Binary Diversity for Non-Binary LDPC Codes over the Rayleigh Channel

Binary Diversity for Non-Binary LDPC Codes over the Rayleigh Channel

Matteo Gorgoglione, Valentin Savin, David Declercq CEA-LETI, Minatec Campus, Grenoble, France {matteo.gorgoglione, valentin.savin}
ETIS, ENSEA Univ. Cergy-Pontoise/CNRS, Cergy-Pontoise, France,

In this paper we analyze the performance of several bit-interleaving strategies applied to Non-Binary Low-Density Parity-Check (LDPC) codes over the Rayleigh fading channel. The technique of bit-interleaving used over fading channel introduces diversity which could provide important gains in terms of frame error probability and detection.

This paper demonstrates the importance of the way of implementing the bit-interleaving, and proposes a design of an optimized bit-interleaver inspired from the Progressive Edge Growth algorithm. This optimization algorithm depends on the topological structure of a given LDPC code and can also be applied to any degree distribution and code realization.

In particular, we focus on non-binary LDPC codes based on graph with constant symbol-node connection . These regular -NB-LDPC codes demonstrate best performance, thanks to their large girths and improved decoding thresholds growing with the order of Finite Field. Simulations show excellent results of the proposed interleaving technique compared to the random interleaver as well as to the system without interleaver.

Index Terms Non-binary LDPC codes, bit-interleaver, Rayleigh fading channel, Tanner Graph.

I Introduction

Since their rediscovery by MacKay [1] in 1996, Low-Density Parity-Check codes have attracted a lot of attention because they exhibit rates close to the Shannon capacity [2] for many transmission channels, despite their low decoding complexity. With the evolution of the technology, new families of LDPC codes defined on non-binary alphabets have been proposed and studied. They demonstrate better performance with respect to the binary case, especially for moderate code lengths [3] but at the expense of more complex decoding architectures.

Non-binary LDPC codes can be defined by considering a non-binary alphabet , which for practical reasons is often considered to be endowed with a vector-space structure over the binary field , and a semigroup acting on . A non-binary code of length is hence defined as the set of solutions of a linear system , where is a matrix with coefficients in , referred to as the parity-check matrix of the code.

LDPC codes are decoded using the belief propagation (BP) algorithm based on an iterative exchange of messages between nodes [4, 5].

The case of codes for which the underlying bipartite graph is ultra-sparse, in the sense that each symbol-node is connected to exactly linear constraint-nodes, is of particular interest. First, very large girths can be obtained for Tanner graphs with , as demonstrated in [6], [7]. It has also been pointed out [8], [3] that when the size of the non-binary alphabet grows, best decoding thresholds are obtained for average density of edges closer and closer to . Practically, for NB-LDPC codes defined over Galois fields with , best codes, both asymptotically and at finite lengths, are ultra-sparse codes. Despite those advantages, the ultra-sparse LDPC codes in suffer from a serious drawback, as their minimum distance is limited and grows at best as [9]. This limitation is however not critical when the desired error rate is above , which is the case of the wireless transmissions that we target in this paper.

Radio channels in multipath environments, such as mobile or indoor contexts, can be modeled by a Rayleigh distributed fading [10]. A classical way to fight against the fading effects of Rayleigh model is to introduce binary diversity by the mean of a bit-interleaver at the transmitter side. Such interleaver that operates between the encoder and the symbol mapper (see Fig. 1) drastically improves error rates in most of situations involving a fading channel.

In this paper, we demonstrate that in the case we make use of NB-LDPC codes for the forward error correction, the bit-interleaver is still of great importance to reach good performance, and moreover, we show that the performance are even better when the bit-interleaver is well fitted to the NB-LDPC code structure. The proposed optimized interleaving algorithm is inspired from the Progressive Edge Growth algorithm, and associates the consecutive channel bits to the most separated symbol-nodes.

