Digital transmission system and method comprising a product code combined with a multidimensional modulation

ABSTRACT

A digital transmission system wherein the transmitter applies a systematic convolutional code to the input data to generate a product code in blocks, with trellis closure by adding redundant data comprising a parity code bit. The thus coded data are then allocated to symbols that have undergone multidimensional digital modulation. At the receiver, iterative decoding is performed in cascade along two paths by computing hard decision reliabilities for each sub-set of the multidimensional digital modulation so as to produce soft decisions. The second path utilizes the results produced by the first path to form soft decisions. The soft decisions enable determination of output symbols. The invention also relates to a data protection method implemented in such a system.

RELATED APPLICATION

This invention is related to a concurrently filed application, U.S. application Ser. No. 08/987,694 filed on Dec. 9, 1997, now U.S. Pat. No. 5,944,850, having partly common inventorship herewith and assigned to the same assignee. Such application relates to coding using a punctured product code combined with quarature amplitude modulation.

FIELD OF THE INVENTION

The invention relates to a digital transmission system for protecting input data, comprising coding means for said data and iterative decoding means, the coding means comprising a first sub-set for performing a systematic convolutional trellis coding permitting of the iterative decoding, and a second sub-set for allocating the coded data to digitally modulated symbols.

The invention likewise relates to a method of protecting input data implemented in such a digital transmission system.

The system may be utilized for digital transmission for cable television, satellite television, terrestrial broadcasting, communication over telephone lines or otherwise.

BACKGROUND OF THE INVENTION

Selective protection systems are known which combine convolutional coding with digital modulation. More particularly, for enhancing the performance of such a system in terms of bit error rates, a new class of convolutional codes called turbo codes has been described in the document entitled: "Near Shannon limit error-correcting coding and decoding: Turbo-codes (1), C. BERROU, A. GLAVIEUX, P. THITIMAJSHIMA, Proceeding of ICC '93, Geneva, May 1993, pp. 1064-1071. These turbo codes have a performance, expressed in bit error rates, close to theoretical limits provided by Shannon. They are parallel concatenated convolutional codes. These convolutional codes are based on systematic punctured recursive codes, that is, they are derived from codes of rate 1/2 with which one input bit gives rise to two output bits, the puncturing being applied to the bits themselves. The concatenation as such is realized by an appropriate interleaving of the data that contain the information.

At the receiver end, the iterative decoding, called turbo decoding, consists of decoding the received symbols several times to improve the performance of the system in terms of bit error rates. The successive iterative decodings are carried out by a single soft-decision Viterbi decoder. This decoder differs from a conventional Viterbi decoder which makes a hard decision. In this document, the soft decisions on the output of the decoder produce a hard-decision reliability ratio, that is, a correct decision likelihood. The decoder is then followed by a deinterleaving of the output data.

However the use of turbo codes followed by an iterative decoding, as disclosed in said documents does not suppress the limitations of punctured systematic codes with codes of rate 1/2, especially when the latter are applied separately from the digital modulation with which they co-operate. More particularly, a disadvantage of these codes is that they are adapted only to modulations having a low spectral efficiency (less than or equal to two bits/s/Hz), such as the MDP2 and MDP4 phase modulations. A bit rate equal to a maximum of twice the band used corresponds to these codes. For augmenting the rate for a fixed occupied band, one could look for utilizing high spectral efficiency modulations of the quadrature amplitude modulation type (QAM). But the use of the punctured convolutional codes described above, juxtaposed with QAM modulations, does not provide optimum performance, because these codes have been designed irrespective of the modulation.

SUMMARY OF THE INVENTION

In it is an object of the invention to enhance the performance of such digital transmission systems while maintaining a proper functioning of the system with a minimum signal-to-noise ratio while improving their spectral efficiency.

This object is achieved with a digital transmission system in which the first sub-set utilizes a systematic convolutional trellis coding having a coding rate P/(Q.M), where M, P and Q are integers with Q and M being greater than 1, the systematic convolutional code being used for generating a product code in blocks with trellis closure by the addition of redundant data having at least one parity code bit. The product code is formed by components generated by row coding and column coding of a matrix that combines the coded data via the systematic convolutional code. The second sub-set combines the product code with a multidimensional amplitude modulation having dimension Q that has 2^(M) states, the iterative decoding being a block decoding.

For generating the product code and the added redundant data on the basis of systematic convolutional codes, the coding means may comprise a so-called state machine which defines output states, redundancy symbols based on input states and data symbols.

Preferably, the state machine is coupled to a reading table for determining the redundancy symbols of the systematic convolutional code and the symbols used for closing the trellis.

According to the invention, the system is also characterized in that the iterative decoding means comprise at least two paths operating in succession:

along a first path, the system carried out a first iterative decoding with each iteration of the path with:

a) computing means for computing hard decisions which relate to the systematic convolutional code,

b) computing means for computing first reliabilities of the hard decisions associated with each multidimensional modulation sub-set, and second reliabilities associated to the trellis of the systematic convolutional code,

c) selecting means for selecting minimum reliabilities between the first and second reliabilities of each decision,

d) computing means for computing soft decisions used for the next iteration of the first path as a function of selected minimum reliabilities and hard decisions,

and along a second path, the system utilizes for each iteration of the path:

a) computing means for computing hard decisions which relate to the parity code,

b) computing means for computing third reliabilities for each hard decision of the second path as a function of hard decisions of the first path,

c) computing means for computing soft decisions as a function of the third reliabilities, soft decisions coming from the preceding iteration of the second path and hard decisions from the first path.

The invention also relates to an input data protection method utilized in a digital transmission system, the method comprising a coding phase for coding said data and an iterative decoding phase. The coding phase comprises a first systematic convolutional trellis code step which permits of iterative decoding, which step is combined with a second step of allocating coded data to digitally modulated symbols, characterized in that during the first step the systematic trellis coding has a coding rate P/(Q.M), where M, P and Q are integers with Q and M being greater than 1, the systematic convolutional code being used for generating a product code in blocks after trellis closure by the addition of redundant data. The product code is formed by components generated by row coding and column coding of a matrix that combines the coded data via the systematic convolutional code. The second step combines the product code with a multidimensional amplitude modulation dimension Q that has 2^(M) states, the iterative decoding being a block of decoding.

A systematic convolutional coding is discussed here of rate P/(Q.M) preferably a rate 7/8. This coding is combined with a 2^(M) -state (preferably 4-state) multidimensional digital modulation to provide optimum performance. According to this example (M=2, Q=8, P=14, rate=14/16=7/8), such a coding is obtained by processing a bit stream in which are taken 14 bits or 7 symbols (called input symbols) to be coded into eight symbols (called output symbols). The Q symbols (the eight output symbols, respectively) select two 2^(M) -level symbols (four-level respectively {+1, -1, +3, -3}), that is to say, Q real symbols having the 2^(M) -level amplitude modulation with M output bits per symbol (four-level 4-AM respectively, with two output bits per symbol). The product code is realized by applying the systematic convolutional code to the rows and columns of a matrix which contains the information bits with a trellis closure for each row and each column. Subsequently, the 2^(M) -AM (for example, 4-AM) symbols coming from the matrix according to the product code are combined in pairs to generate 2^(2M) -QAM symbols (for example, 16-QAM). The coded data are then transmitted by a carrier according to customary techniques.

For permitting the turbo decoding at the receiver end, the product code must be systematic. Therefore, systematic convolutional codes are to be used, that is to say, after coding the input data symbols occur on the output unchanged.

The convolutional codes of rate P/(Q.M), for example, 7/8, described hereinafter, are designed in such a way that they give the lowest error rate for a given signal-to-noise ratio and this specifically for the 4-AM or 16-QAM modulation.

In this manner, a system is obtained having optimum performance both as regards signal-to-noise ratio and spectral efficiency by the combination of a coder structure which realizes in optimum fashion the systemic convolutional coding with a rate 7/8 with the multidimensional modulation.

According to the invention, actually a product code using a systematic convolutional code is discussed here combined with a quadrature amplitude modulation and not a juxtaposition.

This system has various advantages.

Compared to the prior-art system, which utilizes binary punctured codes with an MDP4 phase modulation, one has a transmission capacity that is twice higher (spectral efficiency between two and four bits/s/Hz).

The system does not have much hardware complexity, because a single soft-decision decoder is necessary for performing the iterative decoding of the product code.

The codes used are preferably systematic convolutional codes of rate 7/8, with 14 input bits and 16 output bits. The function that generates the 16 output bits as a function of the input bits and of the state (memory) of the coder has been optimized in view of the 16-QAM modulation.

The systematic convolutional codes, preferably of rate 7/8 are chosen so that the minimum Euclidian distance of these codes combined with a 16-QAM modulation is maximized for improving the performance. This particularly refers to the combination of the coding and the modulation.

These and other aspects of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter.

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings:

FIG. 1: shows a diagram of a baseband digital transmission system according to the invention;

FIG. 2: shows a tree A₀ partitioned into sub-sets;

FIG. 3: shows a general circuit diagram of a row or column coder permitting of generating the product code;

FIG. 4: shows a diagram of a digital transmission system comprising a coder for coding also the redundancy symbols;

FIG. 5: gives a representation of the partitioned tree of the 8-D constellation;

FIG. 6: gives a representation of the trellis of a code of rate 7/8;

FIG. 7: shows a general circuit diagram of a systematic convolutional coder of rate 7/8 combined with a 4-AM 8-D modulation;

FIG. 8: gives a representation of the bit allocation of the 4-AM symbols;

FIG. 9: represents a diagram showing a systematic convolutional coder for an 8-state code;

FIG. 10: represents a diagram showing a systematic convolutional coder for a 16-state code;

FIG. 11: shows a diagram of a particular embodiment of the coder represented in FIG. 7 for a code of rate 3/4;

FIG. 12 shows a diagram for the computation of the trellis closing symbols;

FIG. 13 shows a diagram of the decoding means of the first stage according to the invention;

FIG. 14: gives a representation of a trellis of the sub-sets S₀.0 and S₀.1 ;

FIG. 15 shows a flow chart of the various steps of the decoding carried out in the first stage;

FIG. 16: shows a diagram of the decoding means of the second stage according to the invention, and

FIG. 17: gives a representation in a trellis of the parity code.

