You are on page 1of 4

Chalmers Publication Library

Copyright Notice

©2010 IEEE. Personal use of this material is permitted. However, permission to


reprint/republish this material for advertising or promotional purposes or for creating new
collective works for resale or redistribution to servers or lists, or to reuse any copyrighted
component of this work in other works must be obtained from the IEEE.

This document was downloaded from Chalmers Publication Library (http://publications.lib.chalmers.se/),


where it is available in accordance with the IEEE PSPB Operations Manual, amended 19 Nov. 2010, Sec.
8.1.9 (http://www.ieee.org/documents/opsmanual.pdf)

(Article begins on next page)


IEEE COMMUNICATIONS LETTERS, VOL. XX, NO. YY, ZZZ 2010 1

On BICM-ID with Multiple Interleavers


Alex Alvarado Student Member, IEEE, Leszek Szczecinski, Senior Member, IEEE, Erik Agrell, and Arne
Svensson, Fellow, IEEE

c̃1 c1 z P K L1
Abstract—In this letter, we study the performance of BICM-ID i1 π1 u1 U ext î1
1 π1−1

DEMUX
.. .. .. x y ..
... .. .. ..

ENC

MUX

DEC
with multiple interleavers (BICM-ID-M) in terms of bit-error . . . Φ Φ −1 . . . .
ikc
c̃n cn um U ext
m Ln îkc
rate (BER), and show that BICM-ID-M is well-suited to exploit πn πn−1
the unequal error protection (UEP) caused by the binary labeling.
Lpri Lext
We show that BICM-ID-M should always be the preferred c̃1 L1 1 π1 1

... ... .. ..

MUX
alternative for BICM-ID and that the gains obtained appear fLq (λ) . .
c̃n Ln Lpri
m Lext
even for the simplest configuration (0.5–0.75 dB for a BER of πn n

BICM-ID Channel
10−7 ). It is found that conventional design paradigms such as
maximizing the free distance of the code should be modified. Fig. 1. BICM-ID model. The equivalent BICM channel is also shown.

Index Terms—BICM, BICM-ID, M-interleavers, UEP.


TABLE I
T HE THREE MOST RELEVANT CONFIGURATIONS DEFINED BY K.
I. I NTRODUCTION
MUX Configuration obtained Analyzed in
K = m−1 1m
B IT-INTERLEAVED coded modulation (BICM) was
introduced in [1], analyzed in [2], [3], and is nowadays
the preferred alternative for CM over the Gaussian and
K = Im
K = Π(Im )
S-interleavers
Original M-interleavers
Optimized M-interleavers
[2]
[1], [4]
[8]
fading channels [3, Sec. 1]. Its flexibility makes it very
attractive and it has made its way into a large number of
communication standards [3, Sec. 1]. By recognizing BICM as II. S YSTEM M ODEL AND P RELIMINARIES
a serial concatenation of codes, BICM with iterative decoding
(BICM-ID) was introduced in [4]–[6]. BICM-ID exhibits a A. System Model
waterfall and an error floor region, and it has been well studied The BICM-ID system model is presented in Fig. 1, which
in the literature, cf. [7] and references therein. In BICM-ID, can be considered a generalization of [8, Sec. II-A]. The
the binary labeling plays a key role and its optimization usually vectors of information bits is with s = 1, . . . , kc are
targets a decrease of the BER in the error floor region. encoded by a rate Rc = kc /n convolutional encoder. The
The original papers introducing BICM [1] and BICM-ID vectors of coded bits c̃i with i = 1, . . . , n are fed to the
[4] postulated the application of multiple interleavers interleavers π1 , . . . , πn which give statistically independent
(M-interleavers) connecting each of the encoder’s output to randomly permuted sequences ci = πi (c̃i ). The multiplexing
one modulator’s input. However, most of the existing literature unit (MUX) assigns the bits ci to the different bit positions
on BICM and BICM-ID follows the framework set in [2] in the symbol. We define the MUX using an n × m matrix
and assumes the use of one single interleaver (S-interleavers). K, whose elements, 0 ≤ kiq ≤ 1, represent the probability
BICM with M-interleavers were analyzed in [8] and shown to that a bit from ci is assigned to the qth output uq with
offer gains when the modulation introduces UEP. q = 1, . . . , m. For simplicity, and since we are interested in the
In this letter, we study the error floor of BICM-ID-M. We original BICM(-ID) configuration(s), from now on, we only
prove that BICM-ID-M asymptotically always outperforms consider n = m and kiq ∈ {0, 1}. The three most relevant
BICM-ID with S-interleavers (BICM-ID-S) and that the gains configurations in this case are shown in Table I, where 1m
obtained by using BICM-ID-M instead of BICM-ID-S appear and Im are the all-ones and the identity matrices, respectively,
even for the simplest configuration. We show that conventional and where Π(·) is a row permutation (see more details in [8]).
design paradigms for the encoder, e.g., the use of optimum At any time instant t, the codeword b = [u1,t , . . . , um,t ]
distance spectrum (ODS) codes [9], should be modified. is mapped to a complex constellation symbol x ∈ X using
a memoryless mapping Φ : {0, 1}m → X , where X ⊂ C,
Manuscript received March 26, 2010. The associate editor coordinating the
review of this letter and approving it for publication was Vladimir Stankovic.
and |X | = 2m . We analyze phase √ shift keying (M -PSK)
modulation, i.e., xj = exp − 2πjM −1 with j = 1, . . . , M ;