The rest of the paper is organized as follows. A brief introduction of the NB-LDPC codes and the channel model are discussed in Section II. In Section III the interleaving algorithm is presented. Performance analysis are shown in Section IV. Finally, Section V concludes the paper.

Ii Background and Notation

Ii-a NB-LDPC codes over

We consider a non-binary alphabet with elements. We fix once for all the isomorphism:

Elements of are called symbols, and their images under the above isomorphism are called binary images. A non-binary LDPC code over is defined as the kernel of a sparse matrix . Thus, each codeword composed of symbols, represents the solution of the linear system .

Associated with the matrix H is the Tanner Graph [11], which is constituted by N symbol-nodes on the top, representing the coded symbols, and M constraint-nodes on the bottom, representing, with the labeled edges, the linear constraints between these symbols (see Fig. 2). Each incident edge from symbol-node to constraint-node corresponds to a non-zero entry .

We define node degree as the number of incident edges into such a node. In particular, indicates the variable node degree, whereas indicates the constraint-node degree. In Fig. 2 a Tanner graph for a (2,4)-regular code is represented in which all the symbol-nodes are of degree and all the constraint-nodes are of degree .

Fig. 1: Transmission Chain

Ii-B Modulation and Channel Model

In this paper, we assume a Rayleigh channel model, typical of a mobile/multipath environment. Therefore, the envelope of the channel response follows this distribution:

and the received symbol is:

where stands for the th transmitted modulated symbol scaled by i.i.d. Rayleigh factors , and is the Additive White Gaussian Noise with variance .

The symbols are modulated by a -QAM constellation in which each mapped symbol is associated to bits; we denote by the number of modulated symbols.

Ii-C Belief Propagation Decoding

The Belief Propagation (BP) decoder [12] is based on an iterative message-passing algorithm. For non-binary LDPC codes, the extrinsic messages that circulate on the graph are multidimensional messages (i.e. vectors).

The initialization messages are Likelihood probability weights, dependent on the channel statistics. For NB-LDPC codes, the decoder input consists of Likelihood vectors , where denotes the th transmitted symbol, .

In the case the order of the constellation and the order of the coded symbols match, the Likelihood vectors are directly derived from the demapped symbols. On the contrary, when a de-interleaver is placed before the decoder, the demapper performs a marginalization to transform the symbol likelihoods into bit-wise likelihoods, inducing a performance loss due to the marginalization. Nevertheless, the loss of information due to marginalization is counterbalanced by the gain that the bit-interleaver brings in the case of fading channels. We show in the result section that the diversity gain surpasses greatly the loss due to marginalization both in the waterfall and in the error floor regions.

Now let us present in short the non-binary decoder equations. Let denotes the probability that a random variable takes on value . A message exchanged between a symbol-node and a check-node is a probability vector of size :

of a random variable .

Let be the message from symbol-node to an adjacent check-node and be the message from a check-node to an adjacent symbol-node . With we indicate the channel likelihood for the symbol-node .

Consider a transmitted codeword of an LDPC code . The decoder aims to detect a codeword . The decoding process is generally composed by two half-iterations: i) update of symbol-node messages , taking into account the check-node messages and the channel realizations , ii) update of check-node messages taking into account the symbol-node messages . At the end of each iteration, the decoder computes the symbol probabilities relative to each symbol-node in order to make a decision about .

Usually, one makes the decoder stop in two situations: i) a maximum number of iterations is reached, then is computed from the messages at the last iteration, or ii) the syndrome is verified , and a codeword is identified.

A detected error happens if does not belong to the codeword set. If belongs to the codeword set but it is not the transmitted codeword, the decoder makes an undetected error. Undetected errors are due to codewords with a low Hamming weight, which is one the weaknesses of the considered -NB-LDPC codes. We will make in section IV a detailed study of the percentages of detected and un-detected errors in each interleaving situation.