DESCRIPTION OF EMBODIMENTS

FIG. 1 represents a diagram of a baseband digital transmission system according to the invention. The input data to be protected coming from a source 5 are organized in a matrix, for example, by storing them in a memory 10 formed by rows and columns which may be addressed separately. The system comprises row coding means 12 and column coding means 14. The two coding means produce data which are allocated to 4-AM digitally modulated symbols. An allocation element 16 transforms the 4-AM symbols into 16-QAM symbols. This is a combination in pairs of the 4-AM symbols.

These symbols are transmitted according to customary techniques over a channel 19 to receiver means. The received data pass through buffer means 20 which permit of performing the loop processing to be described hereinafter. The decoder comprises two paths operating in succession, one path 1 which relates to the decisions about the least-significant bits of the transmitted symbols (index i), and a second path which relates to the decisions of the most-significant bits of the transmitted symbols (index j).

On path 1, on the output of the buffer means 20, the data enter a Viterbi decoder 22₁ which has two outputs, a hard-decision output 21₁ which delivers the estimated symbols and the estimated bits i obtained for each iteration, and a soft-decision output 23₁ which is looped back to the buffer memory 20 through a data interleaver 24₁.

On path 2, on the output of the buffer means 20, the data enter a parity code decoder 22₂ which has two outputs, a hard-decision output 21₂ which delivers the estimated bits j obtained for each iteration, and a soft-decision output 23₂ which is looped back to the buffer 20 through a data interleaver 24₂.

The decoding of the path 2 is performed after path 1 has been decoded, based on received symbols and bits i estimated by the decoder of the path 1.

The estimated symbols become more reliable as the iterative processing is repeated. On average, this improvement, measured in error rates, is obtained after 4 or 5 iterations for the path 1 and after 2 or 3 iterations for the path 2.

For forming the product code, the coding of a row of the matrix is carried out by the row coder in the following fashion. The data are processed in blocks, one block comprising 2×(7N+4)² bits for a systematic code of rate 7/8 taken here by way of example. The memory 10 stores an information matrix [I] of dimension (7N+4)×(7N+4). The matrix contains quaternary data symbols {+1, -1, +3, -3}. Each symbol corresponds to 2 bits.

Then, each row of the matrix [I] (1 row=7N+4 symbols) is coded by a systematic convolutional row coder 122 (FIG. 3) generating both the data symbols (which are the 4-AM 4-level symbols {+1,-1,+3,-3} corresponding to the quaternary symbols of the matrix [I] before coding) and the redundancy symbols. For each row there are N 4-AM redundancy symbols generated by the convolutional 7/8 coder (N redundancy symbols for 7N data symbols) and 4 4-AM redundancy symbols for closing the code trellis. These 4 symbols are generated with the 4 last symbols of the row of the information matrix. The same operation is carried out for the columns of the matrix.

Consider by way of example the systematic convolutional code of rate 7/8 (coder 122). With 7 useful data symbols are generated 8 symbols comprising the 7 useful symbols (systematic convolutional code) plus one redundancy symbol. Consider the first row of the matrix formed by N+1 blocks (one block having 7 data symbols, that is, 14 bits) which are:

(I₁,1, . . . I₁,7), (I₁,8, . . . I₁,14), . . . , (I₁,7N-6 . . . I₁,7N), (I₁,7N+1, . . . I₁,7N+4).

A symbol, for example, I₁,1, comprises two bits j₁,1 and i₁,1.

The product code realized according to the diagram of FIG. 3, gives a matrix represented in Table I.

                  TABLE I                                                          ______________________________________                                         I.sub.1,1 ... I.sub.1,7N+4                                                                    R.sub.1,1 ... R.sub.1,N                                                                     TR.sub.1,1 ... TR.sub.1,4                          .....          .....        .....                                              I.sub.m,1 ... I.sub.m,7N+4                                                                    R.sub.m,1 ... R.sub.m,N                                                                     TR.sub.m,1 ... TR.sub.m,4                          .....          .....        .....                                              I.sub.7N+4,1 ... I.sub.7N+4,7N+4                                                              R.sub.7N+4,1 ... R.sub.7N+4,N                                                               TR.sub.7N+4,1 ... TR.sub.7N+4,4                    .....          .....        .....                                              C.sub.1,1 ... C.sub.1,7N+4                                                     .....          .....        .....                                              C.sub.m,1 ... C.sub.m,7N+4                                                     .....          .....        .....                                              C.sub.N,1 ... C.sub.N,7N+4                                                     .....          .....        .....                                              TC.sub.1,1 ... TC.sub.1,7N+4                                                   .....          .....        .....                                              TC.sub.4,1 ... TC.sub.4,7N+4                                                   ______________________________________                                    

For each block is computed the redundancy symbol (that is, 2bits) of the systematic convolutional code, block 1 produces R₁,1, block 2 produces R₁,2 and so on and so forth up to block N which produces R₁,N.

There is supposed that the initial state of the coder is equal to zero. After generating R₁,N, the coder 122 is in state σ(N). With the aide of the trellis closing means 128, the trellis is closed by forcing the state of the trellis to zero by generating 4 symbols TR₁,1, TR₁,2, TR₁,3, TR₁,4 (for an 8-state code) corresponding to a transition in the trellis of the 8-state convolutional code, so that after this transition one arrives at the state σ=0. For a code having more states, it is necessary to use more trellis closing symbols. The symbols TR₁,1, TR₁,2, TR₁,3, TR₁,4 are functions of the 4 data symbols (I₁,7N+1, . . . I₁,7N+4) and of the state of the trellis σ(N) after a row has been coded and are generated by a Table addressed by σ(N) described hereinafter.

After the coding, the matrix of 4-AM symbols represented in Table I is obtained in which:

I_(m),n is a matrix having dimensions (7N+4)×(7N+4) comprising the 4-AM data symbols.

R_(m),n is a matrix having dimensions (7 N+4)×N comprising the 4-AM symbols that correspond to the row redundancy symbols generated by the 7/8 code.

TR_(m),n is a matrix having dimensions (7N+4)×4 comprising the 4-AM trellis closing row redundancy symbols.

C_(m),n is a matrix having dimensions (N×7N+4) comprising the column redundancy symbols.

TC_(m),n is a matrix having dimensions (4×7N+4) comprising the trellis closing column redundancy symbols.

The row coder 12 operates in the following manner (FIG. 3). The input symbols I_(m),n enter the buffer 120 and then the coder 122 of rate 7/8 which produces one redundancy symbol for a block of 7 data symbols. A multiplexer 124 serializes the symbols on the output. Therefore, it supplies on its output 131, in sequence, groups of 8 symbols while each group is formed by the 7 data symbols and the redundancy symbol corresponding to this block. The multiplexer then supplies all the groups of 8 symbols in succession. When all the groups have been extracted, the 4 last data symbols of the row are extracted and then the 4 trellis closing symbols produced by the element 128 for determining closing symbols. A controller 17 controls the operations.

The same process is carried out for the other rows. In like manner, a similar process is realized for the columns (column coder 14). The first block of the first column is formed by the symbols: I₁,1,I₂,1 . . . I_(7N+4),1. One redundancy symbol corresponds to each block of 7 symbols, for example, the symbol C₁,1 corresponds to the first block and the symbol C_(N),1 corresponds to the last block. The trellis closing redundancy symbols for the first column are the symbols TC₁,1, TC₂,1, TC₃,1, TC₄,1 generated on the basis of the symbols I_(7N+1),1, . . . I_(7N+4),1. All the data formed by the initial-data symbols, the row coding redundancy symbols and the column coding redundancy symbols and the trellis closing symbols form the product code.

One row of this product code forms a block of symbols which is used for coding 4-AM modulation symbols. As the initial-data symbols remain the same in the product code whether they are read in rows or in columns, for utilizing the columns of the product code it is needless to use the initial-data symbols once again. Thus only the redundancy symbols of the columns of the product code are used for coding (column coder 14) 4-AM modulation symbols. The 4-AM symbols coming from the rows and columns of the product code are used for coding a 16-QAM modulation in the allocation element 16.

For enhancing the performance of the system it is possible to code also the redundancy symbols which have just been computed.

In this manner, the columns of the matrices R_(m),n and TR_(m),n (row redundancy column coding) may be coder for generating the matrices RC_(m),n, TRC_(m),n, RCT_(m),n and TRCT_(m),n having dimensions (N×N), (N×4), (4×N) and (4×4), respectively (Table II). Also coded in rows is the column redundancy (matrices C_(m),n and TC_(m),n) for generating the matrices CR_(m),n, CRT_(m),n, TCR_(m),n and TCRT_(m),n having dimensions (N×N), (N×4), (4×N) and (4×4), respectively.

In this case, the information matrix having dimensions (7N+4)×(7N+4) following the rows and columns for obtaining the row redundancy (symbols R_(m),n and TR_(m),n) and the column redundancy (symbols C_(m),n and TC_(m),n) in the same manner as that which has just been described. Then the row redundancy is coded in a column and the column redundancy is coded in a row in order to enhance the performance of the system. Thus, for example, the block of 7N+4 symbols (R₁,1, . . . , R_(7N+4),1) is coded to generate first the N column redundancy symbols (RC₁,1, . . . , RC_(N),1) coming from the 7/8 code redundancy and then the four redundancy symbols (RCT₁,1 to RCT₄,1) for closing the trellis. The same is carried out for the other columns of the row redundancy (R₁,n, . . . , T_(7N+4),n) for n=1, . . . , N for the redundancy are coded, that is, the rows (C_(m),1, . . . ,C_(m),7N+4) for m=1, . . . ,N and the 4 rows (TC₁,1, . . . , TC₁,7N+4) up to (TC₄,1, . . . , TC₄,7N+4).

