Next Article in Journal
Improved Design of PCB Coil for Magnetically Coupled Wireless Power Transfer
Previous Article in Journal
Harmonic Suppressed Wilkinson Power Divider Using Parallel Resonant Shunt Stub
Previous Article in Special Issue
Raptor-like Coded Broadcasting for Efficient V2X Communications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Labeling-Based Recipient Identification with Low-Order Modulation

Institute of Radiocommunications, Poznan University of Technology, Polanka 3, 61-131 Poznan, Poland
Electronics 2024, 13(2), 425; https://doi.org/10.3390/electronics13020425
Submission received: 6 December 2023 / Revised: 4 January 2024 / Accepted: 16 January 2024 / Published: 19 January 2024

Abstract

:
Labeling-Based Recipient Identification (LABRID) brings the possibility of representing the destination station address in a Bit-Interleaved Coded Modulation with Iterative Decoding (BICM-ID) system by a signal labeling rule. Low-order modulations, such as BPSK or QPSK, pose a general problem for BICM-ID due to a limited convergence of iterative decoding. In the context of LABRID, they have one more drawback—a small number of different labeling rules in general; the number of the optimal ones, which exhibit the maximal asymptotic coding gain, is reduced even further. Meanwhile, LABRID needs a sizable collection of different optimal labeling rules to serve many users in large wireless networks. In this paper, the author suggests the use of hypercube BPSK or QPSK labeling to overcome all these challenges. By means of the Reactive Tabu Search (RTS) algorithm, more than 1500 equivalent optimal hypercube labeling rules are found. Analytical error bounds of the system are developed and supported by simulation experiments. Then, the focus is moved to the criterion to determine the frame destination at the LABRID receiver; a simple threshold-based method is proposed to keep the incorrect decision probability below 10 5 . Finally, it is shown that LABRID outperforms a reference BICM-ID system in terms of computational complexity.

1. Introduction

1.1. LABRID at a Glance

BICM-ID [1] is a variation of BICM [2,3], in which the receivers, similar to turbo decoders, can gradually improve the reliability of data estimates thanks to the iterative decoding procedure. In greater detail, the demapper and channel decoder exchange their bitwise log-likelihood beliefs on codeword bits with each other. For the process to be successful, a specific signal labeling map (or labeling, for brevity) must be used for mapping the interleaved codeword bits onto constellation points at the transmitter—it should exhibit a high asymptotic coding gain.
LABRID has been invented as a method for physical-layer addressing in wireless communications without the explicit sending of any address. Instead, the recipient ID is reflected by a unique signal labeling map. LABRID draws its strength from the observation that the iterative process at the BICM-ID receiver does not converge unless the labeling map used at the transmitter side suits the one assigned to the considered demapper. Any foreign frame (i.e., a frame destined for another recipient), can therefore be easily discriminated against due to its lack of convergence decoding, which can be detected using simple threshold-based methods—in [4] it was proposed to measure the absolute extrinsic log-likelihood ratio (LLR) mean at the demapper output, related to the codeword bits, in the last executed decoding iteration (however, one can take into consideration different measures available at the receiver, like the mutual information estimates). Hence, the decision to reject foreign frames is made in the physical layer with only marginal computational cost of obtaining a mean. For the frames identified as foreign, there is no need to run a decoding pass in the last iteration. In contrast, for conservative Medium Access Control (MAC) addressing, the likelihoods of data bits are indispensable for both desired and foreign frames, and every decoded data frame is transferred to the MAC layer, where it undergoes integrity checking, after which the destination address might finally be read.
Along with reasonable computational payload reduction, LABRID offers a small improvement in the data rate, as there is no need to spend any bit to carry the recipient address. However, to be fair, this might be relevant only for very short data frames, which, in turn, are not preferred for BICM-ID systems due to the deficit of decoding convergence. This deficit is caused by the fact that the a priori LLRs on subsequent codeword bits are not sufficiently independent from the extrinsic decisions made about them in the previous iteration.
In Ref. [5], it has been shown that the LABRID receiver can effectively work in a “heterogeneous” environment, in which the signals of different modulation order are transmitted. In addition, the LABRID receiver demonstrated its capability of rejecting legacy BICM frames, in which the typical Gray labeling was used.

1.2. LABRID in Comparison with Other Techniques

LABRID has emerged from BICM(-ID), like many other novel transmission concepts. Therefore, for the reader’s better orientation, let us consider LABRID against the background of a few competing techniques.
There are some BICM-ID enhancements, like signal-space diversity (SSD) [1] or Constellation Shaping (CS) [6,7], which aim to increase the asymptotic coding gain over that of the original BICM-ID or move the position of the turbo cliff. Actually, LABRID does not assume either signal component interleaving (as for SSD) or re-designing the signal constellation (as in the case of CS). Instead, the regular 16-QAM constellation of equiprobable points, and the error probability measures are the same as for the original BICM-ID.
LABRID can be wrongly seen as a flavor of the popular Index Modulation (IM) [8,9], where the so-called Virtual Bits determine the resources selected to transmit subsequent portions of data. The resources considered to be used with IM are, e.g., RF chains, signaling intervals, OFDM subcarriers, or even I-Q signal components. The recipient address, represented by a labeling map according to the LABRID concept, seems to be similar to Virtual Bits, which are not explicitly transmitted according to IM techniques. But note the significant difference: LABRID does not determine any selection of available resources according to the given recipient ID—all resources are still in use. What actually undergoes any manipulation in the case of LABRID is the way of bit mapping onto constellation points, with no impact on the system diversity order.
The result of LABRID use seems to be comparable to the application of scramble coding, known, e.g., from 3G telecommunication systems. In fact, the bit stream scrambled with one scrambling code is weakly correlated with that using another scrambling code. However, LABRID has nothing in common with spectrum spreading—it does not have an impact on the shape of the signal spectrum.

1.3. Research Problem Formulation

LABRID requires a sizable number of different labelings to serve a reasonable number of users. In addition, it is not enough to take into account any set of labeling maps for a given modulation order. Not only should the good labelings yield a high asymptotic coding gain over the (noniterative) Gray-labeled BICM, but also they must be not similar to each other (e.g., exchanging two constellation points’ labels with each other cannot be considered a significant difference). Therefore, the author in [4] focused on a set of 768 M 16 a -compliant 16-QAM labelings, all of which exhibit identical high-rank asymptotic coding gain. The results presented in [4] are entirely satisfactory: none of the users are discriminated against in terms of the iterative decoding results, and the receivers can correctly assess the destination of every single frame, judging by the observed convergence of the iterative process. In addition to 16-QAM, LABRID has also been studied along with 64-QAM BICM-ID with a similar, positive result [10].
For any BICM-ID system, a factor that affects the effectiveness of iterative decoding is the average distance between constellation points that differ in exactly one bit position [11]. According to widespread Gray labeling, the Hamming distance between the labels associated with neighboring constellation points is 1, which is the poorest case from the BICM-ID point of view. In general, the number of possible labelings (i.e., the ways in which binary labels can be assigned to the constellation points) is the factorial of modulation order. For better clarification: the number of candidate labelings that promise good iterative decoding performance is even smaller. Note that for low-order modulation the limit is very strict; there are only two different labelings for BPSK and 4 ! = 24 for QPSK. For BPSK, bit 0 can be assigned to the constellation point + 1 and bit 1 to 1 or vice versa. None of such two labelings can achieve any benefit from iterative decoding, as both are of the Gray type. In the case of QPSK, any labeling can be of either Gray or natural type. The Gray labelings, just like for higher-order modulations, are not worth being considered as candidate BICM-ID labelings. The natural labelings exhibit only a little gain over Gray when applied in a BICM-ID system [12]. In this light, it seems as if BICM-ID was useless in the case of low-order modulations.
Another problem appears if one aims to incorporate LABRID into QPSK BICM-ID; there are only 12 equivalent natural labelings (recall the two groups of QPSK labelings, mentioned above)—not enough for any practical use of LABRID. For BPSK the situation is even worse, as there are only two different labelings at all, none accurate for iterative decoding purposes. The question then arises whether LABRID can be used together with modulations having modulation order below 16.
The solution to the problem of poor BICM-ID performance in the case of low-order modulations was developed a couple of years ago; the so-called hypercube (or multidimensional) labeling. It consists in mapping binary tuples onto a series of symbols of the given modulation, thereby increasing channel diversity. It does not affect the data rate. In particular, for the BPSK hypercube labeling, there is still one bipolar symbol to be transmitted within one modulation period, but the values of subsequent symbols no longer depend solely on individual codeword bits. In [12], the authors developed the optimal QPSK 4-cube labeling, i.e., an assignment of 4-bit labels to pairs of QPSK symbols, whose elements are to be transmitted within two subsequent modulation periods (note that the real and imaginary components of a QPSK symbol constitute separate hypercube dimensions). Then, in [13] they considered the optimal 4-cube and 6-cube labeling for BICM-ID over different channels. In parallel, in [14] a larger variety of hypercubes consisting of QPSK or BPSK symbols was considered for transmission over the AWGN channel. In the current paper it is shown that hypercube labeling brings the possibility to merge the novel LABRID concept with low-order modulations. Indeed, thanks to the use of a general-purpose optimization algorithm, the author found more than 1500 equally good hypercube labelings of QPSK and BPSK symbols—so needed to enable physical layer recipient addressing. The other outcomes of the research are as follows: derivation of the analytical error bound of the considered system, and a proposal of a simple threshold-based criterion for assessing frame destination.