Fig. 2: Non-Binary LDPC codes - Tanner Graph

Finally, we discuss the computation of the input Likelihood messages in each of the considered cases. Let be the vector of received symbols and be the Likelihood messages at the inputs of symbol-nodes. In the case of and no bit-interleaver, there exists a one-to-one correspondence between the modulated and coded symbols:

The other case corresponds to the use of a bit-interleaver, or when the size of the constellation does not match the size of the coded symbols (). In such a case, an intermediate operation is used to transform the Likelihoods between the bits of the mapped symbols and the bits of the coded symbols:

where contains the received bits. These bits are grouped in vectors of bits in order to obtain the messages which compose . In the rest of the paper, we consider only the case where , so that the latter marginalization transformation is used only when a bit-interleaver is employed.

Iii Interleaving algorithm

The effect of a bit-interleaver is to spread the coded bits in different modulation symbols, such that these bits composing a single coded symbol are affected by different fading factors. The advantage of using an interleaver is that the deep fading effects on the received bits are mitigated by the fact that those bits are distributed among the codewords after the de-interleaver.

The bit-interleaver can be seen as the construction of a superimposed regular -bipartite graph (from now on called simply interleaving graph) on the Tanner Graph. It connects the modulation-nodes to the symbol-nodes of a pre-designed Tanner Graph. The modulation-nodes are another type of nodes representing the modulated symbols in the interleaving graph.

In the interleaving graph, edges connect modulation symbol-nodes to coded symbol-nodes (see Fig. 3). In this part of the graph, denotes the modulation symbol degree, while denotes the coded symbol degree. To simplify the study, we can assume that each modulation symbol has constant modulation-node degree and that each coded symbol has constant interleaving symbol-node degree .

Of course, since the number of coded bits can be computed either as the number of bits within the coded-symbols , or as the number of bits within the modulated-symbols , we have that .

Fig. 3: Global graph

Fig. 3 shows an example of a superimposed interleaving graph on the Tanner graph of Fig. 2. The interleaver is represented as a block denoted as , with edges for each modulation-node and edges for each coded symbol-node.

Therefore, the aim of the a bit-interleaving design is to look for an interleaving pattern that contains the scrambled bit positions in the interleaving graph (upper part of the graph in the Fig. 3).

Though random interleaving shows already good performance as demonstrated in the section IV, we have devised an algorithm to optimize the interleaver design, which even more improves the performance, especially in the error-floor region. The bit-interleaver optimization algorithm is presented in the next section.

Iii-a PEG Optimization Interleaving

Our bit-interleaver design is inspired from the Progressive Edge-Growth (PEG) method [6] used for constructing Tanner graphs with large girths that progressively connects symbols and constraint-nodes. For this reason, from now on, our optimization algorithm will be identified as PEG interleaving algorithm.

The PEG interleaving algorithm is efficient for creating good connections between the modulation and the symbol-nodes in a best effort way. Good connections are meant to give the largest possible girth to both the LDPC Tanner graph and the interleaving graph. Starting with the knowledge of , and the LDPC Tanner graph topology, the algorithm connects each modulation-node to symbol-nodes. The rationale behind the optimization algorithm is to find, for each modulation-node, the most distant coded symbol-nodes (from a topological distance point of view), and therefore to build connections in the interleaving graph which results in the best girth. It should also be noted that the bit-interleaver design is code-dependent. As a matter of fact, the girth computation during the interleaver design takes into account the topology of the already designed NB-LDPC code . It results in particular that the bit-interleaver built with our algorithm is actually matched to a particular NB-LDPC code, which explains the further performance gains that we observe.

We now explain the principles of the PEG interleaving algorithm. Recall that denotes the coded symbol-node degree and denotes the modulation-node degree. Before the algorithm starts, all the degrees are set to . During the algorithm execution, the current node degrees represent the number of established connections for the nodes. Thus, for a coded symbol-node , , the degree range is ; for a modulation-node , , the degree range is .