Thus the following matrix is obtained:

                  TABLE II                                                         ______________________________________                                         I.sub.1,1 ... I.sub.1,n ... I.sub.1,7N+4                                                      R.sub.1,1 ... R.sub.1,N                                                                    TR.sub.1,1, ... TR.sub.1,4                          .......        .......     .......                                             I.sub.m,1 ... I.sub.m,n ... I.sub.m,7N+4                                                      R.sub.m,1 ... R.sub.m,N                                                                    TR.sub.m,1, ... TR.sub.m,4                          .......        .......     .......                                             I.sub.7N+4,1 ... I.sub.7N+4,n I.sub.7N+4,7N+4                                                 R.sub.7N+4,1 ... R.sub.7N+4,N                                                              TR.sub.7N+4,1, ... TR.sub.7N+4,4                    .......        .......     .......                                             C.sub.1,1 ... C.sub.1,n C.sub.1,7N+4                                                          RC.sub.1,1 ... RC.sub.1,N                                                                  TRC.sub.1,1, ... TRC.sub.1,4                        .......        .......     .......                                             C.sub.N,1 ... C.sub.N,n C.sub.N,7N+4                                                          RC.sub.N,1 ... RC.sub.N,N                                                                  TRC.sub.N,1 ... TRC.sub.N,4                         .......        .......     .......                                             TC.sub.1,1 ... TC.sub.1,n ... TC.sub.1,7N+4                                                   RCT.sub.1,1 ... RCT.sub.1,N                                                                TRCT.sub.1,1, ... TRCT.sub.1,4                      .......        .......     .......                                             TC.sub.4,1 ... TC.sub.4,n ... TC.sub.4,7N+4                                                   RCT.sub.4,1 ... RCT.sub.4,N                                                                TRCT.sub.4,1, ... TRCT.sub.4,4                      .......        .......                                                                        CR.sub.1,1 ... CR.sub.1,N                                                                  CRT.sub.1,1,CRT.sub.1,4                             .......        .......                                                                        CR.sub.N,1 ... CR.sub.N,N                                                                  CRT.sub.N,1, ... CRT.sub.N,4                        .......        .......                                                                        TCR.sub.1,1 ... TCR.sub.1,N                                                                TCRT.sub.1,1, ... TCRT.sub.1,4                      .......        .......                                                                        TCR.sub.4,1 ... TCR.sub.4,N                                                                TCRT.sub.4,1, ...TCRT.sub.4,4                       ______________________________________                                    

In this Table:

the matrix [I] contains the input data symbols,

the matrix [R] is the row redundancy matrix of the matrix [I],

the matrix [C] is the column redundancy matrix of the matrix [I],

the matrix [TR] is the trellis closing redundancy matrix for the rows of the matrix [I],

the matrix [TC] is the trellis closing redundancy matrix for the columns of the matrix [I],

the matrix [RC] is the column redundancy matrix of the matrix [R],

the matrix [CR] is the row redundancy matrix of the matrix [C],

the matrix [TCR] is the row redundancy matrix of the matrix [TC],

the matrix [RCT] is the trellis closing redundancy matrix for the columns of the matrix [R],

the matrix [TRC] is the column redundancy matrix of the matrix [TR],

the matrix [TRCT] is the trellis closure matrix for the columns of the matrix [TR],

the matrix [CRT] is the trellis closure matrix of the rows of the matrix [C],

the matrix [TCRT] is the trellis closure matrix of the row coding of the matrix [TC].

Consider in more detail the operation of the row coder 12 represented in FIG. 3 for coding a row of the matrix.

In the buffer 120 is stored the row one wishes to code. One row comprises (14N+8) bits or (7N+4) quaternary data symbols. For example, for the block of the k^(th) order, the buffer stores N blocks (i₁ (k), j₁ (k), . . . , i₇ (k), j₇ (k)) having 14 bits (that is, 7 symbols) and 1 block of 8 bits (that is 4 symbols):

i₁ (N+1),i₁ (N+1)

i₂ (N+1),i₂ (N+1)

i₃ (N+1),i₃ (N+1)

i₅ (N+1),i₅ (N+1)

The N blocks of 14 bits are successively subjected to a systematic convolutional coding of rate 7/8 (coder 122). For each block (k^(th) block), the coder 122 generates 7 4-AM data symbols U₁ (k) to U₇ (k) which corresponds to 14 information bits of the block and 1 redundancy symbol U₈ (k), for k=1, . . . ,N, (connection 123) by realizing a bit allocation described in FIG. 8.

Each block of 14 information bits corresponds to a transition in the 7/8-code trellis. The last block of the N+1^(th) order corresponds to the transition that closes the trellis.

Based on the 8 information bits {i₁ (N+1), j₁ (N+1), i₂ (N+1), j₂ (N+1), i₃ (N+1), j₃ (N+1), i₅ (N+1), j₅ (N+1)}, (4 quaternary symbols) which are the 8 last bits of the row, the 4-AM symbols are generated, that is, U₁ (N+1), U₂ (N+1), U₃ (N+1), U₅ (N+1) just like the bit allocation given by FIG. 8, after which the 4 redundancy symbols U₄ (N+1), U₆ (N+1), U₇ (N+1) and U₈ (N+1) are computed, permitting of closing the trellis. These symbols are both a function of the state of the coder σ_(N+1) after the coding of the N^(th) block and of the 8 bits {i₁ (N+1), j₁ (N+1), i₂ (N+1), j₂ (N+1), i₃ (N+1), j₃ (N+1), i₅ (N+1), j₅ (N+1)}. They are determined by element 128.

The column coder is the same except on the output of the systematic convolutional 7/8 coding where they are only the redundancy symbols.

The diagram of the coder which permits to make the double coding of the redundancy is represented in FIG. 4. Like elements to those of FIG. 1 are represented having like references. In the case of the example under consideration, the memory M 10 contains (7N+4)² symbols. Another memory MR contains the (7N+4)(N+4) row redundancy symbols (symbols R_(m),n, TR_(m),n). Another memory MC contains the (N+4)(7N+4) column redundancy symbols (symbols C_(m),n and TC_(m),n). The memories MR and MC are loaded after finishing the row and column coding of M. Then, the coding of the contents of MR is performed following the columns and the coding of the contents of MC following the rows for generating the (N+4)² 4-AM symbols (RC_(m),n, TRC_(m),n, RCT_(m),n and TRCT_(m),n) and the (N+4)² 4-AM symbols (CR_(m),n, CRT_(m),n, TCR_(m),n, and TCRT_(m),n), respectively. Switches 13 and 15 ensure the running of the operations under the control of the controller 17.

Finally, all the 4-AM symbols formed for each product code matrix of the Tables I or II are combined to pairs and transmitted over the channel in the form of complex symbols of the 16-QAM constellation (in a well-defined order).

The rate of the product code without redundancy coding is equal to: ##EQU1## For N=20, the rate is 0.765 and the spectral efficiency is thus equal to 4 times this rate, that is, 3.06 bits/s/Hz.

With a double redundancy coding, the rate of the product code becomes equal to: ##EQU2##

Thus, with N=20, a rate 0.72 is obtained and a spectral efficiency of 2.88 bits/s/Hz. There is a loss of spectral efficiency when coding the redundancy of 0.18 bits/s/Hz, but the performance of the system is enhanced.

FIG. 8 represents the bit allocation of the bits i,j to the symbols of the 4-AM constellation.

The 4-AM constellation having a 1-D dimension is represented by the set A₀ ={-3,-1,+1,+3}. The first partition level of A₀ comprises two sub-sets B₀ and B₁ with B₀ ={3,-1} and B₁ ={1,-3} (FIG. 2). A symbol, for example I₁,1 comprises two bits i₁,1 and j₁,1. The bit i is allocated to this first level with i=0 for B₀ and i=1 for B₁.

The second partition level of A₀ comprises four sub-sets C₀, C₁, C₂ and C₃, with C₀ ={+3}, C₁ ={+1}, C₂ ={-1} and C₃ ={-3}. The index j is allocated to this second level, with j=0 for C₀ or C₁ and j=1 for C₂ or C₃. The index of the sets C is equal to the decimal value of the indices j,i, that is, 2j+i, allocated to the partition generating them.

An 8-D constellation is defined as being the set of the blocks of 8 symbols belonging each to A₀. FIG. 5 represents the partition tree of the 8-D constellation (A₀)⁸ where A₀ is the one-dimension (1-D) 4-AM constellation.

The set (A₀)⁸ has do² for the (squared) minimum Euclidian distance. This set is divided into 2 sub-sets having a minimum distance of 2do². To each sub-set is allocated a bit Y₀ having the 0 or 1 value.

Y₀ =0 for the sub-set formed by all the blocks belonging to B_(i1), . . . ,B_(i8) with ##EQU3##

Y₀ =1 for the sub-set formed by all the blocks belonging to B_(i1). . . B_(i8) with ##EQU4##

Thus, Y₀ =0 corresponds to the set of all the 4-AM symbol blocks (U₁ . . . U₈) containing an odd number of components in the 1-D sub-set, that is B₁ ={+1, -3}.

Similarly, Y₀ =1 corresponds to the set of all the 4-AM symbol blocks (U₁ . . . U₈) containing an odd number of components in the 1-D sub-set, that is B₁ ={-1, +3}.