1.4. Paper Structure

The organization of this paper is as follows. Section 2 introduces the system model and describes frame filtering—the method for distinguishing foreign and desired frames. Section 3 covers the theoretical aspects of LABRID BICM-ID error bounds, specifies the requirements that should be met by the optimal hypercube labelings, and delivers exemplary outcomes of the optimization algorithm used to find them. In Section 4, the results of an overall LABRID system simulation experiment are presented and verified by means of the EXIT chart [15,16] and compared with analytical bounds. The efficiency of frame filtering is studied, and the computational cost is delivered therein. Finally, Section 5 concludes the work.

1.5. Notations

Scalars are denoted by italic letters, whereas vectors and matrices are denoted by bold-face letters (bold-face italic in the case of real or complex data type). R N and C N represent the N -dimensional space of real, and complex numbers, respectively. { 0 , 1 } M means the M -dimensional Boolean space. ( · ) stands for the real part. ( · ) ¯ and ( · ) T mean complex conjugate and the vector/matrix transpose, respectively. I represents an identity matrix, while j is the imaginary unit. E [ · ] denotes the statistical expectation. The expression ∼ N ( 0 , N 0 / 2 ) means that the given random variable is distributed normally with mean, 0, and variance, N 0 / 2 .

2. LABRID for BICM-ID with Multidimensional Labeling

2.1. System Model

The considered LABRID BICM-ID system model is shown in Figure 1.
Data frame of length K , denoted by d ̲ , is encoded by a convolutional encoder employing the short [ 5 7 ] 8 code, which is a common choice for BICM-ID. The resultant codeword u ̲ is passed through a pseudo-random bitwise interleaver of depth equal to the codeword size. The interleaved codeword v ̲ is then buffered and cut into L binary blocks v ( 𝓁 ) of length M = 4 , where 𝓁 = 1 , , L is the time offset of a given block. Each v ( 𝓁 ) block is mapped onto a 4-cube vertex x ( 𝓁 ) according to a labeling map
ω i : { 0 , 1 } M R N for BPSK modulation ( N = M ) , { 0 , 1 } M C N for QPSK modulation ( N = M / 2 ) .
Depending on the modulation type, the elements of x ( 𝓁 ) belong to either BPSK signal set: χ BPSK = { 1 , + 1 } or QPSK signal set: χ QPSK = { 1 1 j , 1 + 1 j , + 1 1 j , + 1 + 1 j } .
Conforming to LABRID principles, the hypercube labeling map, ω i , is recipient-specific. While running in the real system, the recipient ID, i , is dropped down from the MAC layer to the physical layer. Vertices x ( 𝓁 ) are transmitted through the uncorrelated Rayleigh fading channel, so that the received vector
y ( 𝓁 ) = x ( 𝓁 ) I h T ( 𝓁 ) + w T ( 𝓁 ) .
Due to the assumption of coherent detection, the elements of h ( 𝓁 ) R N are modeled as real i.i.d. Rayleigh RVs, all having zero mean and unitary variance; the elements of w ( 𝓁 ) C N represent the samples of additive white Gaussian noise with zero mean and variance of N 0 / 2 in either real or imaginary dimension (the complex channel model is valid for either QPSK and BPSK transmitted symbols). Note that the signal reaches many receivers simultaneously; only one of them is the desired frame recipient. With no generality loss, we can assume identical channel realization for each receiver, as the role of a given station might change from one event of frame transmission to another.
At the considered j th receiver, using labeling map ω j , the hypercube demapper computes the extrinsic LLRs (i.e., log-likelihood ratios) individually per codeword bit m of block v ( 𝓁 ) as
Λ m [ dem , E ] ( 𝓁 ) = v : v m = 1 exp Γ ( v , 𝓁 ) + Λ [ dem , A ] ( 𝓁 ) v T v : v m = 0 exp Γ ( v , 𝓁 ) + Λ [ dem , A ] ( 𝓁 ) v T Λ m [ dem , A ] ( 𝓁 ) ,
where v : v m = b is a hypothetically considered binary block of length M , having b { 0 , 1 } on bit m ,
Γ ( v , 𝓁 ) = log P j y ( 𝓁 ) v , h ( 𝓁 ) = log P y ( 𝓁 ) x v , ω j , h ( 𝓁 ) = M log 1 π N 0 1 N 0 y ( 𝓁 ) x v , ω j I h T ( 𝓁 ) 2 ,
x is a vertex assigned to v according to the labeling ω j . · is the norm in C N induced by the inner product
a | b = def n = 1 N a n b ¯ n = n = 1 N a n I + j a n Q b n I j b n Q = n = 1 N a n I b n I + a n Q b n Q j · a n I b n Q a n Q b n I ,
so that a 2 = n = 1 N a n 2 . The a priori demapper information, Λ [ dem , A ] ( 𝓁 ) = [ Λ m [ dem , A ] ( 𝓁 ) ] 1 m M is gleaned from the Soft-Input Soft-Output (SISO) decoder [17].
The individual extrinsic demapper LLRs are merged into vectors
Λ [ dem , E ] ( 𝓁 ) = [ Λ m [ dem , E ] ( 𝓁 ) ] 1 m M ,
related to respective binary blocks v ( 𝓁 ) , and then into vector
Λ ̲ [ dem , E ] = [ Λ [ dem , E ] ( 𝓁 ) ] 1 𝓁 L ,
including the extrinsic demapper LLRs for all bits of the codeword. Then the elements of Λ ̲ [ dem , E ] are deinterleaved to constitute Λ ̲ [ enc , A ] , i.e., the input information of the SISO decoder. Taking into account the code rate of 1 / n C , there are n C LLRs related to the codeword bits per each k th trellis section: Λ 1 [ enc , A ] ( k ) , , Λ n C [ enc , A ] ( k ) , which constitute a vector Λ [ enc , A ] ( k ) such that
Λ ̲ [ enc , A ] = Λ [ enc , A ] ( k ) 1 k K .
With no generality loss, let us assume that the decoder operates according to the max* principle. It can represent the accurate optimal log-MAP routine, simplified approach with the use of look-up tables as corrections, or the basic max-log-MAP, deriving its simplicity from the Jacobi logarithm approximation [18].
The decoding process in each iteration consists of four phases [17]:

2.1.1. Calculation of Edge Transition Cost

The transition cost is obtained for each e edge in every k th trellis segment as
γ ( e , k ) = [ u 1 ( e ) u n C ( e ) ] Λ [ enc , A ] ( k ) T ,
where u 1 ( e ) u n C ( e ) are the subsequent codeword bits assigned to the trellis edge e .

2.1.2. Calculation of State Metrics in the Forward Trellis Pass

The forward metric of state s in the k trellis segment is calculated recursively as
α ( s , k ) = max * e : s E ( e ) = s α ( s S ( e ) , k 1 ) + γ ( e , k ) , k > 1 ,
where s S ( e ) and s E ( e ) are the origin and destination state of edge e , respectively. To break the recursion loop, it is assumed that the encoder starts the encoding process in the all-zero state.

2.1.3. Calculation of State Metrics in the Backward Trellis Pass

Similarly to (10), one can obtain the metric of state s in the k th trellis segment as
β ( s , k ) = max * e : s S ( e ) = s β ( s E ( e ) , k + 1 ) + γ ( e , k ) , k < K .
Since the encoder appends a respective number of tail bits to the data frame, the backward trellis pass starts at the all-zero state.

2.1.4. Generation of LLRs

For all but the last decoding iteration, the decoder generates the extrinsic codeword-related LLRs as
Λ p = 1 , , n C [ enc , E ] ( k ) = max * e : u p ( e ) = 1 α ( s S ( e ) , k 1 ) + γ ( e , k ) + β ( s E ( e ) , k ) max * e : u p ( e ) = 0 α ( s S ( e ) , k 1 ) + γ ( e , k ) + β ( s E ( e ) , k ) Λ p [ enc , A ] ( k ) .
They are the elements of vector Λ [ enc , E ] ( k ) such that
Λ ̲ [ enc , E ] = Λ [ enc , E ] ( k ) 1 k K .
Passed through the interleaver, Λ ̲ [ enc , E ] becomes a priori demapper information,
Λ ̲ [ dem , A ] = Λ [ dem , A ] ( 𝓁 ) 1 𝓁 L
in the next iteration.
In the last decoding iteration, the decoder delivers the extrinsic LLRs associated with the data bits (one bit per one trellis segment):
Λ [ dec , E ] ( k ) = max * e : d ( e ) = 1 α ( s S ( e ) , k 1 ) + γ ( e , k ) + β ( s E ( e ) , k ) max * e : d ( e ) = 0 α ( s S ( e ) , k 1 ) + γ ( e , k ) + β ( s E ( e ) , k ) ,
where d ( e ) is the data bit assigned to the trellis edge e . Subsequent LLRs from (15) constitute vector
Λ ̲ [ dec , E ] = Λ [ dec , E ] ( k ) 1 k K ,
which is, finally, passed through a quantizer to obtain an estimated data frame, d ^ ̲ .
Note that in the LABRID receiver, the last-iteration decoder pass is not run for any foreign frame, which significantly reduces the computational payload.