A. Alvarado, E. Agrell, and A. Svensson are with the Department of
Signals and Systems, Communication Systems Group, Chalmers University of extension to other modulations is straightforward. The symbols
Technology, Gothenburg, Sweden, e-mail: {alexa,agrell,arnes}@chalmers.se.
L. Szczecinski is with the Institut National de la Recherche Scientifique, are transmitted through an AWGN channel y = x+z, where z
INRS-EMT, 800, Gauchetiere W. Suite 6900 Montreal, H5A 1K6, Canada, is a circularly-symmetric complex Gaussian random variable
e-mail: leszek@emt.inrs.ca. When this work was submitted for publication, with zero-mean and variance N0 /2 in real/imaginary parts.
L. Szczecinski was on sabbatical leave with CNRS, Laboratory of Signals
and Systems, Gif-sur-Yvette, France. The bit energy-to-noise ratio is N Eb
0
= N01kc . The demapper
This work was partially supported by the European Commission under computes extrinsic L-values as Uqext (y) = Uqpos (y) − Lpri q ,
projects NEWCOM++ (216715) and FP7/2007-2013 (236068), by the Pr{b =0|y} Pr{bq =0}
Swedish Research Council, Sweden (2006-5599), and by the FQRNT (Merit where Uqpos (y) , log Pr{bqq =1|y} and Lpri q , log Pr{bq =1} are
Scholarship Program for Foreign Students), Canada. the a posteriori and a priori L-values for bq , respectively.
2 IEEE COMMUNICATIONS LETTERS, VOL. XX, NO. YY, ZZZ 2010

Let D , {d1 , . . . , dD } be the set of squared Euclidean outputs, and where β C (w) can be calculated as described in
distances between the constellation points, where D = M 2 [8, Sec. III-A]. The (truncated) union bound (UB) is given by
for M -PSK. For example, for 8-PSK D = 4, d1 = 0.58, X
d2 = 2, d3 = 3.41, and d4 = 4. The generalized Euclidean BER ≤ UB = β C (w)PEP(w), (2)
w∈W
distance spectrum (GEDS) of a constellation (see also [7,
Ch. 4]) is defined by the m × D matrix P whose entries pql where W , {w ∈ (N0 ) : ω free ≤ m
m
P
q=1 wq ≤ ω̂}, N0 is
are the number of pairs (normalized by M/2) of constellation the set of nonnegative integers, wfree is the free distance of
points at distance dl such that their binary labelings differ the code, ŵ is the truncation of the UB, and PEP(w) is the
in all the bit position except in the qth one. We also define probability of detecting a sequence with generalized weight w
the generalized minimum Euclidean distance (GMED) of the instead of the transmitted all-zero sequence.
constellation by dmin
q with q = 1, . . . , m, which corresponds to For a given w, the decision variable passed to the decoder is
Pwq (i)
the squared Euclidean distance associated to the first nonzero S(w) = S(w1 )+. . .+S(wm ) where S(wq ) = i=1 Lq , and
element in the qth row of P. For example, for 4-PSK (D = 2, (i)
where Lq are i.i.d. random variables with a pdf given by (1).
d1 = 2, d2 = 4) only two labelings with different GEDS Let w
wq !
r q , rq1 !...rqD ! be the multinomial coefficients which
q