Then, each 8-D sub-set is in its turn divided into 2 other 8-D sub-sets, and so on and so forth.

To each partition level is allocated one bit:

Y₀ is allocated to the first level;

Y₁ is allocated to the second level;

Y₂ is allocated to the third level;

Y₃ is allocated to the fourth level;

In the following will be described only the sub-sets corresponding to Y₀ =0.

After the 4^(th) partition level, the 8 sub-sets:

S₀, S₂, S₄, S₆, S₈, S₁₀, S₁₂, S₁₄ (S_(i), i even) are obtained.

The index i of a sub-set S_(i) is the decimal value of 4 bits Y₃, Y₂, Y₁, Y₀, allocated to S_(i).

Each sub-set has the form U(B_(i1) . . . B_(i8)) (union of the sub-sets) and is defined by parity relations of the indices (i₁, . . . i₈). The minimum (squared) distance in each sub-set S_(i) is 4-do². Each sub-set contains 2¹² =4096 blocks of 8 4-AM symbols.

Each sub-set S_(i) contains 16 sub-sets (B_(i1) . . . B_(i8)) and each sub-set (B_(i1) . . . B_(i8)) contains 2⁸ =256 8-D blocks.

Finally, each sub-set S_(i) is divided into 2 sub-sets S_(i),0 and S_(i),1, where:

S_(i),0 is the sub-set of the blocks of S_(i) of which the last 4-AM symbol of the block is positive (thus belonging to C₀ or C₁).

S_(i),1 is the sub-set of the blocks S_(i) of which the last 4-AM symbol of the block is negative (thus belonging to C₂ or C₃).

Thus, S_(i),0 corresponds to the set of the 8-D blocks of S_(i) of which the last symbol U₈ is in C₀ or C₁, that is to say, that the last symbol corresponds to the bit j₈ =0. S_(i),0 contains 2¹¹ elements.

S_(i),1 ={(U₁, . . . U₈) of S_(i), so that j₈ =1}.

For example, the sub-set S₆,1 is defined by the set of the blocks (U₁, U₂, . . . U₈) of (A₀)⁸ verifying j₈ =1 and the 4 parity relations of the bits i₁ to i₈ : ##EQU5## where (i_(p), j_(p)) are the bits allocated to the 4-AM symbol U_(p) (FIG. 8).

In the general case, for even i, S_(i),j is the set of the blocks U=(U₁, . . . ,U₈) of 4-AM symbols verifying the following parity relations ##EQU6## where (Y₃ Y₂ Y₁ Y₀) is the bit representation of i, that is to say:

i=8Y₃ +4Y₂ +2Y₁ +Y₀, with Y₀ =0 and (i_(p), j_(p)) is the bit allocation of the p^(th) symbol of the block U_(p) : ##EQU7##

Thus, for generating all the S_(i),j blocks (2¹¹ blocks), it is sufficient to scan all the possible combinations of the 11 bits i₁, i₂, i₃, i₅, j₁, j₂, j₃, j₄, j₅, j₆ and j₇. For a given combination, the other bits (i₄, i₆, i₇, i₈, j₈) are computed based on the parity relations of the sub-set S_(i),j defined above.

The systematic 7/8-rate convolution code is formed in the following manner:

The sub-sets S_(i),j are allocated to the parallel branches of the trellis. Moreover, the sub-sets S_(i),j with even i are utilized. This ensures a minimum distance (squared) equal to 4do² where do is the minimum distance of the 4-AM constellation.

For having a code with a rate 7/8, there must be 8 separate transitions coming from a given state of the coder, which corresponds to 14 input bits (of which 3 coded bits and 11 non-coded bits) for 8 transmitted 4-AM symbols (that is, 16 bits). Consequently, the trellis of an 8-state code is connected completely.

For having a systematic code, that is, for providing that the transmitted 7 first 4-AM symbols of the 8-D block are the 7 data symbols (or 14 bits), it is necessary for the 2¹⁴ transitions based on a state to generate 2¹⁴ blocks of 8 4-AM symbols, the 7 first ones employing the 2¹⁴ possible combinations. Therefore, it is sufficient to allocate 8 sub-sets S_(i),j, where i=0, 2, 4, 6, 8, 10, 12, 14 and j is an arbitrary value, to the 8 separate branches coming from one state.

FIG. 6 shows the trellis of the optimum 7/8 systematic convolutional code. In this Figure, σ_(k) is the state of the coder at the instant k and σ_(k+1) is the state of the coder at the instant k+1, the state being defined by the 3 bits in the memory of the coder (3 shift registers). This Figure also shows the allocation of the sub-sets S_(i),j to the various trellis transitions. The trellis is analyzed in the following manner:

Based on the state σ(k) at the instant kt:

σ_(k) =(σ_(k) ²,σ_(k) ¹,σ_(k) ⁰), the coder proceeds to another state σ(k+1) at an instant (k+1)T: σ_(k+1) =(σ_(k+1) ²,σ_(k+1) ¹,σ_(k+1) ⁰).

Thus from the state [111] the coder can go over to one of the 8 states [000][001][010][011][100][101][110][111].

For example, it is observed that the third transition coming from the state 001, that is to say, the transition 001→010, corresponds to S₁₀,1. The whole trellis is analyzed in like manner.

FIG. 7 shows the block diagram of the coder 122 of rate 7/8 (FIG. 3). The 14 bits on the input of the coder at the instant k, (i₁ (k), j₁ (k) l=1 . . . 7, select the 7 first symbols of the transmitted block U₁ (k), . . . U₇ (k) as shown in FIG. 8. For computing the redundancy symbol U₈ (k), that is, (i₈ (k), j₈ (k)), first the index i (even i) of the sub-set S_(i) is computed which corresponds in like manner to the 3 bits Y₃ (k), Y₂ (k), Y₁ (k) with i=8Y₃ +4Y₂ +2Y₁ +Y₀, Y₀ =0. Also i₈ (k) is computed, which is the parity bit of the bits i₁ (k), . . . i₇ (k). The bit j₈ (k) is the redundancy bit of a systematic convolutional coder 230 of rate 3/4 having for its inputs the bits Y₁, Y₂, and Y₃. The bits (i₈, j₈) select the symbol U₈ (k). On the 3/4 code output one has the next state of the coder σ_(k+1) which will be used for closing the trellis at the end of a row or of a column (k=N).

The computation of the bits Y₁ (k), Y₂ (k), Y₃ (k) and i₈ (k) as a function of the bits i₁ (k), i₂ (k), . . . i₇ (k) is given by the following equations:

    Y.sub.1 (k)=i.sub.1 (k)⊕i.sub.2 (k)⊕i.sub.3 (k)⊕i.sub.4 (k)

    Y.sub.2 (k)=i.sub.1 (k)⊕i.sub.2 (k)⊕i.sub.5 (k)⊕i.sub.6 (k)

    Y.sub.3 (k)=i.sub.1 (k)⊕i.sub.3 (k)⊕i.sub.5 (k)⊕i.sub.7 (k)

    i.sub.8 (k)=i.sub.1 (k)⊕i.sub.2 (k)⊕i.sub.3 (k)⊕i.sub.4 (k)⊕i.sub.5 (k)⊕i.sub.6 (k)⊕i.sub.7 (k)

These equations are derived from the bit allocation of the sub-sets S_(i) to the bits Y₀, Y₁, Y₂, and Y₃ (FIG. 5) which is realized in element 210.

This structure of the coder (FIG. 7) permits of allocating all the 8-D blocks of S_(i),j8 with i=8Y₃ +4Y₂ +2Y₁ to the parallel transitions of the trellis from a state σ to another state.

The convolutional coder of FIG. 7 may be realized either via a Table (FIG. 11), or by shift registers (FIGS. 9 and 10), or by software of a computer.

In FIG. 11, the Table 220 (memory) gives the redundancy bit j₈ (k) and the future state σ_(k+1) (ν bits for a code having 2.sup.ν states), as a function of σ_(k), Y₁ (k), Y₂ (k), Y₃ (k). The Table 220 receives Y₁, Y₂, Y₃ and also its output σ_(k+1) which is looped back to the input through a delay cell 222.

FIGS. 9 and 10 show the diagrams of the optimum, 8-state codes (ν=3) and 16-state codes (ν=4). For an 8-state code, a chain is formed by an adder cell 312₁, a delay cell 310₁, an adder cell 312₂, a delay cell 310₂, an adder cell 312₃, a delay cell 310₃, an adder cell 312₄, while the output of the system produces j₈ (k).

The adder cell 312₁ receives Y₁ (k),

The adder cell 312₂ receives Y₃ (k),

The adder cell 312₃ receives Y₂ (k) and Y₃ (k),

The adder cell 312₄ receives Y₁ (k), Y₂ (k) and Y₃ (k).

For a 16-state code (FIG. 10), a system is formed by the same elements as for the 8-state system with additionally a delay cell 310₄ and an adder cell 312₅.

FIG. 12 relates to the trellis closure arrangement. Let us consider the state σ of the coder and the sub-sets S_(i),j8 (8-D sub-sets) allocated to the transition (2¹¹ parallel branches) closing the trellis.

    i=8Y.sub.3 +4Y.sub.2 +2Y.sub.1

As there are 2¹¹ branches at which the trellis can be closed, one will look for the branch as a function of the 4 data symbols U₁, U₂, U₃ and U₅, that is, 8 information bits i₁, j₁, i₂, j₂, i₃, j₃, i₅ and ₅.

During the closing transition of the trellis, 4 data symbols U₁, U₂, U₃ and U₅ are transmitted corresponding to the bits (i₁,j₁), (i₂,j₂), (i₃,j₃) and (i₅,j₅), respectively.