2.2. Frame Filtering

LABRID receivers are equipped with a frame filter, necessary to reject the frames which are not actually destined for them. The frame filter makes use of the author’s observation that the iterative decoding process in any BICM-ID receiver can converge only if both conditions are met:
  • E b / N 0 is high enough,
  • the demapper labeling map ω j is identical to the map used at the transmitter ω i [4].
Convergence means that the mutual information I between the codeword and the extrinsic demapper or decoder LLRs increases within subsequent decoding iterations; the LLRs become more and more reliable from one iteration to another. Fortunately, there is no need to compute mutual information explicitly, as the reliability of any LLR strictly corresponds to its magnitude [19]. Consequently, the LABRID receiver computes the absolute extrinsic demapper LLR mean per frame, denoted by Λ , hereinafter, and compares it against a threshold value Θ , empirically specified. The main reason for choosing the values of the extrinsic demapper LLRs as the frame filtering criterion instead of the extrinsic decoder LLRs is that it might save the time necessary for decoder’s operation in the last iteration when the frame is classified as foreign. Obviously, there is a nonzero probability that a frame that is actually destined for the considered receiver (called a desired frame, hereinafter) is wrongly classified as a foreign frame (i.e., directed to the other receiver). Such an error event will be termed misdetection. Another kind of error (called false alarm) appears if the receiver makes the decision to acquire a foreign frame.
With the aim of formalizing the probability of both types of errors, mentioned above, let p Λ | ω λ be the pdf of the value of Λ at the considered E b / N 0 , given the labeling map used on the transmitter side. The misdetection event at the j th receiver appears if the labeling used on the transmitter side is identical to labeling ω j used by the considered receiver and Λ falls below the threshold at the same time. Thus, the respective probability of misdetection error (or Misdetection Rate, MR) at the j th receiver reads
MR j Θ = 0 Θ p Λ | ω λ | ω j d λ .
By averaging MR j over all possible labeling maps, one obtains
MR Θ = E j MR j Θ = j P ω j 0 Θ p Λ | ω λ | ω j d λ ,
which seems to be a more valuable measure of frame filtering efficacy. However, all the optimal labelings—by definition—exhibit exactly the same features, so the MR calculated for any receiver j gives the value of the general MR. In other words, the conditional Λ pdfs are identical for all equivalent labelings. Consequently, to calculate MR, one can assume any optimal labeling per frame, necessarily the same at both sides of the system, which is represented by condition ω i = j in the final MR definition:
MR Θ = 0 Θ p Λ | ω λ | ω i = j d λ .
By analogy to MR, let us define False Alarm Rate (FAR) as
FAR Θ = Θ p Λ | ω λ | ω i j d λ ,
where the condition is that the receiver labeling is different from that used on the transmitter side, though both are equivalent optimal labelings.
The definitions of MR and FAR will be used in the experimental part (Section 4.4) to determine the optimal threshold values per the assumed values of E b / N 0 .

