Professional Documents
Culture Documents
Copyright Notice
c̃1 c1 z P K L1
Abstract—In this letter, we study the performance of BICM-ID i1 π1 u1 U ext î1
1 π1−1
DEMUX
.. .. .. x y ..
... .. .. ..
ENC
MUX
DEC
with multiple interleavers (BICM-ID-M) in terms of bit-error . . . Φ Φ −1 . . . .
ikc
c̃n cn um U ext
m Ln îkc
rate (BER), and show that BICM-ID-M is well-suited to exploit πn πn−1
the unequal error protection (UEP) caused by the binary labeling.
Lpri Lext
We show that BICM-ID-M should always be the preferred c̃1 L1 1 π1 1
... ... .. ..
MUX
alternative for BICM-ID and that the gains obtained appear fLq (λ) . .
c̃n Ln Lpri
m Lext
even for the simplest configuration (0.5–0.75 dB for a BER of πn n
BICM-ID Channel
10−7 ). It is found that conventional design paradigms such as
maximizing the free distance of the code should be modified. Fig. 1. BICM-ID model. The equivalent BICM channel is also shown.
Let D , {d1 , . . . , dD } be the set of squared Euclidean outputs, and where β C (w) can be calculated as described in
distances between the constellation points, where D = M 2 [8, Sec. III-A]. The (truncated) union bound (UB) is given by
for M -PSK. For example, for 8-PSK D = 4, d1 = 0.58, X
d2 = 2, d3 = 3.41, and d4 = 4. The generalized Euclidean BER ≤ UB = β C (w)PEP(w), (2)
w∈W
distance spectrum (GEDS) of a constellation (see also [7,
Ch. 4]) is defined by the m × D matrix P whose entries pql where W , {w ∈ (N0 ) : ω free ≤ m
m
P
q=1 wq ≤ ω̂}, N0 is
are the number of pairs (normalized by M/2) of constellation the set of nonnegative integers, wfree is the free distance of
points at distance dl such that their binary labelings differ the code, ŵ is the truncation of the UB, and PEP(w) is the
in all the bit position except in the qth one. We also define probability of detecting a sequence with generalized weight w
the generalized minimum Euclidean distance (GMED) of the instead of the transmitted all-zero sequence.
constellation by dmin
q with q = 1, . . . , m, which corresponds to For a given w, the decision variable passed to the decoder is
Pwq (i)
the squared Euclidean distance associated to the first nonzero S(w) = S(w1 )+. . .+S(wm ) where S(wq ) = i=1 Lq , and
element in the qth row of P. For example, for 4-PSK (D = 2, (i)
where Lq are i.i.d. random variables with a pdf given by (1).
d1 = 2, d2 = 4) only two labelings with different GEDS Let w
wq !
r q , rq1 !...rqD ! be the multinomial coefficients which
q
exist: the Gray code (GC) and the anti-Gray code (AGC) [7, represents the number of different ways of ordering wq bits in
App. A]. The GEDS of the AGC is given by p1,1 = p2,2 = 1, subsets of rq1 , . . . , rqD elements, where rq , [rq1 , . . . , rqD ].
p1,2 = p2,1 = 0, dmin
1 = 2 and dmin
2 = 4, and for the GC by Theorem 1: The pdf of S(w) can be expressed as
p1,1 = p2,1 = 1, p1,2 = p2,2 = 0, dmin 1 = dmin
2 = 2.
m D
X Y wq Y
fS(w) (λ) = (gql )rql Φ (λ; ∆(R), 2∆(R)) ,
B. Perfect Feedback and the BICM-ID Channel q=1
r q
R∈R(w) l=1
We use the so-called perfect feedback (PF) assumption to −1 Pm PD
analyze the error-floor region. This assumption states that where R , [rT T T
1 , . . . , r m ] , ∆(R) , N0 q=1 l=1 dl rql ,
m×D PD
after a certain number of iterations, and for a sufficiently R(w) , {R ∈ N0 : l=1 rql = wq , q = 1, . . . , m}, and
high signal-to-noise ratio (SNR), it can be assumed that we interpret 00 as 1.
the a-priori L-values are large enough so that the demapper Proof: Because of the interleaving, the L-values are
knows all the bits except the one for which it is calculating independent, and thus, the pdf of S(wq ) is the convolution
the extrinsic L-value. This transforms the detection of the of wq copies of the Gaussian mixture in (1), i.e.,
high-order modulation into the detection of binary symbols, X wq Y D
and thus, the extrinsic L-values calculated by the demapper fS(wq ) (λ) = (gql )rql Φ (λ; δq , 2δq ) ,
Φ−1 can be shown to be Gaussian-distributed [7, Ch. 4]. rq
r q ∈V(wq ) l=1
For a given transmitted symbol x labeled by b = PD
[b1 , . . . , bm ], it can be shown that Uqext (y|x) ∼ N (µ, 2|µ|), where V(wq ) , {rq ∈ (N0 )D : l=1 rql = wq }, where the
where µ = N0−1 (−1)bq d and where d ∈ D. Therefore, there lth element in r q represents the number of bits transmitted
using the lth Gaussian distribution and δq = N0−1 D
P
exist D Gaussian distributions that can be used to model l=1 dl rql .