The computation is made in two steps (FIG. 12): Based on the state σ_(N+1) of the coder at the end of the coding of a row or of a column, the bits Y₁ (N+1), Y₂ (N+1), Y₃ (N+1) and j₈ (N+1) are generated on the basis of the Table 210 which contains the Table III.

                  TABLE III                                                        ______________________________________                                         σ(binary)                                                                (σ.sup.2, σ.sup.1, σ.sup.0)                                            σ(decimal)                                                                            S.sub.i,j8                                                                             Y.sub.3 Y.sub.2 Y.sub.1                                                               j.sub.8                                  ______________________________________                                         0 0 0     0            S.sub.0,0                                                                              0 0 0  0                                        0 0 1     1            S.sub.6,1                                                                              0 1 1  1                                        0 1 0     2            S.sub.2,1                                                                              0 0 1  1                                        0 1 1     3            S.sub.4,0                                                                              0 1 0  0                                        1 0 0     4            S.sub.12,0                                                                             1 1 0  0                                        1 0 1     5            S.sub.10,1                                                                             1 0 1  1                                        1 1 0     6            S.sub.14,1                                                                             1 1 1  1                                        1 1 1     7            S.sub.8,0                                                                              1 0 0  0                                        ______________________________________                                    

Based on the bits Y₁ (N+1), Y₂ (N+1), Y₃ (N+1) and j₈ (N+1), the bits (i₄, j₄), (i₆, j₆), (i₇, j₇) and (i₈, j₈)(N+1) are computed making it possible to generate the symbols U₄ (N+1), U₆ (N+1), U₇ (N+1) and U₈ (N+1) in computing means 240. These bits are computed via:

    i.sub.4 (N+1)=i.sub.1 (N+1)⊕i.sub.2 (N+1)⊕i.sub.3 (N+1)⊕Y.sub.1 (N+1)

    i.sub.6 (N+1)=i.sub.1 (N+1)⊕i.sub.2 (N+1)⊕i.sub.5 (N+1)⊕Y.sub.2 (N+1)

    i.sub.7 (N+1)=i.sub.1 (N+1)⊕i.sub.3 (N+1)⊕i.sub.5 (N+1)⊕Y.sub.3 (N+1)

    i.sub.8 (N+1)=i.sub.2 (N+1)⊕i.sub.3 (N+1)⊕i.sub.5 (N+1)⊕Y.sub.1 (N+1)Y.sub.2 (N+1)⊕Y.sub.3 (N+1)

The bits j₄ and j₆ may assume whatever value. They are determined to be, for example, 0 (j₄ =j₆ =0).

The bit j₇ is the parity bit of all the bits (j₁, . . . j₇) of the preceding transitions: ##EQU8## This is effected in the computing means represented in FIG. 12. Preferably, the computations are realized via software of a computer.

The decoding means are shown in FIG. 1. The decoding is carried out in steps in two different stages. In the first stage an iterative decoding is carried out of the least-significant bits (LSB) of the transmitted symbols (bits i).

The matrix of the symbols received through the channel is stored in a memory 20, which matrix corresponds to the matrix of the transmitted symbols (the dimension of the matrix is the same as that of the matrix coded at the transmitter end).

The rows and after that the columns are successively decoded independently. With each iteration, the decision (connection 21₁) on the bits i (bit matrix) is generated and a real-symbol matrix (reliability of the decision) which will be used during the next iteration is stored in the memory 20 (connection 23₁). A de-interleaver 24₁ delays the data.

For the decoding of a row and of a column, a soft-decision Viterbi decoder 22₁ is used corresponding to the 8-D 7/8 convolutional code for the desired example.

In the second stage, after a certain number of iterations for the first step (generally 3 or 4), one proceeds to step 2 (connection 25) for decoding the bits j, that is to say, the most-significant bits (MSB) of the transmitted symbols.

Rows and after that columns are then iteratively decoded in that the real-symbol matrix stored in memory 20 and the matrix of the bits i detected in the first stage are used.

The decoder 22₂ of a row or of a column is a soft-decision decoder of the parity code used when the trellis of the 7/8 convolutional code is closed for each row and column of the product code.

First, consider the operation of the first stage (path 1). FIG. 13 represents the general circuit diagram of a stage comprising the means that double-decision Viterbi decoding means 22₁ for the LSB bits of the transmitted 4-AM symbols (bits i). They comprise:

a sub-set 220 for computing matrices,

a Viterbi decoder 222 which produces hard decisions,

a sub-set 224 for computing the reliability of the decisions,

a sub-set 226 for computing soft decisions.

The decoding of systematic convolutional codes consists of applying a soft-decision decoding algorithm. For simplicity of the exposition, the systematic convolutional code of rate 7/8 will be taken as an example. According to the particular example described for the row having index 1 in the Table I, a range of the product code is formed by the following symbols which have been transmitted at the transmitter end (for simplicity of the exposition, the row index, here i=1, is omitted in the following):

7N+4 data symbols:

I=I₁, . . . ,I_(7N+4)

N code redundancy symbols:

R=R₁, . . . ,R_(N)

4 trellis closing symbols:

TR=TR₁,TR₂,TR₃,TR₄.

Because of the imperfections of the transmit channel, the received symbols D.sup.(0) =(D₁.sup.(0), . . . ,D_(8N+8).sup.(0)) will present differences compared with the transmitted symbols.

At the receiver end, complex symbols are received which correspond to the transmitted 16-QAM symbols after passing through the channel. Each complex symbol is considered to be the sequence of 2 real symbols. Then, these real symbols are stored in the memory 20 (FIG. 1) in accordance with the matrix which has the same structure as the matrix defined at the transmitter end. The received real symbols are arranged in the matrix while adhering to the same order as that used at the transmitter end. The decoding process of the bits i is iterative, which means that the rows of the matrix are decoded first and then the columns. The number of rows or columns to be decoded with each iteration is equal to 7N+4 in the case of Table I (without redundancy coding) or equal to 8N+8 in the case where the redundancy is coded (Table II).

First, let us consider the iterative decoding at the v^(th) iteration for a row of the matrix, that is to say, a block of real symbols: D.sup.(ν-1) =(D₁.sup.(ν-1), . . . ,D_(8N+8).sup.(ν-1)). The index v is an integer corresponding to the number of the iteration. The decoding produces the block: D.sup.(ν) =(D₁.sup.(ν), . . . ,D_(8N+8).sup.(ν)) of 8N+8 real symbols (soft output) which will be applied to the next iteration and to the optimum decision of the bits i.sup.(ν) =(i₁.sup.(ν), . . . ,i_(8N+8).sup.(ν)) corresponding to the transmitted bits i=(i₁, . . . ,i_(8N+8)) which are the bits of the first partition level (LSB bits) of the transmitted 4-AM symbols (I₁, . . . I_(7N+4),R₁, . . . R_(N),TR₁, . . . TR₄), respectively. It is supposed that the 7N+4 symbols D₁.sup.(ν-1), . . . ,D_(7N+4).sup.(ν-1) correspond to the data symbols, and the N symbols D_(7N+5).sup.(ν-1), . . . ,D_(8N+4).sup.(ν-1) correspond to the 7/8 code redundancy symbols and the 4 symbols D_(8N+5).sup.(ν-1), . . . ,D_(8N+8).sup.(ν-1) are the redundancy symbols for closing the trellis. The symbols are processed in the following order: ##EQU9##

The decoding is performed in six steps. The following exposition indicates the manner in which D.sup.(ν) is derived from D.sup.(ν-1).

The first step relates to the computation of the metrics. The sub-set 220 for computing the metrics (FIG. 13) carries out for each block of 8 symbols (1^(st) block, l=0, . . .N-1) (D_(7l+1).sup.(ν-1), - - - D_(7l+7).sup.(ν-1), D_(7N+5+l).sup.(ν-1)) the detection and the computation of metrics in each 8-D sub-set S_(i),j, and for the block (D_(7N+1).sup.(ν-1), - - - D_(7N+4).sup.(ν-1),D_(8N+5).sup.(ν-1), . . . D_(8N+8).sup.(ν-1)) corresponding to the transition that closes the trellis at the end of the coding of a row or of a column of the product code. For simplicity, the 8-D block is denoted (r₁, - - - r₈). The computation of the metrics is carried out in various steps.

First consider the computation of the metrics in the 1-D constellation. For k=1, . . . 7 (the first 7 symbols of the block), the nearest 4-AM symbol is detected in each of the sub-sets B₀ ={3, -1} and B₁ ={1,-3} and the corresponding metric is computed: M_(k),0 and M_(k),1, respectively, where M_(k),i is equal to the squared Euclidian distance between r_(k) and the nearest symbol in B_(i).

For k=8, the metrics M₈,0, M₈,1, M₈,2 and M₈,3 of the symbol r₈ in each sub-set C_(i) are computed, with Ci=0, 1, 2, 3, respectively, where C_(i) contains the 4-AM point corresponding to the value i in decimal form of the 2 bits allocated to the 4-AM constellation.

Thereafter, the metrics are computed in the 2-D constellation. For the 3 first 2-D blocks (symbol pairs), that is, (r₁, r₂) (r₃, r₄) and (r₅, r₆), the metrics M_(k),l.sup.(2) for k=1, 3, 5 are detected and computed in the 4 2-D sub-sets E_(l).sup.(2) =B_(i) B_(i') with l=2i+i', i=0, 1 and i'=0, 1.

The 2-D metric is defined as being the sum of the 2 1-D metrics of the 2 symbols of 2-D block. The metric of (r_(k), r_(k+1)) in E_(l).sup.(2) is obtained for k=1, 3, 5:

    M.sub.k,l.sup.(2) =M.sub.k,i +M.sub.k+1,i'

for l=0, 1, 2, 3

with l=2i+i'.