3. Optimal Hypercube Labeling Set

3.1. Error-Free Feedback BER Bound

BICM-ID achieves the Error-Free Feedback (EF) state having performed a sufficient number of iterations, unless E b / N 0 is too low for the iterative process to converge. Consider the binary blocks v and v ¬ m , which are identical except for bit m . The results of v and v ¬ m mapping into the M -cube are the x = x 1 , , x n , , x N and x ¬ m = x 1 , ¬ m , , x n ¬ m , , x N ¬ m vertices, respectively. The elements of x and x ¬ m are regular constellation points of BPSK (in such a case, M = N ) or QPSK ( M = 2 N ), which means that a binary vector of length M = 4 can be mapped onto a sequence of 4 BPSK signals or 2 QPSK signals. Note the same hypercube size (or number of dimensions) in both cases. Let x be the actually transmitted symbol. For the EF case in BICM-ID, the demapper’s decision on the m th bit of block v mapped onto x is incorrect if the distance of the received vertex y from x is longer than that from competing vertex x ¬ m (all other competing vertices can be expurgated, since all remaining bits of v are assumed to be ideally estimated [1]). Accordingly, let us consider the metric difference Δ Δ ( x , x ¬ m ) between x and x ¬ m when y is received, given the current channel state h and noise vector w . Unlike for the regular BICM-ID system from [1], the metric difference reflects hypercube labeling (for brevity, let x ¬ m be replaced by z when considering a given x , x ¬ m pair):
Δ = y z I h T 2 y x I h T 2 = x I h T + w T z I h T 2 x I h T + w T x I h T 2 = x I h T + w T z I h T 2 x I h T + w T x I h T 2 = ( x z ) I h T + w T 2 w T 2 = ( x z ) I h T + w T | ( x z ) I h T + w T w T 2 .
Repeated use of the following features of the inner product:
a + b | c = a | c + b | c
and
a | b = b | a ¯
gives
Δ = ( x z ) I h T | ( x z ) I h T + ( x z ) I h T | w T + ( x z ) I h T | w T ¯ = ( x z ) I h T 2 + 2 ( x z ) I h T | w T .
Since
( x z ) I h T 2 = n = 1 N ( x n z n ) h n 2 = n = 1 N h n 2 x n z n 2
and
( x z ) I h T | w T = n = 1 N h n · w n I · x n I z n I + w n Q · x n Q z n Q ,
it can be observed that
Δ = n = 1 N Δ n ,
where
Δ n Δ n ( x , z ) = h n 2 x n z n 2 + 2 h n · w n I · x n I z n I + w n Q · x n Q z n Q .
Note that (25) is valid only in the case of coherent detection, which allows for the assumption that h R N .
Given h n , metric difference Δ n is a linear combination of two i.i.d. RVs: w n I , w n Q N ( 0 , N 0 / 2 ) , and—as such—is the Gaussian RV, too. From E [ w n I ] = E [ w n Q ] = 0 it can immediately be inferred that the mean of Δ n is
μ Δ n = E w n I , w n Q Δ n = h n 2 x n z n 2 .
Accordingly, the variance of Δ n yields
σ Δ n 2 = E w n I , w n Q Δ n 2 μ Δ n 2 ,
where
E w n I , w n Q Δ n 2 = μ Δ n 2 + 2 h n 2 x n z n 2 · 2 E w n I , w n Q h n · w n I · x n I z n I + w n Q · x n Q z n Q + E w n I , w n Q 2 h n · w n I · x n I z n I + w n Q · x n Q z n Q 2
Since the real and imaginary noise components are mutually independent,
E w n I , w n Q Δ n 2 = μ Δ n 2 + 4 h n 3 x n z n 2 [ x n I z n I E w n I 0 + x n Q z n Q E w n Q ] 0 + 4 h n 2 E w n I , w n Q w n I · x n I z n I + w n Q · x n Q z n Q 2 = μ Δ n 2 + 4 h n 2 E w n I , w n Q w n I 2 x n I z n I 2 + 2 w n I w n Q · x n I z n I · x n Q z n Q + w n Q 2 x n Q z n Q 2 = μ Δ n 2 + 4 h n 2 · E w n I 2 x n I z n I 2 + E w n Q 2 x n Q z n Q 2 .
In this position, to obtain E w n I 2 and E w n Q 2 it is enough to take into account that by definition σ w n I / Q 2 = E w n I / Q 2 E 2 w n I / Q = N 0 / 2 . Knowing that E w n I / Q = 0 , one obtains E w n I / Q 2 = N 0 / 2 , and then
E Δ n 2 = μ Δ n 2 + 4 h n 2 N 0 2 x n I z n I 2 + x n Q z n Q 2 = μ Δ n 2 + 2 N 0 h n 2 x n z n 2 .
Finally, it is enough to apply the result of (32) to (29) to obtain
σ Δ n 2 = 2 N 0 h n 2 x n z n 2 .
For the future use let us specify the bilateral Laplace transform of the pdf of the metric difference Δ from (20):
Φ Δ ( s ) = e s δ f Δ ( δ ) d δ = E h , w e s Δ .
For the given h n , since Δ = n = 1 N Δ n , all Δ n terms are i.i.d. Gaussian RVs, so
Φ Δ ( s ) = E h , w e s n Δ n = E h n = 1 N E w n I , w n Q e s Δ n .
Since E [ e s a ] = exp ( s μ a + s 2 σ a 2 / 2 ) for any Gaussian RV a , it is also valid for every Δ n :
E w n I , w n Q e s Δ n = exp s μ Δ n + s 2 σ Δ n 2 2 .
Taking into account that the individual elements of h are i.i.d. RVs,
Φ Δ ( s ) = n = 1 N E h n exp h n 2 s · N 0 s 1 x n z n 2 .
In (37), one can recognize the moment generating function (MGF) of a normalized Rayleigh-distributed RV R : = h n 2 , which yields
E e a R 2 = 1 1 a .
The convergence criterion of MGF is { a } < 1 . Accordingly, by assigning
a : = s · N 0 s 1 x n z n 2 ,
one finally arrives at
Φ Δ ( s ) = n = 1 N 1 1 s · N 0 s 1 x n z n 2 .
The obtained Laplace transform (40) has 2 N purely real poles, i.e., there is an
ϵ n = 1 1 + 4 N 0 / x n z n 2 2 N 0 < 0 , ϵ n + = 1 + 1 + 4 N 0 / x n z n 2 2 N 0 > 0
pair for each n , and it can converge in the region where
{ s } ( max ( ϵ 1 , , ϵ N ) , min ( ϵ 1 + , , ϵ N + ) ) .
Note that the restriction of Φ Δ to that interval is a real, positive and convex function with the minimum at s = 1 / ( 2 N 0 ) for any ( x , z ) pair.
Now, let us study the overall system performance. Consider d subsequent bits of the codeword: u k + 1 , , u k + d , each equally likely to be 0 or 1 ( 0 k K d ). After interleaving, they are mapped onto random positions m ( ι 1 ) , , m ( ι d ) of the labels of randomly selected vertices x ( ι 1 ) , , x ( ι d ) constituting a sequence x ̲ ̲ . That is, bit u k + 1 is mapped onto position m ( ι 1 ) of the label of vertex x ( ι 1 ) , and so on. Then, let z ̲ ̲ be a sequence of vertices z ( ι 1 ) , , z ( ι d ) , whose labels are identical to those of x ̲ ̲ except for the positions m ( ι 1 ) , , m ( ι d ) , respectively. For the given codeword, the error event of Hamming distance d occurs when the cumulative metric difference
Δ ̲ ̲ = Δ ( x ( ι 1 ) , z ( ι 1 ) ) + + Δ ( x ( ι d ) , z ( ι d ) ) 0 .
Having said this, recall the EF BER bound for a BICM-ID system employing a rate- k c / n c convolutional code [1,2]:
P b 1 k c d = d free B d f EF d , ω , χ ,
where B d is the total input weight of the error events at Hamming distance d , d free is the free distance of the code, and χ is the set of all hypercubes. The pairwise error probability (PEP)
f EF d , ω , χ = E x ( ι 1 ) , , x ( ι d ) , m ( ι 1 ) , , m ( ι d ) ( P ( Δ ̲ ̲ 0 ) ) .
A general formula for P ( Δ ̲ ̲ 0 ) , derived in [20], is
P ( Δ ̲ ̲ 0 ) = 1 2 π j ϵ j ϵ + j Φ Δ ̲ ̲ ( s ) d s s ,
where
Φ Δ ̲ ̲ ( s ) = e s δ f Δ ̲ ̲ ( δ ) d δ = E h ( ι 1 ) , , h ( ι d ) , w ( ι 1 ) , , w ( ι d ) e s Δ ̲ ̲ = b = ι 1 , , ι d Φ Δ ( x ( b ) , z ( b ) ) ( s )
is the bilateral Laplace transform of the cumulative metric difference and ϵ belongs to the intersection of the regions of convergence of all Φ Δ ( x ( b ) , z ( b ) ) terms with the real positive line. The last transformation in (44) is valid as all h ( ι 1 ) , , h ( ι d ) , w ( ι 1 ) , , w ( ι d ) terms are mutually independent RVs. Consequently,
f EF d , ω , χ = 1 2 π j E x ( ι 1 ) , , x ( ι d ) , m ( ι 1 ) , , m ( ι d ) ϵ j ϵ + j b = ι 1 , , ι d Φ Δ ( x ( b ) , z ( b ) ) ( s ) d s s = 1 2 π j ϵ j ϵ + j E x ( ι 1 ) , , x ( ι d ) , m ( ι 1 ) , , m ( ι d ) b = ι 1 , , ι d Φ Δ ( x ( b ) , z ( b ) ) ( s ) d s s = a ) 1 2 π j ϵ j ϵ + j b = ι 1 , , ι d E x ( b ) , m ( b ) Φ Δ ( x ( b ) , z ( b ) ) ( s ) d s s = b ) 1 2 π j ϵ j ϵ + j E x , m Φ Δ ( x , z ) ( s ) d d s s = 1 2 π j ϵ j ϵ + j 1 M 2 M x χ m = 1 M n = 1 N 1 1 + x n x n ¬ m 2 / 4 N 0 d s s ,
where (a) is valid because all x ( b ) and m ( b ) RVs are mutually independent, and (b) is obtained because of the identical (uniform) probability distribution of all x ( b ) ’s and the same for all m ( b ) ’s. Computing the integral from (45) seems to be a challenging task; the author of the paper applies a method based on numerical integration, detailed in (Section 13.3.2 in [21]).
The developed tight EF bounds will be used in the further part of the paper to verify the accuracy of simulation experiments.

