performance, at the benefit of a gain in spectral efficiency (which is given, for each case, in Table 2). For the case of and , only codewords are transmitted instead of for the case without puncturing. The spectral efficiency is multiplied by at the expense of a performance loss of dB for a BER of . The cases and give almost the same performance, even though the puncturing rates are different. For the case , branches puncturing rates are all equal while the uses two different puncturing rates on the branches.

In order to study the influence of the choice of puncturing rate on each branch, we select the case . Four combinations of branch puncturing rates are selected, and the BER performance is depicted in Figure 14. The combinations are given in the form . for all cases except the case where . For the case , the last branch is not sent. This case corresponds to , as the last branch does not give any information.

The choice of puncturing rate on each branch has a minimal influence on the performance, except for the case where the last branch is not sent. This last case has an increased error floor when compared to the other puncturing schemes. This shows that by considering an additional branch with only a limited number of symbols (for the case , only are sent for the last branch), the error floor can be reduced for a constant value of spectral efficiency.

In order to illustrate this effect, the Packet Error Rate (PER) performance for the case without puncturing and the case with is depicted in Figure 15. These two configurations have the same spectral efficiency and are thus comparable in SNR. The PER performance for two other configurations, the case without puncturing and the case with (with and ), is also depicted in the figure. These two configurations also have the same spectral efficiency, equal to  bits·s−1·Hz−1. For both cases, considering an extra branch () only few symbols give performance close to the case without puncturing, but the error floor is significantly reduced. For a constant spectral efficiency, puncturing can thus be used to reduce the error floor. However, complexity is increased as when considering a receiver with instead of branches, the execution of an additional trellis decoding is implied.

Puncturing is very often used to increase the spectral efficiency or the coding rate. For the C-TFSK scheme, the puncturing procedure introduced has the expected effect. It allows more flexibility and an additional trade-off between performance and spectral efficiency. Moreover, simulations demonstrated that puncturing can be used to reduce the error floor, at the expense of a complexity increase.

4.3. Influence of the Linear Component

C-TFSK introduced a linear component with the aim of improving spectral efficiency flexibility. We wish to study the impact of the parameter regarding both the spectral efficiency and the performance of the scheme. During this section, the mapping and puncturing are selected as constant, respectively, chosen as the X mapping and . There are still numerous possible combinations of , , and . Two cases are selected: with and with . These combinations correspond to some of the best ones in terms of performance and according to [27]. For both cases, there are, respectively, and possible values for , considering the condition (i.e., a minimum of orthogonal subsets). Thresholds for both cases and all possible values of are computed using the EXIT chart. To each configuration corresponds a spectral efficiency, computed with (13). Two elements of comparison are considered for the study: the maximum achievable spectral efficiency according to the channel capacity, computed using (1), and the threshold of the TC associated with Binary Phase Shift Keying (BPSK) modulation. The result is depicted in Figure 16. For each point, the parameter couple is labeled. For example, the point labeled for the curve and corresponds to with orthogonal subsets.

For both sizes of alphabet, the effect of increasing the size of (i.e., decreasing the number of orthogonal subsets) also increases the spectral efficiency. Up to a certain value of , the performance loss in is limited, an effect previously observed. The minimum distance in the trellis is maintained, and the performance depends on the choice of mapping (for all configurations, the X mapping described in Section 4.1 is selected). When , this minimum distance starts to decrease, with a negative effect on the threshold level. As mentioned previously, the Shannon limit (expressed here in terms of maximum achievable spectral efficiency) traduces the required trade-off between energy efficiency and spectral efficiency. The performance observed for C-TFSK also follows this principle, as the energy efficiency decreases when the spectral efficiency increases. However, the performance of the scheme stays efficient as the distance to the maximum achievable spectral efficiency for a given remains relatively small.

The TC, whose threshold is depicted in Figure 16, is the channel code used in the NB-IoT approach for LPWA solutions. Associated with BPSK modulation, this scheme has a threshold of dB for a spectral efficiency of . As shown in the figure, the performance of the TC can be closely approached using different configurations. In order to improve the range of the communication, the NB-IoT approach also considers the use of a Spreading Factor (SF). By reducing the spectral efficiency, the required level of SNR for the QoS is reduced. However, the use of SF does not improve the energy efficiency of the scheme; i.e., the level of required for the QoS will remain unchanged. Unlike the NB-IoT approach, C-TFSK offers flexibility in configuration. By selecting a configuration with a lower spectral efficiency, both the range and the energy efficiency can be improved, up to more than dB.

These results clearly demonstrate how the C-TFSK scheme allows for a gain in spectral efficiency while having thresholds close to the minimum achievable . Thanks to the introduction of a linear modulation, spectral efficiencies up to (, , and ) can be achieved. However, in agreement with the information theory’s limit (see (1)), this comes with a significant performance loss in required compared to the Turbo-FSK with the same size of alphabet (dB for the same configuration). Spectral efficiency can also be increased by using puncturing (at the expense of more performance loss).

5. Conclusion

Solutions dedicated to LPWA networks always try to offer low levels of sensitivity at the expense of a low data rate. However, having a system with flexibility in data rate or spectral efficiency can lead to a larger number of potential applications. The original design, the Turbo-FSK, is a constant envelope modulation restrained to low levels of spectral efficiencies. In order to improve the flexibility of the system, two new features have been introduced: the OCS modulation, which introduces a linear component in the modulation’s alphabet, and a puncturing mechanism. The scheme, so-called C-TFSK, also has a constant envelope and is defined by several parameters. Due to the very large number of possible configurations, strict optimization is cumbersome and seems hardly practicable. Instead, an asymptotic nonexhaustive study has been realized and demonstrated interesting properties for C-TFSK. While a very large number of possible mappings of the codewords on the trellis are possible, it is more beneficial to maintain some orthogonal properties between the transitions of the trellis. Puncturing allows for an increase in the spectral efficiency at the expense of some performance loss. It can also reduce the error floor for a given spectral efficiency, at the expense of an increase in complexity. Finally, the comparison to the maximum achievable spectral efficiency reveals that C-TFSK maintains an energy efficiency close to the limit, despite the fact that increasing the size of the linear component of the alphabet increases the value of the threshold. When compared to the TC used for the NB-IoT solution, C-TFSK is more flexible and can provide a better energy efficiency when low spectral efficiencies are considered.

Data Availability

The proposed research article does not contain statistical studies on dataset. Simulations results can be easily checked by implementing the algorithms detailed in the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

The research leading to these results received funding from the French Agence Nationale de la Recherche (ANR), under Grant Agreement ANR-16-CE25-0002905 (project EPHYL).