For the last 2-D block r₇, r₈, the metrics M₇,l,j.sup.(2) are computed in the 8 2-D sub-sets E_(lj).sup.(2) =B_(i) C_(2j+i') for i=0, 1, i'=0, 1, j=0, 1 with l=2i+i':

    M.sub.7,l,j.sup.(2) =M.sub.7,i +M.sub.8,2j+i'

Thereafter, the metrics are computed in the 4-D constellation. The metrics M₁,l.sup.(4) are detected and computed of the 4-D block (r₁ r₂ r₃ r₄) in the 8 four-dimension sub-sets E_(l).sup.(4), with l=0, 1, . . . 7:

    E.sub.0.sup.(4) =E.sub.0.sup.(2) E.sub.0.sup.(2) U E.sub.3.sup.(2) E.sub.3.sup.(2)

    E.sub.1.sup.(4) =E.sub.0.sup.(2) E.sub.1.sup.(2) U E.sub.3.sup.(2) E.sub.2.sup.(2)

    E.sub.2.sup.(4) =E.sub.0.sup.(2) E.sub.2.sup.(2) U E.sub.3.sup.(2) E.sub.1.sup.(2)

    E.sub.3.sup.(4) =E.sub.0.sup.(2) E.sub.3.sup.(2) U E.sub.3.sup.(2) E.sub.0.sup.(2)

    E.sub.4.sup.(4) =E.sub.1.sup.(2) E.sub.0.sup.(2) U E.sub.2.sup.(2) E.sub.3.sup.(2)

    E.sub.5.sup.(4) =E.sub.1.sup.(2) E.sub.1.sup.(2) U E.sub.2.sup.(2) E.sub.2.sup.(2)

    E.sub.6.sup.(4) =E.sub.1.sup.(2) E.sub.2.sup.(2) U E.sub.2.sup.(2) E.sub.1.sup.(2)

    E.sub.7.sup.(4) =E.sub.1.sup.(2) E.sub.3.sup.(2) U E.sub.2.sup.(2) E.sub.0.sup.(2)

For each sub-set 2 4-D metrics are computed and the smaller metric is taken. For example, for E₀.sup.(4) is computed:

the metric M₁,3.sup.(2) +M₃,3.sup.(2) in E₃.sup.(2) E₃.sup.(2) ;

the metric M₁,3.sup.(2) +M₃,3.sup.(2) in E₃.sup.(2) E₃.sup.(2) ;

the metric M₁,0.sup.(4) in E₀.sup.(4) of (r₁ r₂ r₃ R₄), equal to:

    min [M.sub.1,0.sup.(2) +M.sub.3,0.sup.(2), M.sub.1,3.sup.(2) +M.sub.3,3.sup.(2) ].

For the block (r₅ r₆ r₇ r₈), the metrics M₅,l,j.sup.(4) in the sub-sets E_(l),j.sup.(4) for l=0,1, . . . 7 and j=0,1 are detected and computed. The sub-sets E_(l),j.sup.(4) are defined in similar fashion to E_(l).sup.(4) except that the last symbol is positive for j=0 and is negative for j=1. For example, E₀,j.sup.(4) =E₀.sup.(2) E₀,j.sup.(2) U E₃.sup.(2) E₃,j.sup.(2). Thus it is sufficient to replace the index k of the second 2-D sub-set by k,j. The metric in E₀,j.sup.(4) is:

    M.sub.5,0,j.sup.(4) =min[M.sub.5,0.sup.(2) +M.sub.7,0,j.sup.(2), M.sub.5,3.sup.(2) +M.sub.7,3,j.sup.(2) ].

Finally, the metrics are computed in the 16 8-D sub-sets. The sub-set S_(i),j for even i is the union of the 4 8-D sub-sets, each being the concatenation of 2 4-D sub-sets:

S_(i),j =U E_(l).sup.(4) E_(l'j).sup.(4) with i₂ =0,1 and i₃ =0,1

and:

    i=8Y.sub.3 +4Y.sub.2 +2Y.sub.1 ;

    l=4i.sub.2 +2i.sub.3 +i.sub.4 ;

    l'=4i.sub.6 +2i.sub.7 +i.sub.8 ;

    i.sub.4 =i.sub.2 ⊕i.sub.3 ⊕Y.sub.1

    i.sub.6 =i.sub.2 ⊕Y.sub.2

    i.sub.7 =i.sub.3 ⊕Y.sub.3

    i.sub.8 =i.sub.2 ⊕i.sub.3 ⊕i.sub.4 ⊕i.sub.6 ⊕i.sub.7.

The computation of the metric of r₁ . . . r₈ in S_(i),j makes it necessary to compute metrics in the 4 8-D sub-sets E_(l).sup.(4) E_(l'j).sup.(4) (Sum of the metric of (r₁ r₂ r₃ r₄) in E_(l).sup.(4) and that of (r₅ r₆ r₇ r₈) in E_(l'j).sup.(4)). The minimum of the 4 metrics gives the 8-D metric in S_(i),j, M_(i),j.sup.(8).

For each 8-D block, the metrics in each sub-set S_(i),j are detected and computed, which metrics will be fed to the Viterbi decoder. These metrics are also the metrics of the trellis branches during the transitions 1, 2, . . . ,N+1.

Still in the first stage, the second decoding step is carried out. The sub-set 222 carries out a conventional Viterbi decoding of the received symbol sequences. In this manner is obtained the decoded optimum sequence (hard decision) of the row:

I.sup.(ν) =I₁.sup.(ν), . . . I_(7N+4).sup.(ν),I_(7N+5).sup.(ν), . . . I_(8N+8).sup.(ν) and the decoded LSB bit sequence:

i.sup.(ν) =i₁.sup.(ν), . . . i_(8N+8).sup.(ν) and the sequence of the corresponding 8-D sub-sets.

The sequence of the states which correspond to the decoded states is:

σ.sup.(i) =σ₀.sup.(i), . . . σ_(N+1).sup.(i) which corresponds to N+1 transitions or branches, with σ₀.sup.(i) =σ_(N+1).sup.(i) =0 which are the initial and final zero states. The vector of the state metric M_(j).sup.(i) (σ) is stored for each state σ=0, . . . 7 and for each instant j=1, . . . N+1. Finally, the surviving paths in a Table are stored. All these results produced by the Viterbi decoder 222 are used for computing the reliability.

During the third step, the reliability of each symbol I_(k).sup.(ν) or of each bit i_(k).sup.(ν) of the decoded sequence I.sup.(ν) with k=1, . . . 8N+8 is computed in the sub-set 224. The reliability features the quality of the decoded symbols (probability of exactness). This reliability may be written as:

    F.sup.(i) =F.sub.1.sup.(i), . . . F.sub.8N+8.sup.(i).

The reliability of a symbol of the k^(th) order is written as: ##EQU10##

where D.sup.(ν-1) is the sequence of input symbols and where C(I_(k).sup.(ν)) is the set of codewords corresponding to a 4-AM symbol near to I_(k).sup.(ν). The reliability F_(k).sup.(ν) may be written as: ##EQU11##

By taking the main term of the sum, one may write: ##EQU12##

This minimum gives maximum correspondence with the error path producing a decoded 4-AM symbol which is near to the symbol I_(k).sup.(ν). This definition of the reliability is also that of the bits i_(k).sup.(ν). In fact, a symbol near to I_(k).sup.(ν) corresponds to a bit i which is the complement of i_(k).sup.(ν).

The computation of the reliability takes place according to the following algorithm.

The sequence I_(k).sup.(ν) decoded by the Viterbi decoder corresponds to a path in the trellis having a length of N+1. The computation algorithm for computing the reliability F_(k).sup.(ν) of the decision I_(k).sup.(ν) for k=1, . . . 8N+8 is the following:

The reliability of the decision I_(k).sup.(ν) for k=1, - - - 8N+8, or of the bit i_(k).sup.(ν) for k=1, - - - 8N+8 is carried out in 2 steps. The first step consists of computing the reliability compared with the error paths that correspond to the parallel transitions, and the second step consists of computing the reliability compared with error paths of the trellis. The final reliability is the lower of the two.

First the reliability FP due to the parallel branches is computed. The processing is carried out block by block on the symbol sequence D_(k).sup.(ν-l) and I_(k).sup.(ν). Each processing makes it possible to compute the reliabilities due to parallel branches of the 8 symbols (D_(7l+1).sup.(ν-l), - - - - ,D_(7l+7).sup.(ν-l), D_(7N+5+l).sup.(ν-l)) which corresponds to the 1^(st) transition (I=0, . . . . ,N-1) and the 8 symbols (D_(7N+1).sup.(ν-l), - - - - ,D_(7N+4).sup.(ν-l), D_(8N+5).sup.(ν-l), . . . ,D_(8N+8).sup.(ν-l)), which corresponds to the (N+1)^(th) transition (the one that closes the trellis). as the parallel branches of the trellis are allocated to 8-D sub-sets S_(i),j, this reliability is also the reliability of the decision I_(k).sup.(ν) in the 8-D sub-set containing the decoded block which corresponds to I_(k).sup.(ν) (the sequence of the decoded 8-D sub-sets is produced by the Viterbi decoder).

S_(i) (r₁, . . . r₈) is the block (D₁.sup.(ν-l), . . . ,D₇.sup.(ν-l), D_(7N+5).sup.(ν-l)), for example, and S_(i),j the decoded 8-D sub-set corresponding to the detected 4-AM symbols (d₁, . . . d₈)=(I₁.sup.(ν), . . . ,I₇.sup.(ν),I_(7N+5).sup.(ν)), it may be shown that the computation of the reliabilities r_(k) (for k=1, . . . 8) in S_(i),j boils down to computing the reliabilities of (r₁, r₂, r₃, (1-2Y₁)r₄, r₅, (1-2Y₂)r₆, (1-2Y₃)r₇, (1-2(Y₁ ⊕Y₂ ⊕Y₃))r₈) in the sub-set S_(o),j' with j'=j⊕Y₁ ⊕Y₂ ⊕Y₃, and i=8Y₃ +4Y₂ +2Y₁. Thus, in all the cases this boils down to computing the reliabilities in S₀,0 or S₀,1, which makes the algorithm simpler.