3.2. Properties of Optimal Hypercube Labeling

The tight EF bounds are quite impractical when comparing different labeling maps in terms of their impact on PEP. Therefore, let us resort to the loose Chernoff PEP bound (Sections 12.1.1, 13.3 and 13.5 in [21]):
f EF , Chernoff d , ω , χ min ϵ R , ϵ > 0 E x ( ι 1 ) , , x ( ι d ) , m ( ι 1 ) , , m ( ι d ) Φ Δ ̲ ̲ ( ϵ ) = 1 M 2 M x χ m = 1 M n = 1 N 1 1 + x n x n ¬ m 2 / 4 N 0 d .
Now, it is easy to determine the impact of the constellation type and labeling on the system performance by introducing a distance parameter
ξ ω , χ = x χ m = 1 M n = 1 N 1 + x n x n ¬ m 2 4 N 0 1 .
It is clear that f EF , Chernoff d , ω , χ is proportional to ξ ω , χ d , so the optimal hypercube labeling map for the given hypercube is
ω opt ( χ ) = arg min ω ξ ω , χ .
In [12], the authors considered the optimal labeling map for the case of an ( M = 4 ) -cube consisting of n = 2 QPSK signals. However, their approach was more general, as they focused on hypercube dimensions rather than component signals. In particular, the 4-cube is made up of four orthogonal coordinates, which may represent either four subsequent BPSK symbols or two pairs of real and imaginary QPSK symbol components. Consequently, let us represent the vertices by a series of M coordinates: x by c ( c 1 , c M ) , and x ¬ m by c ¬ m ( c 1 ¬ m , , c M ¬ m ) . The individual elements of c and c ¬ m will be referred to using index n .
The distance parameter (47), expressed explicitly with the coordinates, takes a different form for the two hypercube variants, i.e.,
ξ BPSK ω , χ = x χ m = 1 4 n = 1 4 1 + c n c n ¬ m 2 4 N 0 1 ,
and
ξ QPSK ω , χ = x χ m = 1 4 n = 1 2 1 + x n x n ¬ m 2 4 N 0 1 = x χ m = 1 4 1 + 1 4 N 0 c 1 c 1 ¬ m 2 + c 2 c 2 ¬ m 2 x 1 x 1 ¬ m 2 1 · 1 + 1 4 N 0 c 3 c 3 ¬ m 2 + c 4 c 4 ¬ m 2 x 2 x 2 ¬ m 2 1
for BSPK and QPSK, respectively.
Let us consider the distances between vertices x and x ¬ m , whose labels ( v and v ¬ m ) differ at position m . Having M hypercube dimensions, the same or opposite coordinates for c and c ¬ m can be assigned in any dimension, as
c n , c n ¬ m { 1 , + 1 } , n = 1 , , M , m = 1 , , M .
Consequently, the distance between c n and c n ¬ m can be either 0 or + 1 ( 1 ) 2 = 4 .
Let us define a set containing all one-dimensional distances for a given ( x , x ¬ m ) pair
D ( x , m ) = c n c n ¬ m 2 : n = 1 , , M ,
and respective Euclidean distance
ζ x , m = n = 1 M c n c n ¬ m 2 .
As one is interested in maximizing the actual distance parameter related to labeling (47), they should maximize ζ for all vertices and all m , regardless of the hypercube variant considered. It would be achieved if the vertices x and x ¬ m differed from each other in all dimensions, for every m , so that x m D ( x , m ) = { 4 , 4 , 4 , 4 } and ζ x , m = 16 . But here the constraints caused by the hypercube properties must be taken into account [13]. That is, for a given x , the desired content of D can appear only for one value of m . To better explain it, without loss of generality, let c = ( 1 , 1 , 1 , 1 ) be assigned to a binary block v = ( 1000 ) . It is obvious that there is only one competing vertex, i.e., ( + 1 , + 1 , + 1 , + 1 ) , with the highest distance ζ from c . It can be labeled, e.g., by v ¬ 1 = ( 0 000 ) , so let us call it c ¬ 1 . Now let us consider the remaining second furthest vertices that can be assigned to the other binary blocks at Hamming distance 1 to v ( v ¬ 2 = ( 0 1 00 ) , v ¬ 3 = ( 00 1 0 ) , v ¬ 4 = ( 000 1 ) ). There are four equally good candidates: the vertices differing in three out of four coordinates from c , namely ( 1 , + 1 , + 1 , + 1 ) , ( + 1 , 1 , + 1 , + 1 ) , ( + 1 , + 1 , 1 , + 1 ) , ( + 1 , + 1 , + 1 , 1 ) . Each of them yields D = { 4 , 4 , 4 , 0 } and ζ = 12 . To conclude this part, let us formulate Corollary 1.
Corollary 1. 
For the best 4-cube labeling in the BICM-ID system, a distance spectrum
Z ( x ) = { ζ ( x , m ) : m 1 , , M }
contains the entries  { 16 , 12 , 12 , 12 }  for every vertex  x .
The corollary reflects the limits caused by the construction of the 4-cube. Any labeling that conforms to these limits will be considered the ideal labeling. However, in advance, it is not guaranteed that one exists. Note that Corollary 1 is valid for both BPSK and QPSK constellations used to create the 4-cube. In (53), there is only one entry bigger than the rest—in the case of the QPSK constellation it might be a real or imaginary component of either the first ( n = 1 ) or the second ( n = 2 ) symbol of the vertex. The final assignment has no impact on the content of Z ( x ) .
Now, let us recall (50)—the distance parameter for QPSK—in the context of the considered example. For the most distant competing vertex, both component QPSK signals differ from their x counterparts in both real and imaginary coordinates. Meanwhile, for the remaining three competing vertices (with the second furthest distance), one of the coordinates (real or imaginary, of either the first or second component QPSK signal) is the same as for x . In the case of the ideal labeling (constrained only by the properties of the hypercube), the same pattern appears for every vertex x . Consequently, the limit for any QPSK hypercube labeling is constituted by
ξ QPSK ω opt , χ 1 M · 2 M x χ 1 + 8 4 N 0 1 2 + M 1 1 + 8 4 N 0 1 1 + 4 4 N 0 1 = 1 M 1 + 2 N 0 1 2 + M 1 1 + 2 N 0 1 1 + 1 N 0 1 ,
where the distance of 8 represents the case where both QPSK coordinates of x n ¬ m are different from their counterparts x n , and 4 appears for the cases where only one coordinate (real or imaginary) is different. The last transition results from the assumption that the optimal distance pattern features in every x χ , so the expectation over x disappears. For E b / N 0 , one can assume 1 + E b N 0 1 E b N 0 1 , which yields a simpler loose bound:
ξ QPSK ω opt , χ 1 M 2 N 0 2 + M 1 2 N 0 1 1 N 0 1 = 1 M N 0 2 4 + M 1 · N 0 2 2 .
In the case of a hypercube based on BPSK symbols, the individual hypercube coordinates are de facto single BPSK symbols, transmitted during separate modulation intervals. Consequently,
ξ BPSK ω opt , χ 1 M · 2 M x χ 1 + 4 4 N 0 1 4 + M 1 1 + 4 4 N 0 1 3 = 1 M 1 + 1 N 0 4 + M 1 1 + 1 N 0 3 .
Again, for E b / N 0
ξ BPSK ω opt , χ 1 M 1 N 0 4 + M 1 1 N 0 3 = N 0 3 M N 0 + M 1 .
If one assumes reasonably small N 0 ( < 0.1 ) and M = 4 when comparing the approximate minimal values of ξ BPSK and ξ QPSK , they obtain
ξ BPSK ω opt , χ / ξ QPSK ω opt , χ = 4 N 0 · N 0 + M 1 2 M 1 1 .
The ratio becomes smaller and smaller with decreasing N 0 . This is a clue that the considered system exhibits better asymptotic performance when employing BPSK hypercube labeling; the cost is a halved data rate.

3.3. Search for the Optimal Hypercube Labeling

In [13], an algorithm was developed to obtain the best labeling for a hypercube of any dimension M . For the case of M = 4 , it complies with the ideal labeling conditions, specified by Corollary 1. However, for LABRID applications, one needs hundreds of such optimal labelings. One way to generate such a labeling set is to start with the optimal labeling from [13] and consider some assignment manipulations. Another solution is to start from scratch and utilize adequate optimization algorithms, such as the Binary Search Algorithm [22], or Reactive Tabu Search (RTS) [23], commonly used to solve combinatorial problems, such as label assignment in BICM-ID. In a general case, the advantage of the second approach is that it is not constrained by the outcomes of the previous contributions and allows the exploration of new areas of the search space. However, in the considered case, no optimal labeling can break the rules specified for the ideal labeling in Corollary 1, so the optimal solution can be easily identified.
Having taken into account the above remarks, the author decided to run the RTS algorithm, which has been successfully used in the past to find equivalent optimal labelings for 16-QAM [4] and 64-QAM [10]. The optimization goal is to minimize the distance parameter (47), which represents the impact of labeling on system performance, and acts as the cost function for the optimization algorithm. It is instantiated for QPSK and BPSK hypercubes in (50) and (49), respectively. When searching for the optimal labeling map at E b / N 0 , a reasonably small N 0 (i.e., 0.1) is assumed in the cost function. Every labeling visited by the RTS algorithm is checked for compliance with Corollary 1. If the labeling passes the check and has not been found before, it is archived, and the algorithm starts another optimization round from the initial random labeling assignment. After an all-day algorithm run, a collection of 1536 unique optimal labelings is found. All equivalent labelings are equally good for QPSK- and BPSK hypercubes.
A small part of the equivalent optimal labelings are presented in Table 1. The labelings, denoted by ω 1 , , ω 9 , are expressed by integers such that each integer is a unique identifier of given label v , e.g., 11 stands for v = ( 1011 ) . For better illustration, let us consider the distance spectrum Z ( x ) for all vertices labeled according to ω 1 from Table 1. The spectrum is shown in Table 2. Individual rows represent c vectors (unequivocally associated with respective vertices x ). The order of c vectors in rows results from the considered labeling ω 1 —note the incremental order of the label identifiers. The columns of the table represent the same c vectors assigned to the respective column labels according to the same labeling ω 1 . The spectrum entries in a given row appear only in four cells for which the column labels differ in exactly one bit position from their row labels, thereby generating valid ( v , v ¬ m ) pairs. It can be easily noticed that each row of the table contains the set of entries: {16,12,12,12}, which is specific for the optimal 4-cube labeling, as claimed in Corollary 1. Thus, ω 1 is optimal.
Note that the spectrum table is symmetrical along its main diagonal, and the rule from Corollary 1 is valid also for every column label.
What is interesting is that the cells occupied in the spectrum table form a pattern that is pleasing to the eye: two Electronics 13 00425 i001 symbols between two lines. The pattern is not specific to ω 1 or any labeling used. Instead, it is connected only with the order of row- and column labels (the natural binary order is used here). However, for the presented ω 1 labeling, another feature is attractive. That is, the longest entries of the distance spectrum (16) appear only along the lines of the pattern, creating the 8-diagonal and ( 8 ) -diagonal of the table, never as a part of the Zodiac symbols. The same feature is present for the optimal 4-cube labeling constructed in [13], giving the impression that the feature is a prerequisite for any optimal 4-cube labeling. Actually, it is specific only for these optimal labelings, for which the longest spectral distance is always assigned to such pairs of vertices, whose labels differ from each other on the most significant bit, i.e., ζ x , 1 = 16 , ζ x , m 1 = 12 , x . Such a design rule is expressed literally in the algorithm to obtain the optimal hypercube labeling from [13]. Among the 1536 optimal labelings found by RTS in the current work, there are exactly 384 (25 percent of all) that have this feature. For the rest (in equal proportion), the longest spectral distance is assigned to the pairs of vertices with the labels always differing on bit m = 2 ,   3 , or 4, respectively. In such cases, the highest entries in the spectrum table lie on respective ± ( 2 4 m ) -diagonals of the spectrum table, so that the diagonal offset corresponds with the bit position on which the labels assigned to the furthest vertices differ from each other. An important observation for any optimal 4-cube labeling is that the furthest spectral distance is assigned to the same bit position in the label for all vertices.