Let be a modulation-node to be connected. The PEG interleaving algorithm chooses the first connection between and . is a randomly chosen symbol-node among the available ones with the lowest current degree. Then, we expand both the Tanner and the interleaving graphs through the three types of nodes taking into account the new connection. Once the graph expansion is complete, the bottom of this graph is the set of symbol-nodes that are the most distant symbol-nodes from . Hence, the algorithm can connect the modulation-node to one of the coded symbol-node with the lowest degree. A new connection is thereby chosen, and the algorithm goes to the next edge selection, by performing the same steps - graph expansion and node selection. The procedure is iterated until it reaches the correct degree . The algorithm stops when all the modulation-nodes are connected.

Note that with this PEG interleaving algorithm, only the coded symbol index is important for the global girth of the graph, and not the location of the bit inside the coded symbol binary map. Actually, an extra local scrambler could be added — at the coded symbol level — without impacting the girth of the global graph. In our simulations, however, this extra local scrambler did not impact significantly on the error rate performance.

Although the above described construction could be adapted to any NB-LDPC code, including codes with irregular node distributions, we restricted our study to regular (2,)-LDPC codes. For these codes, the error rate simulation results and the study of detected vs. undetected errors are conducted in the next section.

Fig. 4: Frame Error Rates for (2,6) and (2,12) NB-LDPC codes, , , -QAM
Fig. 5: Frame Error Rates for (2,6) and (2,12) NB-LDPC codes, , , -QAM

Iv Simulation Results

In this section, we present the simulation results for the bit-interleaved and not bit-interleaved NB-LDPC codes. Motivated by the good asymptotical thresholds that grows with the order field, we have focused on LDPC code alphabets and . It has been shown that, for those high orders, the ultra-sparse NB-LDPC codes with node degree is the best choice. We have therefore simulated LDPC codes for those two different alphabets and two different coding rates: i) (2,6)-NB-LDPC codes corresponding to a rate and ii) (2,12)-NB-LDPC codes corresponding to a rate . These NB-LDPC code Tanner graphs are designed with PEG method [6] (minimum girth ) and decoded by using a Belief-propagation decoder [5]. As said in the previous section, the size of the alphabet is the same of the size of modulation constellation: codes defined over are transmitted using the -QAM modulation, whereas codes defined over are transmitted using the -QAM modulation.

Each LDPC code is simulated on the Rayleigh fading channel with three possible transmission systems: first, a non-interleaved system with direct mapping from the modulation to the coded symbols, then with a random bit-interleaver and finally with our PEG-optimized interleaver.

The curves in Fig. 4 represent the Frame Error Rates (FER) of the considered (2,)-LDPC codes defined over for small codewords ( bits, coded symbols) modulated with a -QAM. A significant performance gain can be observed both in the waterfall and in the error floor regions in the presence of a bit-interleaver. This shows that the diversity gain brought by the bit-interleaving surpasses greatly the information loss due to symbol-to-bit marginalization.

As expected, the PEG interleaved system (represented by ) achieves roughly the same gain as random interleaving (represented by ) in the waterfall region, but shows also an improved error-floor. This was our goal of building bit-interleavers that optimize the girth of the global graph.

In Fig. 5 we show the performance of the codes defined over with codelength ( coded symbols) and modulated with a -QAM. As can be seen, when the size of alphabet grows, bit-interleavers still gain in the error floor region, but the gap between the two kinds of interleavers vanishes. Now, let us discuss the effect of bit-interleaving and our optimized construction for the detection of frame errors. We have drawn in Fig. 6 and  7 the percentage of detected frame errors with respect to the FER, for the (2,6)-LDPC codes defined respectively in and in .

Although it was expected, this study confirms that the better performance in the error floor region results from a better detection of frame errors. More precisely, bit-interleaving on a Rayleigh channel helps the decoder to avoid convergence to low-weight codewords, therefore improving at the same time the performance and the probability of error detection. This last feature is very interesting since in most wireless mobile transmissions, a link adaptation strategy implementing retransmission of detected wrong frames is generally used (ARQ or Hybrid-ARQ).

Note that even in the case of codes in , our bit-interleaving optimization shows an interesting gain in detected frame errors ( for all FER simulated) compared to the random-interleavers, although the error rates were the same (see Fig. 5).

Fig. 6: Percentage of detected frame errors for a (2,6)-regular NB-LDPC code, , , -QAM

V Conclusions

In this paper we investigate the non-binary LDPC codes transmitted over a Rayleigh fading channel. Since modulated symbols can be affected by different fading factors, deep fading could make some codeword symbols totally unrecoverable in case of one-to-one correspondence between modulated and coded symbols, leading to a poor system performance.

In order to avoid this phenomenon, binary diversity can be exploited by using a bit-interleaver module placed between the encoder and the modulator. A random interleaver and an optimized interleaver have been analyzed by running simulations over short size regular -LDPC codes.

The optimized interleaving algorithm is inspired from the Progressive Edge Growth (PEG) method and it ensures maximum girth of the global graph. Although the bit demapping needed in the interleaved leads to information loss, it has been demonstrated that the use of the interleaves ensures improved frame-error probabilities compared to a system without it. Additionally, in all considered cases, the optimized interleaver showed an even better gain with respect to the random interleaver, as far as performance and error detection rates are concerned.

Fig. 7: Percentage of detected error frames for a (2,6)-regular NB-LDPC code, , , -QAM


  • [1] D. J. C. MacKay and R. M. Neal, "Near Shannon limit performance of low density parity check codes," Electronics Letters, vol.32, no.18, pp. 1645-1646, August 1996, Reprinted Electronics Letters, vol 33, no. 6, March 1997, 457-458.
  • [2] T. Richardson, M.A. Shokrollahi and R. Urbanke, "Design of Capacity-Approaching irregular Low-Density Parity-Check codes", IEEE Trans. Inform. Theory, vol 47, no. 2, pp. 619-637, Feb. 2001.
  • [3] M. Davey and D. J. C. MacKay, "Low Density Parity Check Codes over GF(q)", IEEE Commun. Lett., vol. 2, pp. 165-167, June 1998.
  • [4] R. G. Gallager, "Low-density Parity-Check Codes", IRE Transaction on Information Theory.
  • [5] D. Declercq and M. Fossorier, "Decoding algorithms fon nonbinary LDPC codes over GF(q)," IEEE Trans. on Comm., vol.55, no. 4, April 2007.
  • [6] X.-Y. Hu, E. Eleftheriou, and D. M. Arnold, Regular and irregular progressive edge-growth tanner graph, IEEE Trans. Inform. Theory, vol 51, no. 1, pp. 386-398, Jan. 2005.
  • [7] A. Venkiah, D. Declercq and C. Poulliat, "Design of cages with a randomized progressive edge growth algorithm," IEEE Commun. Letters, vol. 12, no. 4, pp. 301-303, April 2008.
  • [8] L. Sassatelli and D. Declercq, "Non-binary hybrid LDPC codes," in IEEE Trans. Info. Theo., vol. 56, no. 10, pp. 1069-1074, Dec. 2005.
  • [9] C. Poulliat, M. Fossorier and D. Declercq, "Design of regular (2, )-LDPC codes over GF(q) using binary images", IEEE Trans. Commun., vol.56, no. 10, pp. 1626-1635, October 2008.
  • [10] L. H. Ozarow, S. Shamai and A. D. Wyner, "Information theoretic considerations for cellular mobile radio," IEEE Trans. on Vehicular Tech., vol. 43, no. 2, pp. 359-378, May 1994.
  • [11] R. M. Tanner, "A recursive approach to low complexity codes", IEEE Trans. Inf. Theory, vol. IT-27, no. 9, pp. 533-548, Sep. 1981.
  • [12] N. Wiberg, "Codes and decoding on general graphs," Ph.D. dissertation, Linköping Univ., Linköping, Sweden, 1996.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
Add comment
Loading ...
This is a comment super asjknd jkasnjk adsnkj
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test description