FIG. 14 gives a representation in a trellis of the sub-sets S₀,1 and S₀,1 where each path in the trellis corresponds to a sub-set having the form B_(i1) B_(i2) . . . B_(i7) C_(2j8+i8).

The algorithm for S₀,0 will be described, that is, S_(i),j =S₀,0, for computing the reliabilities of the decision d_(k) for k=1, . . . 8:

First the computation of the 2-D metrics takes place:

    M.sub.ij (1)=M.sub.1,i +M.sub.2,j i=0,1; j=0,1

    M.sub.ij (2)=M.sub.3,i +M.sub.4,j i=0,1; j=0,1

    M.sub.ij (3)=M.sub.5,i +M.sub.6,j i=0,1; j=0,1

    M.sub.ij (4)=M.sub.7,i +M.sub.8,j i=0,1; j=0,1

where

M_(k),i is the metric of r_(k) in B_(i) for k=1, . . . 7; and

M₈,i is the metric of r₈ in C_(i).

In the case where the computation of the reliabilities is performed for S₀,1, M₈,i is computed in C₂ and C₃ (i=2, 3).

Thus the nearest path from (r₁, . . . r₈) is sought in S₀,0 :

The upper part and the lower part of the trellis of S₀,0 are considered separately. In the upper trellis is computed M(0,k)=min (M₀,0 (k), M₁,1 (k)) for k=1, 2, 3

    M(0,4)=min (M.sub.0,0 (4), M.sub.1,1 (4)).

The bits (i₁, . . . i₈) giving the minimum value are stored, with i₁ =i₂, i₃ =i₄, i₅ =i₆, i₇ =i₈, in the Table [i(0,1), . . . i(0,8)] and: ##EQU13## is computed.

In the lower trellis, M(1,k)=min (M₀,1 (k), M₁,0 (k)) is computed for k=1,2, 3,

    M (1,4)=min (M.sub.0,1 (4), M.sub.1,0 (4)). ##EQU14##

The bits i₁ . . . i₈ corresponding to the minimum in [i(1,1), - - - i(1,8)] with i₁ =i₂,i₃ =i₄,i₅ =i₆,i₇ =i₈ are stored.

There is verified whether the sequences [i(0,1), . . . i(0,8)] and [i(1,1), . . . i(1,8)] are two valid sequences. The parity bits p(0) and p(1) are computed for the sequences [i(0,1), i(0,3), i(0,5), i(0,7)] and [i(1,1), i(1,3), i(1,5), i(1,7)], respectively. For k=0, 1, if p(k)=0, the corresponding sequence belongs to the trellis (or S₀,0), if not the sequence will be modified.

Differences of 2-D metrics are computed:

    δ(0,k)=|M.sub.0,0 (k)-M.sub.1,1 (k)|, k=1, 2, 3

    δ(0,k)=|M.sub.0,0 (k)-M.sub.1,1 (k)|, k=4

    δ(1,k)=|M.sub.0,1 (k)-M.sub.1,0 (k)|, k=1, 2, 3

    δ(1,k)=|M.sub.0,1 (k)-M.sub.1,0 (k)|, k=4

Then the minimum of 4 metrics is computed for each of the two upper and lower trellises (q=0, 1, respectively): ##EQU15##

The index k giving the minimum in k_(min) (q) is stored and the second minimum Δ₂ (q) is computed.

If the parity bit p(q)=1, the bits (i(q, 2 k_(min) (q)-1), i(q, 2k_(min) (q)) are complemented and the metric MET (q) of Δ(q) is incremented. This operation is carried out for q=0 (upper trellis) and q=1 (lower trellis).

Then Δ_(min) =|MET(0)-MET(1)| is computed and the index c (0 or 1) is stored giving the lower value of MET(0) and MET(1).

The reliabilities FP(1), . . . ,FP(8) of (d₁, . . . d₈) are initialized in S₀,0 :

    FP(2k-1)=FP(2k)=δ(c,k)+(1-2p(c)) Δ(c) pour K≠K.sub.min (c)

    FP(2k-1)=FP(2k)=Δ.sub.2 (c)+(1-2p(c)) Δ(c) pour k=k.sub.min (c)

where FP(k) is the reliability of d_(k) in S₀,0.

Thereafter, the reliabilities FP(k), k=1, . . . 8 are updated:

For k=1, . . . 8 with i(c,k)≠i (1-c, k):

FP(k)=min [FP(k), Δ_(min) ]

For k=1, 2, 3, 4:

FP(2k-1)=min [FP(2k-1), A_(k) ]

if i(0, 2k-1)=i(1, 2k-1)

FP(2k-1)=min [FP(2k), A_(k) ] if i (0,2k)=i(1,2k)

with

    A.sub.k =Δ.sub.min +δ(1-c, k)+[1-2p(1-c)]Δ (1-c) if k≠k.sub.min (1-c)

    A.sub.k =Δ.sub.min +Δ.sub.2 (1-c)+[1-2p(1-c)]Δ (1-c) if k=k.sub.min (1-c).

The reliability caused by the error paths of the trellis (FIG. 15) is determined. Consider the decoding of a row (step 300).

One starts from:

I_(k).sup.(ν) which is the sequence of 4-AM symbols decoded by the Viterbi decoder for k=1, . . . 8N+8;

M_(k).sup.(ν) (σ)=which is the metric of the state σ at the instant k (k^(th) transition) for k=1, . . . N+1.

D_(k).sup.(ν-1) which are the input symbols (produced by the preceding iteration decoder) for k=1, . . . 8N+8,

and the array of the reliabilities F.sup.(ν) =(F_(k).sup.(ν), k=1, . . . 8N+8) to FP.sup.(ν) =(FP_(k).sup.(ν), k=1, . . . 8N+8) or FP_(k).sup.(ν) is the reliability of I_(k).sup.(ν) caused by the parallel transitions (step 301 in FIG. 15).

For k=N+1, . . . 2, where k corresponds to one instant (index of the transition), the following operations are carried out:

a) based on the state of the coder after the k^(th) transition in the decoded path σ_(k).sup.(ν), the state σ_(k-1).sup.(ν) is determined after the (k-1)^(th) transition of the decoded path and the 7 other precursor states of σ_(k).sup.(ν), that is, σ_(j),k-1.sup.(ν), j=1 . . . 7 (step 304). Therefore, the values of σ_(k).sup.(ν) for k varying from 1 to N+1 are produced by the Viterbi decoder, whereas the values of σ_(j),k-1.sup.(ν) may be stored in a memory.

Based on metrics of the states σ₁,k-1.sup.(ν), σ₂,k-1.sup.(ν), . . . σ₇,k-1.sup.(ν) and σ_(k).sup.(ν) computed and stored in the Viterbi decoder, for k=2, . . . N+1, and which are denoted ##EQU16##

the 7 cumulated metrics of the state σ_(k).sup.(ν) are computed for the 7 paths coming from the 7 states σ_(j),k-1.sup.(ν), j=1, . . . 7. These 7 cumulated metrics are:

δ(j)=M_(k-1).sup.(ν) (σ_(j),k-1.sup.(ν))+MET(σ_(j),k-1.sup.(ν) →σ_(k).sup.(ν)), where MET(σ_(j),k-1.sup.(ν) →σ_(k).sup.(ν)) is the metric of the transition from the state σ_(j),k-1.sup.(ν) to the state σ_(k).sup.(ν) which is also the metric of the 8-D sub-set allocated to this transition. These metrics are stored in a memory during the Viterbi decoding (step 306).

The difference between the optimum metric and each of the cumulated metrics is computed:

    Δ(j)=δ(j)-M.sub.k.sup.(ν) (σ.sub.k.sup.(ν)), j=1, . . . 7

where M_(k).sup.(ν) (σ_(k).sup.(ν)) is the optimum metric of the state σ_(k).sup.(ν).

Thereafter, the 7 surviving precursors to the state σ_(k).sup.(ν) are examined. A step back is made to the survivor of the j^(th) order, from σ_(k).sup.(ν) to σ_(j),k-1.sup.(ν). Then each survivor of the j^(th) order of the state σ_(j),k-1.sup.(ν) is examined until the initial state σ=0, which consists of making the index of the transition vary from k to 1.

To reduce the complexity, the 7 survivors of the state σ_(j),k-1.sup.(ν) may be examined up to the state of the survivor at the instant k-L instead of the instant 1, thus a fixed number of transitions. For L=3, the degradation of the performance is negligible.

The 8 4-AM symbols allocated the k'^(th) transition of the survivor of the j^(th) order are compared with the 8 decoded symbols for k' which varies from k to 1, or from k to (k-L) in the second case. If the decoded symbol and the symbol of the k'^(th) transition of the survivor j of the same rank are adjacent, the reliability of the decoded symbol is replaced by Δ(j) if the latter is lower than this reliability (step 312).

The Table of the symbols I_(k).sup.(ν) which are adjacent I_(k).sup.(ν), which corresponds to the minimum, for k varying from 1 to 8N+8, and, with each updating of the reliability of one symbol, its adjacent symbol is updated by replacing it by the corresponding 4-AM symbol which relates to the transition of the k'^(th) order of the survivor j.

In the end, the reliabilities F_(k).sup.(ν) of the decoded symbol I_(k).sup.(ν) and of the adjacent corresponding symbol I_(k).sup.(ν) for k=1, . . . 8N+8 (step 326) are obtained.