4. Illustrative Results

4.1. Overall System Performance

The first step in verifying the usefulness of the proposed LABRID with hypercube labeling is to evaluate the BER ( E b / N 0 ) performance of the proposed system using MATLAB R2020a software. The system model is implemented according to the description in Section 2.1, with the exception that only one receiver (the actual recipient of the given frame) is considered at a given time. The number of errors among other receivers is not important, as the frame should be classified by them as foreign and rejected. The transmitter labeling map ω i is randomly selected per frame to not limit the conclusions to only one Tx-Rx link. However, due to the identical features of all equivalent labelings, one could expect the same results having fixed both the labeling map and the relevant receiver. The optimal log-MAP SISO decoding algorithm is considered.
It is known that any BICM-ID system needs a high-depth interleaver, which could brake the correlation between channel gains affecting subsequent codeword bits; assuming high data frame size could help. The smaller the data frame, the higher the risk of “lazy convergence” caused by the fact that the a priori demapper knowledge is not diversified enough. As a result, a wider turbo cliff region can be expected in the BER ( E b / N 0 ) plot.
In the current setup, we consider the data frame size to be 100,000 or 10,000 bits. The first case is quite unrealistic, but it can perfectly demonstrate BICM-ID capabilities in terms of decoding convergence. For statistical reliability reasons, as many as 10 6 data frames are passed for each E b / N 0 setup. The channel gain and the noise power spectral density N 0 are perfectly estimated at the receiver.
The simulation results are shown in Figure 2 together with the relevant EF bounds defined by (41), calculated for one arbitrarily chosen optimal hypercube labeling by numerical integration of PEP, as shown in [24]. The position of the EF bounds is irrespective of the assumed size of the data frame. The conclusions from the obtained results can be formulated as follows:
  • The simulation BER curves meet the EF bounds, which proves the accuracy of simulation setup and scripts. Moreover, it shows that LABRID is transparent for the overall system performance.
  • The position of the turbo cliff for the case of the 10,000 data frame size and QPSK modulation corresponds to its non-LABRID QPSK hypercube BICM-ID reference (Figure 2 in [12]; note the difference in the number of iterations performed and the frame size). It is another proof that LABRID does not deteriorate the overall system performance.
  • As expected, the turbo cliff for the longer data frame appears at a lower E b / N 0 and is steeper than for the setup with the shorter data frame.
  • Particularly for the shorter data frame, there is no real benefit in running as many as 30 decoding iterations (20 are fully enough).
  • The EF bound for BPSK hypercube labeling runs significantly lower than for QPSK hypercube labeling and diverges with increasing E b / N 0 . It is clear evidence of better asymptotic performance of the former. It agrees with the conclusion ending Section 3.2.

4.2. EXIT Chart Analysis

The EXIT chart [15,16] at E b / N 0 = 3.4 dB for the 4-cube modulations considered in the paper (BPSK, QPSK) is shown in Figure 3. The tunnel between the demapper and decoder transfer curves is opened, so E b / N 0 = 3.4 dB is definitely above the pinch-off limit, regardless of the modulation type considered. It suggests that the simulation BER points should lie on respective modulation-specific EF bounds at the considered E b / N 0 , which can be observed exactly in Figure 2a. The transfer curve for the QPSK demapper starts its growth with a higher value of extrinsic mutual information than that for the BPSK demapper, and the tunnel width in its narrowest place is wider for the former than for the latter. It proves faster decoding convergence in the case of the system using QPSK hypercube modulation, which is also reflected in the simulation results at E b / N 0 = 3.4 dB , i.e., the EF bound is met in at most 10 iterations in the case of QPSK, while the system employing BPSK modulation needs more than 20 iterations. On the other hand, the maximal value of the demapper transfer function (observed in the EF case, i.e., at I ( Λ ̲ [ dem , A ] ; v ̲ ) = 1 ) is higher in the case of the BPSK demodulator. It gives more reliable decoder a priori LLRs in the final decoding pass, which, in turn, lowers the respective EF bound.
These conclusions regarding the EXIT tunnel width do not correspond to the BER ( E b / N 0 ) plot for the case of the 10,000-bit long data frame, shown in Figure 2b. In detail, at the considered E b / N 0 = 3.4 dB the simulation BER points do not meet the respective EF bounds. So, let us study the reason. The subplots of Figure 4 refer to the following cases: QPSK modulation, 100,000 bits data frame (Figure 4a), QPSK modulation, 10,000 bits (Figure 4b), BPSK modulation, 100,000 bits (Figure 4c), and BPSK modulation, 10,000 bits (Figure 4d). Along with the demapper and decoder transfer curves, they display 10 decoding trajectories exhibiting the lowest demapper a priori mutual information in the last (the 30th) iteration among all transmitted data frames. For the cases where the longer data frame is transmitted (refer to Figure 4a,c), all the considered decoding trajectories tightly match the tunnel created by the transfer curves, so there is neither pdf shape mismatch nor convergence deficiency, and the conclusions based on the EXIT chart observation are fully accurate. On the contrary, if the data frame consists of 10,000 bits (Figure 4b,d), the decoding trajectories visually die out and eventually start to leave the EXIT tunnel, making it impossible to reach the EF range. Since the iterative decoding process cannot converge for at least a few “hopeless” frames, BER increases, substantially. It justifies the gap between the simulation BER curves and their EF bounds at the considered E b / N 0 = 3.4 dB , observed in Figure 2b.

4.3. Efficacy of Frame Filtering

LABRID could be considered a robust solution only if the receivers can efficiently filter out foreign frames. So, the current task is to verify the empirical pdfs of the random variable p Λ | ω ( λ | ω ) , representing the absolute extrinsic demapper LLR mean per frame, in two cases: (1) when the receiver obtains the foreign frame, and (2) when it obtains the desired frame. The pdfs shown in Figure 5 are based on the observation of 1000 desired and 1000 foreign frames, both of length 10,000 (such frame length is more realistic than 100,000). In the case of foreign frames, the labeling maps are selected randomly at both the transmitter and receiver sides from the collection of equivalent optimal labelings, and it is guaranteed that they are different from each other. The pdfs are considered in iterations 1...30, separately for QPSK and BPSK hypercube modulation. For better readability, null pdf entries are not shown. Measures are taken at such values of E b / N 0 that the simulation BER curves from Figure 5a have just met their respective EF bounds.
Figure 4. EXIT charts at E b / N 0 = 3.4 dB ; 100,000 bits per frame (a,c) or 10,000 bits per frame (b,d); QPSK modulation (a,b) or BPSK modulation (c,d); the zigzag lines represent the worst 10 decoding trajectories w.r.t. demapper a priori mutual information in the last iteration.
Figure 4. EXIT charts at E b / N 0 = 3.4 dB ; 100,000 bits per frame (a,c) or 10,000 bits per frame (b,d); QPSK modulation (a,b) or BPSK modulation (c,d); the zigzag lines represent the worst 10 decoding trajectories w.r.t. demapper a priori mutual information in the last iteration.
Electronics 13 00425 g004
In both plots it is evident that the absolute extrinsic demapper LLR mean increases in subsequent iterations only if the received frame is the desired frame. Consequently, the pdfs of the two kinds of frames start to disjoint in a few initial iterations, so one can easily classify a given frame as desired or foreign, judging by its Λ value. (As an example, for the QPSK hypercube labeling case considered in Figure 5a, in iteration No. 13 and subsequent, there is no desired frame that exhibits Λ < 12 . At the same time, Λ for any foreign frame does not exceed 3, regardless of the iteration number.) It clearly proves that simple threshold-based decisions regarding frame destination can be error-free.

4.4. Desired Threshold Value

The promising results observed in the previous section are specific only to the given E b / N 0 considered there. To achieve full success, a more systematic approach is necessary. Therefore, let us measure FAR and MR (defined in Section 2.2) through a whole range of relevant E b / N 0 values for arbitrarily chosen threshold values ( Θ ) and for the cases of QPSK and BPSK hypercubes. Our goal is to find a threshold value (constant, if possible) for which both FAR and MR are negligibly small. FAR and MR illustrated by Figure 6 are observed in iteration 20, assuming data frame length of 10,000 (according to Figure 2b, there is no reason for running more decoding passes). In each simulation setup, 10 6 desired frames and the same number of foreign frames are simulated for statistical reliability reasons.
For both considered hypercubes, a massive MR lobe can be observed for low E b / N 0 , the occurrence of which results in limited clearance between the MR and FAR surfaces, thereby narrowing the range of optimal Θ values. However, the lobe falls in the same area where the turbo cliff can be found on the respective BER( E b / N 0 ) plots and where BER is usually considered insufficient. Thus, in practice, searching for the optimal threshold value in the turbo cliff region may be pointless.
However, the presence of the lobe does not actually prevent one from setting the optimal threshold for any E b / N 0 , as there is still enough room between MR and FAR. In fact, for Θ between, say, 4.0 and 5.0, both MR and FAR are negligibly low in the whole considered E b / N 0 range, regardless of the hypercube taken into account.
There is still one more issue to be tackled. In contrast to MR, FAR has the form of a wall that crosses the level of 10 5 at a value of Θ that gradually grows with increasing E b / N 0 . Therefore, eventually (far from the considered E b / N 0 ), FAR could appear to be unacceptably high if Θ is fixed. For this reason, the use of low-order modulations with hypercube labeling when E b / N 0 is much higher than considered here would require variable Θ . Although such a case is somewhat unrealistic, because a common practice when the channel state improves is to change the modulation order to a higher one, thereby increasing the data rate—in the light of previous contributions [4,5,10] it would also work with LABRID.