exist: the Gray code (GC) and the anti-Gray code (AGC) [7, represents the number of different ways of ordering wq bits in
App. A]. The GEDS of the AGC is given by p1,1 = p2,2 = 1, subsets of rq1 , . . . , rqD elements, where rq , [rq1 , . . . , rqD ].
p1,2 = p2,1 = 0, dmin
1 = 2 and dmin
2 = 4, and for the GC by Theorem 1: The pdf of S(w) can be expressed as
p1,1 = p2,1 = 1, p1,2 = p2,2 = 0, dmin 1 = dmin
2 = 2.
m   D
X Y wq Y
fS(w) (λ) = (gql )rql Φ (λ; ∆(R), 2∆(R)) ,
B. Perfect Feedback and the BICM-ID Channel q=1
r q
R∈R(w) l=1
We use the so-called perfect feedback (PF) assumption to −1 Pm PD
analyze the error-floor region. This assumption states that where R , [rT T T
1 , . . . , r m ] , ∆(R) , N0 q=1 l=1 dl rql ,
m×D PD
after a certain number of iterations, and for a sufficiently R(w) , {R ∈ N0 : l=1 rql = wq , q = 1, . . . , m}, and
high signal-to-noise ratio (SNR), it can be assumed that we interpret 00 as 1.
the a-priori L-values are large enough so that the demapper Proof: Because of the interleaving, the L-values are
knows all the bits except the one for which it is calculating independent, and thus, the pdf of S(wq ) is the convolution
the extrinsic L-value. This transforms the detection of the of wq copies of the Gaussian mixture in (1), i.e.,
high-order modulation into the detection of binary symbols, X wq Y D
and thus, the extrinsic L-values calculated by the demapper fS(wq ) (λ) = (gql )rql Φ (λ; δq , 2δq ) ,
Φ−1 can be shown to be Gaussian-distributed [7, Ch. 4]. rq
r q ∈V(wq ) l=1
For a given transmitted symbol x labeled by b = PD
[b1 , . . . , bm ], it can be shown that Uqext (y|x) ∼ N (µ, 2|µ|), where V(wq ) , {rq ∈ (N0 )D : l=1 rql = wq }, where the
where µ = N0−1 (−1)bq d and where d ∈ D. Therefore, there lth element in r q represents the number of bits transmitted
using the lth Gaussian distribution and δq = N0−1 D
P
exist D Gaussian distributions that can be used to model l=1 dl rql .
the extrinsic L-values, where d depends on the transmitted The pdf of S(w) is obtained by convolving the densities
symbol and the bit position, i.e., d = dl only if pql 6= 0. The fS(wq ) (λ), q = 1, . . . , m, which completes the proof.
probability density function (pdf) of Lq is then given by By computing PEP(w) as the tail integral of the pdf given
by Theorem 1, the following UB expression is obtained.
D
X Corollary 2: The UB in (2) can be expressed as
fLq (λ) = gql Φ(λ; µl , 2µl ), (1) X X p 
l=1 UB = W C (R, G, w)Q ∆(R)/2 . (3)
where Φ(λ; µ, σ 2 ) is a Gaussian function, gql is the (q, l)th w∈W ′ R∈R′ (w)

entry of the m × D matrix G , KP which represents In (3) W ′ , {w ∈ W : β C (w) 6= 0}, R′ (w) , {R ∈ R(w) :
the probability that the qth L-value is Gaussian distributed (gql )rql 6= 0 ∀q, l}, and
with parameters (µl , 2µl ), and where µl = N0−1 dl (assuming
m   D
bq = 0). Expression (1) states that the L-values passed to the C C
Y wq Y
decoder (cf. the output of the BICM-ID channel in Fig. 1) W (R, G, w) = β (w) (gql )rql . (4)
q=1
r q
are modeled using a Gaussian mixture, where the structure l=1