The reliability is thereafter normalized during the fourth step to allow of the computation of the soft decision D_(k).sup.(ν) for k=1, . . . 8N+8. Three methods can be used for computing the normalized reliability F_(k) ^(norm)(v). One may compute: either

    F.sub.k.sup.norm(v) =F.sub.k.sup.(ν) |F

or

    F.sub.k.sup.norm(v) =F.sub.k.sup.(ν) +(1-F)

or

    F.sub.k.sup.norm(v) =(F.sub.k.sup.(ν) /β.sub.1)+β.sub.2

where F is equal to the average of F_(k).sup.(ν) computed of the whole reliability matrix, β₁ and β₂ being constants verifying F=β₁ (1-β₂).

Subsequently, during the fifth step, soft- non-weighted decision are computed (sub-set 226, FIG. 13).

The soft decision D_(k).sup.(ν) is computed on the basis of the optimum decision I_(k).sup.(ν) given by the Viterbi decoder, of its normalized reliability F_(k) ^(norm)(v) and of the sequence of the 4-AM symbols I_(k).sup.(ν) obtained previously. The 4-AM symbol I_(k).sup.(ν) is an adjacent symbol to the symbol I_(k).sup.(ν), that is |I_(k).sup.(ν) -I_(k).sup.(ν) |=2. it corresponds to the 4-AM symbol which is most likely to occur after the symbol I_(k).sup.(ν). The symbol D_(k).sup.(ν) is given by:

    D.sub.k.sup.(ν) =1/2(I.sub.k.sup.(ν) +I.sub.k.sup.(ν))+sgn(I.sub.k.sup.(ν) -I.sub.k.sup.(ν))F.sub.k.sup.norm(v)

where the function sgn is defined by: ##EQU17##

Thus, the symbol D_(k).sup.(ν) corresponds to a symbol situated at the distance F_(k) ^(norm)(v) from the decision threshold between I_(k).sup.(ν) and I_(k).sup.(ν). As E(F_(k) ^(norm)(v))=1, the symbols D_(k).sup.(ν) will be centered around 4-AM symbols.

To improve performance, during a sixth step D_(k).sup.(ν) is weighted with the symbols D_(k).sup.(0) received through the channel which are stored in the memory 20 for computing D_(k).sup.(ν) :

D_(k).sup.(ν) =α_(v) D_(k).sup.(ν) +(1-α_(v))D_(k).sup.(0) where α_(v) is a weight factor. For example: α₁ =0,6; α₂ =0,9; α_(v) =1 for v greater than 1. The object is to reduce the effect of error propagation during the first iterations. The steps 5 and 6 are carried out together in the sub-set 226.

Secondly, consider the operation of the second stage (path 2) for the decoding of the bits j. The bits j, thus MSB bits of the 4-AM symbols are coded with the parity code applied to each row and each column of the matrix of the product code. This is realized when the trellis is closed. The decoding is an iterative decoding as for the bits i.

FIG. 16 represents the general circuit diagram of a stage comprising decoding means 22₁ for decoding the parity code of the MSB bits of the transmitted 4-AM symbols. They comprise:

a decoder 322 for decoding the parity code which gives hard decisions;

a sub-set 324 for computing the reliability of the decisions;

a sub-set 326 for computing soft decisions.

For the first iteration (m=1), the symbols x_(k).sup.(0) are the received symbols on the output of the channel, that is:

(D₁.sup.(0), . . . D_(7N+4).sup.(0),D_(8N+5), . . . D_(8N+7).sup.(0)).

FIG. 17 gives a representation in a trellis of the 7N+7 bits (j₁, . . . j_(7N+4),j_(8N+5),j_(8N+6),j_(8N+7)) coded with the parity code. In this trellis, any path from point I to point F corresponds to a codeword having length 7N+7. The decoding of a block of 7N+7 symbols x_(k).sup.(m-1) for the m^(th) rank iteration is allocated in 3 steps.

During the first step (step 322), a hard decision decoding is made of x_(k).sup.(m-1). A threshold decision is applied symbol by symbol to these symbols in the sub-set B_(i).sbsb.k, where i_(k) for k=1, . . . 7N+4, 8N+5, 8N+6, 8N+7 is the sequence of the LSB bits of the 4-AM symbols estimated by the iterative decoding of the first stage after the convergence. This threshold decision produces a first bit estimate j_(k).sup.(m) with j_(k).sup.(m) =0 (1, respectively) if the decision in B_(i).sbsb.k is positive (negative, respectively).

Subsequently, for each symbol x_(k).sup.(m-1) is computed the absolute value of the distance d(x_(k).sup.(m-1),t_(k).sup.(m-1)) separating this symbol from the decision threshold t_(k).sup.(m-1) in the sub-set B_(i).sbsb.k, where the threshold in B₀ ={3,-1} (B₁ ={1,-3}, respectively) is equal to +1 (-1, respectively) and the minimum Δ for k of the distance d(x_(k).sup.(m-1),t_(k).sup.(m-1)) is computed and so is the second minimum Δ₂.

Finally, the parity bit p of the bits j_(k).sup.(m) is computed. If the parity is satisfactory (p=0), the sequence of the bits j_(k).sup.(m) is the optimum sequence. If not, the bit j_(k).sbsb.min.sup.(m) is complemented where k_(min) is the index providing the minimum Δ of d(x_(k).sup.(m-1),t_(k).sup.(m-1)).

During the second step, the computation of the reliabilities (step 324) is made. The reliability of the decision j_(k).sup.(m) is given by:

    FJ.sub.k.sup.(m) =(1-2p)Δ+d(x.sub.k.sup.(m-1),t.sub.k.sup.(m-1)) k≠k.sub.min

    FJ.sub.k.sup.(m) =(1-2p)Δ+Δ2, k=k.sub.min

Subsequently, the reliability is normalized according to:

    FJ.sub.k.sup.norm(m) =FJ.sub.k.sup.(m) |FJ

where FJ is the average of the reliabilities FJ_(k).sup.(m).

During the third step, the computation of the soft decision x_(k).sup.(m) is made (step 326). This decision is obtained as a function of t_(k).sup.(m),j_(k).sup.(m), FJ_(k) ^(norm)(m) via:

x_(k).sup.(m) =t_(k).sup.(m) +2 sgn(1-2j_(k).sup.(m))×FJ_(k) ^(norm)(m) where sgn(.) is the sign function.

The invention has just been described in the case of a systematic convolutional code of rate 7/8. A person of ordinary skill in the art may apply the same coding and decoding principles to other systematic convolutional codes of rate P/(Q.M) combined with other multidimensional amplitude modulations having dimension Q and having 2^(M) states. 

We claim:
 1. A method of protecting input data implemented in a digital transmission system, the method comprising a coding phase for said data and an iterative decoding phase, the coding phase comprising a first step for performing a systematic convolutional trellis coding permitting of the iterative decoding combined with a second step for assigning the coded data to digitally modulated symbols, characterized in that during the first step the systematic trellis coding has a coding rate P/(Q.M), where M, P and Q are integers with Q and M being greater than 1, the systematic convolutional code being used for generating a product code in blocks with trellis closure by the addition of redundant data, the product code being formed by components generated by row coding and column coding of a matrix that combines the coded data via the systematic convolutional code, whereas the second step combines the product code with a multidimensional amplitude modulation having dimension Q that has 2^(M) states, the iterative decoding being a block decoding.
 2. The method as claimed in claim 1, characterized in that the rate is equal to 7/8, the modulation being an 8-D modulation having 8 dimensions.
 3. A digital transmission system with input data protection, comprising coding means of said data and iterative decoding means, the coding means comprising:a first sub-set for performing a systematic convolutional trellis coding permitting of the iterative decoding and a second sub-set for assigning the coded data to digitally modulated symbols,characterized in that the first sub-set utilizes a systematic convolutional trellis coding having a coding rate P/(Q.M), where M, P and Q are integers with Q and M being greater than 1, the systematic convolutional code being used for generating a product code in blocks with trellis closure by the addition of redundant data which comprise at least one parity code bit, the product code being formed by components generated by row coding and column coding of a matrix that combines the coded data via the systematic convolutional code, whereas the second sub-set combines the product code with a multidimensional amplitude modulation having dimension Q that has 2^(M) states, the iterative decoding being a block decoding.
 4. The system as claimed in claim 3, characterized in that the coding means comprise a means called state machine for defining successive states of the coder and producing the trellis closing redundancy symbols.
 5. The system as claimed in claim 3, characterized in that the rate is equal to 7/8, the modulation being an 8-D modulation having 8 dimensions, the systematic convolutional coding means coding seven input symbols into eight output symbols by adding one redundancy bit.
 6. The system as claimed in claim 5, characterized in that the systematic convolutional coding means comprise two shift-cell stages, the output symbols being obtained by linearly combining the data coming from the shift cells.
 7. A system as claimed in claim 3, characterized in that the iterative decoding means comprise at least two paths operating in succession:along a first path, the system carries out with each iteration of the path a first iterative decoding with:a) computing means for computing hard decision which relate to the systematic convolutional code, b) computing means for computing first reliabilities of the hard decisions associated with each multidimensional modulation sub-set, and second reliabilities associated to the trellis of the systematic convolutional code, c) selecting means for selecting minimum reliabilities between the first and second reliabilities of each decision, and d) computing means for computing soft decision used for the next iteration of the first path as a function of selected minimum reliabilities and hard decisions; and along a second path, the system utilizes for each iteration of the path:a) computing means for computing hard decisions which relate to the parity code, b) computing means for computing third reliabilities for each hard decision of the second path as a function of hard decision of the first path, and c) computing means for computing soft decisions as a function of the third reliabilities, soft decisions coming from the preceding iteration of the second path and hard decisions from the firth path. 