4.5. Cost Comparison

The number of different SISO decoder’s operations are specified in Table 3, where N S is the number of convolutional encoder states, n C is the number of encoded bits per one trellis segment. The decoder, first, calculates all γ components for the whole trellis (Step 1). Having obtained them, it can calculate α (Step 2) and β (Step 3) metrics for all states. Then, it can obtain the extrinsic LLRs related to codeword bits (in all but the last iteration, Step 4a) or the extrinsic LLRs for the data bits (in the last iteration, Step 4b).
In the last decoding iteration, the decoder (if launched) executes Steps 1–3 and 4b. Then, including the number of trellis segments ( K = 10,000), the coding rate ( 1 / n C = 1 / 2 ) , and the number of encoder states ( N S = 4 ), one obtains 3.3 × 10 5 additions (or subtractions), 1.6 × 10 5 multiplications, and 1.4 × 10 5 max* calculations.
In the case of LABRID, the frame filter calculates the absolute extrinsic demapper LLR mean (it costs 2 K 1 1.99 × 10 4 additions) and compares it against the threshold (1 regular max ( · , · ) operation). Division by the number of samples might be omitted if the threshold is set as a higher respective value. The regular decoding steps are executed only for desired frames, and in these cases frame filtering is an additional cost. But for each foreign frame, the receiver avoids running the decoding pass in the last iteration, which is the LABRID advantage. Actually, its efficiency depends on the number of network users, N U . The maximal number of users in a LABRID system is limited by the number of equivalent labelings (1536 for BPSK/QPSK hypercube labeling, as shown in Section 3.3).
Assuming a genie frame filter mechanism, each frame is classified correctly as a foreign or desired frame (in the light of the results from Section 4.4, the real LABRID receiver introduces just a marginal FAR and MR error in the E b / N 0 region of interest). As a consequence, the probability of running the decoding pass in the last iteration is 1 / N U . Figure 7 shows the number of operations executed in the last iteration by the conventional BICM-ID and LABRID receivers. The cost does not include the demapper routine, as it is common for the competing receivers. It can be seen that the computational complexity of the proposed LABRID mechanism declines rapidly with the number of users within a network. The number of the sum of additions and subtractions, asymptotically, meets a floor, which appears due to the need for Λ computation. The number of remaining operations continues to decline linearly on the log-scale with increasing N U , and even becomes 1000 times lower than the reference BICM-ID in the case of 1536 users of the LABRID network.
Note that the compared costs relate only to the operations in the physical layer. In the case of conservative MAC addressing, every data frame is transferred to the MAC layer, and undergoes integrity checking, which is, literally, another decoding task; it further increases the computational payload for the regular BICM-ID.

5. Conclusions

The concept of hypercube (or multidimensional) labeling has been known for a few years. It helps to overcome the problem of a weak iterative receiver convergence, observed in BICM-ID systems utilizing low-order modulations, such as BPSK or QPSK. In the current paper, another advantage of hypercube labeling has been displayed—the existence of a variety of equivalent optimal labelings which can be used within the framework of the LABRID mechanism to distinguish message recipients within the system. The number of equivalent labelings (more than 1500) is enough to address all stations in most wireless networks.
Since all equivalent labelings exhibit the same distance spectrum, the EF bounds of the LABRID system are identical to those of the regular hypercube BICM-ID system, given modulation order (BPSK or QPSK). In addition, LABRID does not favor any Tx-Rx link over the others in terms of BER for the same reason.
From the analysis of theoretical EF bounds, it is clear that the use of 4-cubes consisting of either four BPSK signals or two QPSK signals leads to a different performance in the considered scenario. Interestingly, the EF bound for the case of a BPSK hypercube lies below that for a QPSK hypercube. This is justified by the fact that the former exploits channel diversity to a higher extent—the signals of the vertex are transmitted within four (not only two) modulation periods, and in each modulation period the channel exhibits another fading gain.
Making decisions on the destination of the frame may rely on a simple threshold crossing rule. The experimental results showed that when the absolute extrinsic demapper LLR mean is checked against a constant threshold, both the false alarm ratio and the misdetection ratio place below 10 5 , regardless of the considered E b / N 0 in the region of interest. The only cost of frame filtering results from the calculation of the mean of (available) absolute extrinsic demapper LLRs. It is incomparably smaller than the price of generating LLRs relative to the data bits in the case of conservative MAC addressing for every foreign frame. LABRID wins the competition in the scenario with just two receivers in a network, but its advantage grows with the number of Rx stations.