of the matrix K determines the weights gql of the Gaussian The definitions of W and R (w) guarantee W C (R, G, w) 6= 0
′ ′
mixture in (1). Using (1), we replace the BICM-ID channel for any w ∈ W ′ and R ∈ R′ (w). Clearly, the multiplexing K
by a symmetric binary-input soft-output memoryless channel affects only the inner product in (4).
as shown in Fig. 1.
III. M AIN R ESULTS AND C ONCLUSIONS
C. Union Bound A. BICM-ID-M with 4-PSK
Let β C (w) be the generalized weight distribution spectrum In Fig. 2 we show the BER performance of BICM-ID-M and
of a convolutional encoder, where the generalized weight w = BICM-ID-S for one of the simplest configurations one could
[w1 , . . . , wm ] gathers the weights wq of each of the encoder’s think of, i.e., 4-PSK with the AGC and a rate Rc = 1/2 ODS
ALVARADO ET AL.: BICM-ID WITH MULTIPLE INTERLEAVERS 3

0
10
Corollary 4: For high SNR and a given code C, the UB for
K = 0.512 (UB)
−1 K = Π(I2 ) (UB) BICM-ID-M is always smaller than the UB for BICM-ID-S.
10
K = I2 (UB) The proof of Corollary 4 follows directly from the inequality
−2
BICM-ID-S (Sim.) ∆∗M > ∆∗S which holds for any w. Corollary 4 states
10 BICM-ID-M (Sim.)
that, for high SNR, BICM-ID-M should always be preferred
−3
over BICM-ID-S, even if the MUX is not optimized. This
10
conclusion does not hold for (noniterative) BICM, cf. [8].
BER

−4
10
K =5 C. Optimal Convolutional Codes
(23, 35)ODS
−5
10
8
Corollary 2 allows us to express the q asymptotic
 behavior of
Ad d
K =3
the UB for the pair [C, K] as UB ≈ Q 2N0 , where A is
−6
10 (5, 7)ODS the argument of the dominant Q-function in the UB, i.e., the
(133, 171)ODS
8
8

smallest ∆(R) for the pair [C, K]. In the following, we define
−7
10 (115, 177)∗8 the optimum convolutional codes (OCC).
K =7 Definition 1 (OCC for BICM-ID): A convolutional code
−8
10
0 1 2 3 4 5 6 C ∗ is said to be optimal if there exists a K∗ such that, among
Eb /N0 [dB] all the other codes with the same constraint length and MUX
Fig. 2. BER performance of BICM-ID-M and BICM-ID-S. The simulation configurations, the pair [C ∗ , K∗ ] gives the largest Ad .
results are shown with markers and the bound in (3) with lines. Definition 1 considers both the MUX and the code as one
entity, and does not assume C ∗ to belong to the set of codes
free
with maximum free distance, which we denote by ωmax . An
free
convolutional code [9] of constraint lengths K = 3, 5 (the exhaustive search showed that for K = 5, 6 (ωmax = 7, 8)
results for K = 7 will be discussed in Sec. III-C). The bound there exist many codes with ω free = ωmax free
− 1 that perform
in (3) is shown to agree with the simulations results, and gains equally good as the ODS codes, i.e., they give the same Ad .
free
of 0.5–0.75 dB are obtained for a BER of 10−7 if K is properly For K = 7, 9 (ωmax = 10, 12), this happens for codes with
free
selected. We note that the optimum K depends on the code, ω = ωmax − 2, which shows that maximizing ω free is not
free

and that for each K, the two BICM-ID-M configurations give the criterion that defines optimal codes in this scenario.
a lower BER than BICM-ID-S. In the following subsection, The OCCs are defined asymptotically, which does not assure
we will prove that this is asymptotically always the case. their optimality for a finite SNR. Alternatively, we can use (3)
for a given SNR and search for a good pair [C, K]. As an
B. Optimality of BICM-ID-M example, we performed an exhaustive search for the optimal
Eb
The UB given by Corollary 2 is a sum of weighted [C ∗ , K∗ ] at N 0
= 3.5 dB for K = 7 and ω̂ = ω free + 5, cf. (2).
Q-functions. We are interested in the behavior of (3) for high We found the code (115, 177)8 (ω free = 8) and K∗ = Π(I2 )
SNR, and thus, the arguments of the Q-functions become to be optimal. Its performance is presented in Fig. 2. Gains of
relevant. We consider constellations with a GEDS such that 0.5 dB for BER = 10−6 are obtained when compared with
dmin 6= dmin for some q, q ′ , i.e., constellations that introduce the most common configuration, i.e., BICM-ID-S and the ODS
q q′
code with ω free = 10.
UEP (e.g., 4-PSK with the AGC). We define d as the
smallest element in the GMED of the constellation, i.e., d , R EFERENCES
minq∈{1,...,m} {dmin
q }. [1] E. Zehavi, “8-PSK trellis codes for a Rayleigh channel,” IEEE Trans.
Lemma 3: The arguments of the dominant Q-functions in Commun., vol. 40, no. 3, pp. 873–884, May 1992.
the UB (3) for a given w ∈ W ′ are [2] G. Caire, G. Taricco, and E. Biglieri, “Bit-interleaved coded modulation,”
IEEE Trans. Inf. Theory, vol. 44, no. 3, pp. 927–946, May 1998.
m
X m
X [3] A. Guillén i Fàbregas, A. Martinez, and G. Caire, “Bit-interleaved
∆∗M , N0−1 dmin ∗ −1
q wq , ∆S , N0 d wq , coded modulation,” Foundations and Trends in Communications and
q=1 q=1 Information Theory, vol. 5, no. 1–2, pp. 1–153, 2008.
[4] X. Li and J. A. Ritcey, “Bit-interleaved coded modulation with iterative
for BICM-ID-M and BICM-ID-S, respectively. decoding,” IEEE Commun. Lett., vol. 1, no. 6, pp. 169–171, Nov. 1997.
[5] S. ten Brink, J. Speidel, and R.-H. Yan, “Iterative demapping for QPSK
Proof: For BICM-ID-M, GM = P, and therefore, the modulation,” IEE Electronics Letters, vol. 34, no. 15, pp. 1459–1460,
solution of minR∈R′ (w) {∆M (R)} is obtained when R is July 1998.
such that all the wq bits are transmitted using the Gaussian [6] S. Benedetto, G. Montorsi, D. Divsalar, and F. Pollara, “Soft-input
soft-output modules for the construction and distributed iterative decoding
distribution associated to dmin
q , ∀q. With this, we obtain the of code networks,” Eur. Trans. on Telecommun., vol. 9, no. 2, pp. 155–172,
expression for ∆∗M , which holds for any G′M = Π(GM ). Mar.–Apr. 1998.
For BICM-ID-S, GS = m−1 1m P. This matrix has a first [7] F. Schreckenbach, “Iterative decoding of bit-interleaved coded
modulation,” Ph.D. dissertation, Munich University of Technology,
column with a nonzero entry determined by d. Moreover, all Munich, Germany, 2007.
the elements in this column are identical (and nonzero), and [8] A. Alvarado, E. Agrell, L. Szczecinski, and A. Svensson, “Exploiting
therefore, the solution of minR∈R′ (w) {∆S (R)} is obtained UEP in QAM-based BICM: Interleaver and code design,” IEEE Trans.
Commun., vol. 58, no. 2, pp. 500–510, Feb. 2010.
when all the wq bits are transmitted using the Gaussian [9] P. Frenger, P. Orten, and T. Ottosson, “Convolutional codes with optimum
distribution associated to d, ∀q. Using this, we obtain the distance spectrum,” IEEE Trans. Commun., vol. 3, no. 11, pp. 317–319,
expression for ∆∗S , which concludes the proof. Nov. 1999.

You might also like