the extrinsic L-values, where d depends on the transmitted The pdf of S(w) is obtained by convolving the densities
symbol and the bit position, i.e., d = dl only if pql 6= 0. The fS(wq ) (λ), q = 1, . . . , m, which completes the proof.
probability density function (pdf) of Lq is then given by By computing PEP(w) as the tail integral of the pdf given
by Theorem 1, the following UB expression is obtained.
D
X Corollary 2: The UB in (2) can be expressed as
fLq (λ) = gql Φ(λ; µl , 2µl ), (1) X X p
l=1 UB = W C (R, G, w)Q ∆(R)/2 . (3)
where Φ(λ; µ, σ 2 ) is a Gaussian function, gql is the (q, l)th w∈W ′ R∈R′ (w)
entry of the m × D matrix G , KP which represents In (3) W ′ , {w ∈ W : β C (w) 6= 0}, R′ (w) , {R ∈ R(w) :
the probability that the qth L-value is Gaussian distributed (gql )rql 6= 0 ∀q, l}, and
with parameters (µl , 2µl ), and where µl = N0−1 dl (assuming
m D
bq = 0). Expression (1) states that the L-values passed to the C C
Y wq Y
decoder (cf. the output of the BICM-ID channel in Fig. 1) W (R, G, w) = β (w) (gql )rql . (4)
q=1
r q
are modeled using a Gaussian mixture, where the structure l=1
of the matrix K determines the weights gql of the Gaussian The definitions of W and R (w) guarantee W C (R, G, w) 6= 0
′ ′
mixture in (1). Using (1), we replace the BICM-ID channel for any w ∈ W ′ and R ∈ R′ (w). Clearly, the multiplexing K
by a symmetric binary-input soft-output memoryless channel affects only the inner product in (4).
as shown in Fig. 1.
III. M AIN R ESULTS AND C ONCLUSIONS
C. Union Bound A. BICM-ID-M with 4-PSK
Let β C (w) be the generalized weight distribution spectrum In Fig. 2 we show the BER performance of BICM-ID-M and
of a convolutional encoder, where the generalized weight w = BICM-ID-S for one of the simplest configurations one could
[w1 , . . . , wm ] gathers the weights wq of each of the encoder’s think of, i.e., 4-PSK with the AGC and a rate Rc = 1/2 ODS
ALVARADO ET AL.: BICM-ID WITH MULTIPLE INTERLEAVERS 3
0
10
Corollary 4: For high SNR and a given code C, the UB for
K = 0.512 (UB)
−1 K = Π(I2 ) (UB) BICM-ID-M is always smaller than the UB for BICM-ID-S.
10
K = I2 (UB) The proof of Corollary 4 follows directly from the inequality
−2
BICM-ID-S (Sim.) ∆∗M > ∆∗S which holds for any w. Corollary 4 states
10 BICM-ID-M (Sim.)
that, for high SNR, BICM-ID-M should always be preferred
−3
over BICM-ID-S, even if the MUX is not optimized. This
10
conclusion does not hold for (noniterative) BICM, cf. [8].
BER
−4
10
K =5 C. Optimal Convolutional Codes
(23, 35)ODS
−5
10
8
Corollary 2 allows us to express the q asymptotic
behavior of
Ad d
K =3
the UB for the pair [C, K] as UB ≈ Q 2N0 , where A is
−6
10 (5, 7)ODS the argument of the dominant Q-function in the UB, i.e., the
(133, 171)ODS
8
8
smallest ∆(R) for the pair [C, K]. In the following, we define
−7
10 (115, 177)∗8 the optimum convolutional codes (OCC).
K =7 Definition 1 (OCC for BICM-ID): A convolutional code
−8
10
0 1 2 3 4 5 6 C ∗ is said to be optimal if there exists a K∗ such that, among
Eb /N0 [dB] all the other codes with the same constraint length and MUX
Fig. 2. BER performance of BICM-ID-M and BICM-ID-S. The simulation configurations, the pair [C ∗ , K∗ ] gives the largest Ad .
results are shown with markers and the bound in (3) with lines. Definition 1 considers both the MUX and the code as one
entity, and does not assume C ∗ to belong to the set of codes
free
with maximum free distance, which we denote by ωmax . An
free
convolutional code [9] of constraint lengths K = 3, 5 (the exhaustive search showed that for K = 5, 6 (ωmax = 7, 8)
results for K = 7 will be discussed in Sec. III-C). The bound there exist many codes with ω free = ωmax free
− 1 that perform
in (3) is shown to agree with the simulations results, and gains equally good as the ODS codes, i.e., they give the same Ad .
free
of 0.5–0.75 dB are obtained for a BER of 10−7 if K is properly For K = 7, 9 (ωmax = 10, 12), this happens for codes with
free
selected. We note that the optimum K depends on the code, ω = ωmax − 2, which shows that maximizing ω free is not
free
and that for each K, the two BICM-ID-M configurations give the criterion that defines optimal codes in this scenario.
a lower BER than BICM-ID-S. In the following subsection, The OCCs are defined asymptotically, which does not assure
we will prove that this is asymptotically always the case. their optimality for a finite SNR. Alternatively, we can use (3)
for a given SNR and search for a good pair [C, K]. As an
B. Optimality of BICM-ID-M example, we performed an exhaustive search for the optimal
Eb
The UB given by Corollary 2 is a sum of weighted [C ∗ , K∗ ] at N 0
= 3.5 dB for K = 7 and ω̂ = ω free + 5, cf. (2).
Q-functions. We are interested in the behavior of (3) for high We found the code (115, 177)8 (ω free = 8) and K∗ = Π(I2 )
SNR, and thus, the arguments of the Q-functions become to be optimal. Its performance is presented in Fig. 2. Gains of
relevant. We consider constellations with a GEDS such that 0.5 dB for BER = 10−6 are obtained when compared with
dmin 6= dmin for some q, q ′ , i.e., constellations that introduce the most common configuration, i.e., BICM-ID-S and the ODS
q q′
code with ω free = 10.
UEP (e.g., 4-PSK with the AGC). We define d as the
smallest element in the GMED of the constellation, i.e., d , R EFERENCES
minq∈{1,...,m} {dmin
q }. [1] E. Zehavi, “8-PSK trellis codes for a Rayleigh channel,” IEEE Trans.
Lemma 3: The arguments of the dominant Q-functions in Commun., vol. 40, no. 3, pp. 873–884, May 1992.
the UB (3) for a given w ∈ W ′ are [2] G. Caire, G. Taricco, and E. Biglieri, “Bit-interleaved coded modulation,”
IEEE Trans. Inf. Theory, vol. 44, no. 3, pp. 927–946, May 1998.
m
X m
X [3] A. Guillén i Fàbregas, A. Martinez, and G. Caire, “Bit-interleaved
∆∗M , N0−1 dmin ∗ −1
q wq , ∆S , N0 d wq , coded modulation,” Foundations and Trends in Communications and
q=1 q=1 Information Theory, vol. 5, no. 1–2, pp. 1–153, 2008.
[4] X. Li and J. A. Ritcey, “Bit-interleaved coded modulation with iterative
for BICM-ID-M and BICM-ID-S, respectively. decoding,” IEEE Commun. Lett., vol. 1, no. 6, pp. 169–171, Nov. 1997.
[5] S. ten Brink, J. Speidel, and R.-H. Yan, “Iterative demapping for QPSK
Proof: For BICM-ID-M, GM = P, and therefore, the modulation,” IEE Electronics Letters, vol. 34, no. 15, pp. 1459–1460,
solution of minR∈R′ (w) {∆M (R)} is obtained when R is July 1998.
such that all the wq bits are transmitted using the Gaussian [6] S. Benedetto, G. Montorsi, D. Divsalar, and F. Pollara, “Soft-input
soft-output modules for the construction and distributed iterative decoding
distribution associated to dmin
q , ∀q. With this, we obtain the of code networks,” Eur. Trans. on Telecommun., vol. 9, no. 2, pp. 155–172,
expression for ∆∗M , which holds for any G′M = Π(GM ). Mar.–Apr. 1998.
For BICM-ID-S, GS = m−1 1m P. This matrix has a first [7] F. Schreckenbach, “Iterative decoding of bit-interleaved coded
modulation,” Ph.D. dissertation, Munich University of Technology,
column with a nonzero entry determined by d. Moreover, all Munich, Germany, 2007.
the elements in this column are identical (and nonzero), and [8] A. Alvarado, E. Agrell, L. Szczecinski, and A. Svensson, “Exploiting
therefore, the solution of minR∈R′ (w) {∆S (R)} is obtained UEP in QAM-based BICM: Interleaver and code design,” IEEE Trans.
Commun., vol. 58, no. 2, pp. 500–510, Feb. 2010.
when all the wq bits are transmitted using the Gaussian [9] P. Frenger, P. Orten, and T. Ottosson, “Convolutional codes with optimum
distribution associated to d, ∀q. Using this, we obtain the distance spectrum,” IEEE Trans. Commun., vol. 3, no. 11, pp. 317–319,
expression for ∆∗S , which concludes the proof. Nov. 1999.