Funding

The APC was financed with own funds of the Institute of Radiocommunications, Poznan University of Technology.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Chindapol, A.; Ritcey, J.A. Design, analysis, and performance evaluation for BICM-ID with square QAM constellations in Rayleigh fading channels. IEEE J. Sel. Areas Commun. 2001, 19, 944–957. [Google Scholar] [CrossRef]
  2. Caire, G.; Taricco, G.; Biglieri, E. Bit-interleaved coded modulation. IEEE Trans. Inf. Theory 1998, 44, 927–946. [Google Scholar] [CrossRef]
  3. Zehavi, E. 8-PSK trellis codes for a Rayleigh channel. IEEE Trans. Commun. 1992, 40, 873–884. [Google Scholar] [CrossRef]
  4. Krasicki, M. Labeling-Based Recipient Identification for 16-QAM BICM-ID. EURASIP J. Wirel. Commun. Netw. 2019, 179. [Google Scholar] [CrossRef]
  5. Krasicki, M. BICM-ID Labeling-Based Recipient Identification in a Heterogeneous Network. Sensors 2023, 23, 3605. [Google Scholar] [CrossRef] [PubMed]
  6. Zhang, J.; Chen, D.; Wang, Y. A New Constellation Shaping Method and Its Performance Evaluation in BICM-ID. In Proceedings of the 2009 IEEE 70th Vehicular Technology Conference Fall (VTC 2009-Fall), Anchorage, AK, USA, 20–23 September 2009; pp. 1–5. [Google Scholar] [CrossRef]
  7. Khoo, B.K.; Le Goff, S.; Sharif, B.; Tsimenidis, C. Bit-interleaved coded modulation with iterative decoding using constellation shaping. IEEE Trans. Commun. 2006, 54, 1517–1520. [Google Scholar] [CrossRef]
  8. Basar, E.; Wen, M.; Mesleh, R.; Renzo, M.D.; Xiao, Y.; Haas, H. Index Modulation Techniques for Next-Generation Wireless Networks. IEEE Access 2017, 5, 16693–16746. [Google Scholar] [CrossRef]
  9. Xu, C.; Xiong, Y.; Ishikawa, N.; Rajashekar, R.; Sugiura, S.; Wang, Z.; Ng, S.X.; Yang, L.L.; Hanzo, L. Space-, Time- and Frequency-Domain Index Modulation for Next-Generation Wireless: A Unified Single-/Multi-Carrier and Single-/Multi-RF MIMO Framework. IEEE Trans. Wirel. Commun. 2021, 20, 3847–3864. [Google Scholar] [CrossRef]
  10. Krasicki, M. Labeling-Based Recipient Identification for BICM-ID in 64-QAM case. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1135–1139. [Google Scholar] [CrossRef]
  11. Li, X.; Ritcey, J. Trellis-coded modulation with bit interleaving and iterative decoding. IEEE J. Sel. Areas Commun. 1999, 17, 715–724. [Google Scholar] [CrossRef]
  12. Tran, N.; Nguyen, H. Improving the performance of QPSK BICM-ID by mapping on the hypercube. In Proceedings of the IEEE 60th Vehicular Technology Conference, VTC2004-Fall, Los Angeles, CA, USA, 26–29 September 2004; Volume 2, pp. 1299–1303. [Google Scholar] [CrossRef]
  13. Tran, N.; Nguyen, H. Design and performance of BICM-ID systems with hypercube constellations. IEEE Trans. Wirel. Commun. 2006, 5, 1169–1179. [Google Scholar] [CrossRef]
  14. Simoens, F.; Wymeersch, H.; Bruneel, H.; Moeneclaey, M. Multidimensional mapping for bit-interleaved coded modulation with BPSK/QPSK signaling. IEEE Commun. Lett. 2005, 9, 453–455. [Google Scholar] [CrossRef]
  15. ten Brink, S. Convergence of iterative decoding. Electron. Lett. 1999, 35, 1117–1119. [Google Scholar] [CrossRef]
  16. Hagenauer, J. The EXIT Chart-Introduction to Extrinsic Information Transfer. In Proceedings of the 12th European Signal Processing Conference (EUSIPCO), Vienna, Austria, 6–10 September 2004; pp. 1541–1548. [Google Scholar]
  17. Benedetto, S.; Divsalar, D.; Montorsi, G.; Pollara, F. A Soft-Input Soft-Output maximum a posteriori (MAP) module to decode parallel and serial concatenated codes. TDA Prog. Rep. 1996, 42, 1–20. [Google Scholar]
  18. Robertson, P.; Villebrun, E.; Hoeher, P. A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain. In Proceedings of the IEEE International Conference on Communications ICC’95, Seattle, WA, USA, 18–22 June 1995; Volume 2, pp. 1009–1013. [Google Scholar] [CrossRef]
  19. Land, I.; Hoeher, P.; Gligorevic, S. Computation of symbol-wise mutual information in transmission systems with LogAPP decoders and application to EXIT charts. In Proceedings of the International ITG Conference on Source and Channel Coding, Erlangen, Germany, 14–16 January 2004; pp. 195–202. [Google Scholar]
  20. Biglieri, E.; Caire, G.; Taricco, G.; Ventura-Traveset, J. Computing error probabilities over fading channels: A unified approach. Eur. Trans. Telecommun. 1998, 9, 15–25. [Google Scholar] [CrossRef]
  21. Benedetto, S.; Biglieri, E. Principles of Digital Transmission with Wireless Applications; Kluwer Academic Publishers: New York, NY, USA, 1999. [Google Scholar]
  22. Schreckenbach, F.; Gortz, N.; Hagenauer, J.; Bauch, G. Optimized symbol mappings for Bit-Interleaved Coded Modulation with Iterative Decoding. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’03), San Francisco, CA, USA, 1–5 December 2003; Volume 6, pp. 3316–3320. [Google Scholar] [CrossRef]
  23. Battiti, R.; Tecchiolli, G. The reactive tabu search. ORSA J. Comput. 1994, 6, 126–140. [Google Scholar] [CrossRef]
  24. Biglieri, E.; Caire, G.; Taricco, G.; Ventura-Traveset, J. Simple method for evaluating error probabilities. Electron. Lett. 1996, 32, 191–192. [Google Scholar] [CrossRef]
Figure 1. Model of BICM-ID system employing LABRID and multidimensional labeling.
Figure 1. Model of BICM-ID system employing LABRID and multidimensional labeling.
Electronics 13 00425 g001
Figure 2. BER vs. E b / N 0 plot for different data frame sizes.
Figure 2. BER vs. E b / N 0 plot for different data frame sizes.
Electronics 13 00425 g002
Figure 3. EXIT chart at E b / N 0 = 3.4 dB ; 100,000 bits per frame.
Figure 3. EXIT chart at E b / N 0 = 3.4 dB ; 100,000 bits per frame.
Electronics 13 00425 g003
Figure 5. Growth of the absolute extrinsic demapper LLR mean through subsequent iterations.
Figure 5. Growth of the absolute extrinsic demapper LLR mean through subsequent iterations.
Electronics 13 00425 g005
Figure 6. FAR and MR vs. E b / N 0 vs. threshold applied to the frame filter.
Figure 6. FAR and MR vs. E b / N 0 vs. threshold applied to the frame filter.
Electronics 13 00425 g006
Figure 7. The number of operations of specific type executed in the last decoding pass after generation of the extrinsic demapper LLRs.
Figure 7. The number of operations of specific type executed in the last decoding pass after generation of the extrinsic demapper LLRs.
Electronics 13 00425 g007
Table 1. Collection of representative equivalent optimal hypercube labelings.
Table 1. Collection of representative equivalent optimal hypercube labelings.
c ω 1 ω 2 ω 3 ω 4 ω 5 ω 6 ω 7 ω 8 ω 9
( 1 , 1 , 1 , 1 ) 111131388888
( 1 , 1 , 1 , + 1 ) 66633155315
( 1 , 1 , + 1 , 1 ) 888813111131
( 1 , 1 , + 1 , + 1 ) 1553666666
( 1 , + 1 , 1 , 1 ) 13131114142244
( 1 , + 1 , 1 , + 1 ) 100005515153
( 1 , + 1 , + 1 , 1 ) 414141111111113
( 1 , + 1 , + 1 , + 1 ) 3355012121010
( + 1 , 1 , 1 , 1 ) 111144414142
( + 1 , 1 , 1 , + 1 ) 12121010153355
( + 1 , 1 , + 1 , 1 ) 2241113131111
( + 1 , 1 , + 1 , + 1 ) 515151510100012
( + 1 , + 1 , 1 , 1 ) 77772144214
( + 1 , + 1 , 1 , + 1 ) 01012999999
( + 1 , + 1 , + 1 , 1 ) 1442277777
( + 1 , + 1 , + 1 , + 1 ) 9991212010120
Table 2. Distance spectra for individual vertices for labeling ω 1 .
Table 2. Distance spectra for individual vertices for labeling ω 1 .
c ¬ m ( + 1 , + 1 , 1 , + 1 ) ( 1 , 1 , 1 , 1 ) ( + 1 , 1 , + 1 , 1 ) ( 1 , + 1 , + 1 , + 1 ) ( 1 , + 1 , + 1 , 1 ) ( + 1 , 1 , + 1 , + 1 ) ( 1 , 1 , 1 , + 1 ) ( + 1 , + 1 , 1 , 1 ) ( 1 , 1 , + 1 , 1 ) ( + 1 , + 1 , + 1 , + 1 ) ( 1 , + 1 , 1 , + 1 ) ( + 1 , 1 , 1 , 1 ) ( + 1 , 1 , 1 , + 1 ) ( 1 , + 1 , 1 , 1 ) ( + 1 , + 1 , + 1 , 1 ) ( 1 , 1 , + 1 , + 1 )
v ¬ m (0000)(0001)(0010)(0011)(0100)(0101)(0110)(0111)(1000)(1001)(1010)(1011)(1100)(1101)(1110)(1111)
c identifier v
( + 1 , + 1 , 1 , + 1 ) 0(0000) 1212 12 16
( 1 , 1 , 1 , 1 ) 1(0001)12 12 12 16
( + 1 , 1 , + 1 , 1 ) 2(0010)12 12 12 16
( 1 , + 1 , + 1 , + 1 ) 3(0011) 1212 12 16
( 1 , + 1 , + 1 , 1 ) 4(0100)12 1212 16
( + 1 , 1 , + 1 , + 1 ) 5(0101) 12 12 12 16
( 1 , 1 , 1 , + 1 ) 6(0110) 12 12 12 16
( + 1 , + 1 , 1 , 1 ) 7(0111) 12 1212 16
( 1 , 1 , + 1 , 1 ) 8(1000)16 1212 12
( + 1 , + 1 , + 1 , + 1 ) 9(1001) 16 12 12 12
( 1 , + 1 , 1 , + 1 ) 10(1010) 16 12 12 12
( + 1 , 1 , 1 , 1 ) 11(1011) 16 1212 12
( + 1 , 1 , 1 , + 1 ) 12(1100) 16 12 1212
( 1 , + 1 , 1 , 1 ) 13(1101) 16 12 12 12
( + 1 , + 1 , + 1 , 1 ) 14(1110) 16 12 12 12
( 1 , 1 , + 1 , + 1 ) 15(1111) 16 12 1212
Table 3. Complexity analysis of additive SISO decoder per trellis segment per iteration.
Table 3. Complexity analysis of additive SISO decoder per trellis segment per iteration.
ElementRef. EquationAdditions/Sub.MultiplicationsMax* Operations
Step 1 ( γ costs)(9) 2 N S · ( n C 1 ) 2 N S n C 0
Step 2 ( α metrics)(10) N S 0 N S
Step 3 ( β metrics)(11) N S 0 N S
Step 4a (LLRs for codeword bits)(12) 2 N S · 2 + 2 0 2 ( N S 1 )
Step 4b (LLRs for data bits)(15) 2 N S · 2 + 1 0 2 ( N S 1 )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Krasicki, M. Labeling-Based Recipient Identification with Low-Order Modulation. Electronics 2024, 13, 425. https://doi.org/10.3390/electronics13020425

AMA Style

Krasicki M. Labeling-Based Recipient Identification with Low-Order Modulation. Electronics. 2024; 13(2):425. https://doi.org/10.3390/electronics13020425

Chicago/Turabian Style

Krasicki, Maciej. 2024. "Labeling-Based Recipient Identification with Low-Order Modulation" Electronics 13, no. 2: 425. https://doi.org/10.3390/electronics13020425

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop