Analysis and Design of Tree Based Interleaver

4
Analysis and Design of Tree Based Interleaver for Multiuser Receivers in IDMA Scheme M. Shukla V.K. Srivastava S. Tiwari Dept. of Electronics Engg. Dept. of Electronics & Comm. Engg. Dept. of Electronics & Comm. Engg. H.B.Technological Institute M.N. National Institute of Technology M.N. National Institute of Technology Kanpur, India Allahabad, India Allahabad, India  Abstract- Here, we propose a novel Tree Based Interleaver (TBI) for generating user specific chip-level interleaving sequences for various users in an IDMA system, which reduces computational complexity drastically. This interleaver also solves the memory cost problem and reduces the amount of information exchange between mobile stations and base stations required to specify the interleaver. Simulation results are presented to show that the proposed TBI perform well as compared to Master Random and Random Interleavers in an IDMA scheme. I. I  NTRODUCTION Interleave division multiple access (IDMA) is a technique where interleaving is the only means for user separation. IDMA not only inherits many advantages in comparison to conventional CDMA, such as robustness against fading and mitigation of cross-cell interference, but also allows very simple chip-by-chip (CBC), iterative multiuser detection (MUD) strategy while achieving impressive performance. In [1], an IDMA system that uses randomly and independently generated interleavers is presented. The IDMA system with random interleaver [1] performs better than a comparable CDMA system with random interleaver. In case, the user specific interleavers are generated independently and randomly, the base station (BS) has to use a large amount of memory to store these interleavers as they are required at transmitter and receiver for interleaving and deinterleaving purpose. It may cause serious concern, when the numbers of users is large. In [4], the method for generation of PEG interleaver is merely using an algorithm to generate the sequence of random interleavers, orthogonal in nature, instead of random selection of respective interleavers [1]. Therefore, the problem of memory requirement is still present for high number of users. If the user specific interleavers are generated by master random interleaver method [2], then problem of high memory requirement is reduced, but the computational complexity required to generate the interleaving sequence is increased extensively, especially when the number of users is large. It is also an important point to mention that in the turbo processor, at the receiver section, frequent interleaving and deinterleaving is required during the process of iterative decoding. Therefore, large amount of calculations are required in receiver section and hence, the computational complexity is increased drastically when number of users is high. Here, we are examining the proposed Tree Based Interleaver (TBI) to alleviate this concern. With this method, not only the interleaver assignment scheme is simplified and memory cost is greatly reduced, but also the computational complexity required to generate the interleaving matrix is greatly reduced without sacrificing the performance. In Section 2, an introduction to IDMA system is presented. In section 3, we have a brief look over master random interleaver generation method discussed in [2], and explain the computational complexity and memory requirement factors of the interleaver generation methods. Section 4 presents Tree Based Interleaver (TBI) that reduces both the computational complexity and memory requirement factors for interleavers in IDMA scheme. Section 5 presents computer simulations of IDMA systems with the Tree Based Interleaver (TBI). Section 6 concludes the paper. II. IDMA SCHEME  A. Scheme Model Here, we consider an IDMA system [1], shown in Figure 1, with  K  simultaneous users using a single path channel. At the transmitter, a N-length input data sequence d k = [d k (1), ………, d k (i) , … d k (N) ] T  of user k is encoded into c k = [c k (1), ………, c k (j) , … c k (J) ] T  based on low rate code C , where J is the Chip length. In encoder-spreader block,  the code C is constructed by serially concatenating a forward error correction (FEC) code and repletion code of length-  sl . The FEC code used here is Memory-2 Rate-1/2 Convolutional coder. We may call the elements in c  k ‘chips’. Then c  k is interleaved by a chip level interleaver ‘Π k ’,  producing a transmitted chip sequence x k = [x k (1), ……,x k (j) , … x k (J) ] T  . After transmitting through the channel, the bits are seen at the receiver side as r = [r k (1), ……,r k (j) , … r k (J) ] T  . The Channel opted is additive white Gaussian noise (AWGN) channel, for simulation purpose. In receiver section, after chip matched filtering, the received signal form the K users can be written as 1 k  = () () () , 1, 2, ....... .  K k k r j h x j n j j J  = + =  (1) 978-1-4244-3805-1/08/$25.00 ©2008 IEEE ICON 2008

Transcript of Analysis and Design of Tree Based Interleaver

Page 1: Analysis and Design of Tree Based Interleaver

7/27/2019 Analysis and Design of Tree Based Interleaver

http://slidepdf.com/reader/full/analysis-and-design-of-tree-based-interleaver 1/4

Analysis and Design of Tree Based Interleaver forMultiuser Receivers in IDMA Scheme 

M. Shukla V.K. Srivastava S. TiwariDept. of Electronics Engg. Dept. of Electronics & Comm. Engg. Dept. of Electronics & Comm. Engg.H.B.Technological Institute M.N. National Institute of Technology M.N. National Institute of Technology

Kanpur, India Allahabad, India Allahabad, India

 Abstract-Here, we propose a novel Tree Based Interleaver (TBI)for generating user specific chip-level interleaving sequences forvarious users in an IDMA system, which reduces computationalcomplexity drastically. This interleaver also solves the memorycost problem and reduces the amount of information exchangebetween mobile stations and base stations required to specify theinterleaver. Simulation results are presented to show that theproposed TBI perform well as compared to Master Random and

Random Interleavers in an IDMA scheme.

I.  I NTRODUCTION 

Interleave division multiple access (IDMA) is a technique

where interleaving is the only means for user separation.

IDMA not only inherits many advantages in comparison to

conventional CDMA, such as robustness against fading and

mitigation of cross-cell interference, but also allows very

simple chip-by-chip (CBC), iterative multiuser detection

(MUD) strategy while achieving impressive performance. In

[1], an IDMA system that uses randomly and independently

generated interleavers is presented. The IDMA system with

random interleaver [1] performs better than a comparable

CDMA system with random interleaver.In case, the user specific interleavers are generated

independently and randomly, the base station (BS) has to use a

large amount of memory to store these interleavers as they are

required at transmitter and receiver for interleaving and

deinterleaving purpose. It may cause serious concern, when the

numbers of users is large.

In [4], the method for generation of PEG interleaver is

merely using an algorithm to generate the sequence of random

interleavers, orthogonal in nature, instead of random selection

of respective interleavers [1]. Therefore, the problem of

memory requirement is still present for high number of users.

If the user specific interleavers are generated by master

random interleaver method [2], then problem of high memory

requirement is reduced, but the computational complexity

required to generate the interleaving sequence is increased

extensively, especially when the number of users is large. It is

also an important point to mention that in the turbo processor,

at the receiver section, frequent interleaving and deinterleaving

is required during the process of iterative decoding. Therefore,

large amount of calculations are required in receiver section

and hence, the computational complexity is increased

drastically when number of users is high.

Here, we are examining the proposed Tree Based Interleaver

(TBI) to alleviate this concern. With this method, not only the

interleaver assignment scheme is simplified and memory cost

is greatly reduced, but also the computational complexity

required to generate the interleaving matrix is greatly reduced

without sacrificing the performance.In Section 2, an introduction to IDMA system is presented.

In section 3, we have a brief look over master random

interleaver generation method discussed in [2], and explain the

computational complexity and memory requirement factors of

the interleaver generation methods. Section 4 presents Tree

Based Interleaver (TBI) that reduces both the computational

complexity and memory requirement factors for interleavers in

IDMA scheme. Section 5 presents computer simulations of

IDMA systems with the Tree Based Interleaver (TBI). Section

6 concludes the paper.

II. 

IDMA SCHEME A.  Scheme Model

Here, we consider an IDMA system [1], shown in Figure 1,

with  K  simultaneous users using a single path channel. At the

transmitter, a N-length input data sequence d k = [d k (1),

………, d k (i) , … d k (N) ]T of user k is encoded into c k = [c k

(1), ………, c k (j) , … c k (J) ]T  based on low rate code C ,

where J is the Chip length.

In encoder-spreader block,  the code C is constructed by

serially concatenating a forward error correction (FEC) code

and repletion code of length- sl . The FEC code used here is

Memory-2 Rate-1/2 Convolutional coder. We may call the

elements in c k ‘chips’.

Then c  k is interleaved by a chip level interleaver ‘Πk ’,

 producing a transmitted chip sequence x k = [x k (1), ……,x k (j)

, … x k (J) ]T . After transmitting through the channel, the bits

are seen at the receiver side as r = [r k (1), ……,r k (j) , … r k (J)

]T  . The Channel opted is additive white Gaussian noise

(AWGN) channel, for simulation purpose.

In receiver section, after chip matched filtering, the received

signal form the K users can be written as

1k  =

( ) ( ) ( ), 1, 2, ....... . K 

k k r j h x j n j j J  = + =∑   (1)

978-1-4244-3805-1/08/$25.00 ©2008 IEEE ICON 2008

Page 2: Analysis and Design of Tree Based Interleaver

7/27/2019 Analysis and Design of Tree Based Interleaver

http://slidepdf.com/reader/full/analysis-and-design-of-tree-based-interleaver 2/4

where h  k   is the channel coefficient for user and

{ } are the samples of an additive white Gaussian noise

(AWGN) process with mean as zero and variance σ 2 = N 0 / 2.

An assumption is made that {h  k } are known priori at the

receiver.

thk ( )n j

 Figure 1. Transmitter and Receiver structures of IDMA scheme with K  

simultaneous users.

The receiver consists of a signal estimator block (SEB) and a

 bank of  K single user a  posteriori probability (APP) decoders

(DECs), operating in an iterative manner. The modulation

technique used for simulation is binary phase shift keying

(BPSK) signaling. The outputs of the SEB and DECs are

extrinsic log-likelihood ratios (LLRs) about {x k } defined as

( / ( ) 1)( ( )) log , , .

( / ( ) 1)k 

 p y x je x j k j

 p y x j

⎛ ⎞= += ∀⎜

= −⎝ ⎠⎟   (2)

These LLRs are further distinguished by the

subscripts i.e., and , dependingupon whether they are generated by SEB or DECs.

( ( ))SEB k  e x j ( ( )) DEC k e x j

Due to the use random interleavers {Π k }, the SEB operation

can be carried out in a chip-by-chip manner, with only one

sample r(j) used at a time. So, rewriting (2) as

( ) ( ) ( )k k k r j h x j jζ = +   (3)

where

' '

'

( ) ( ) ( ) ( ) ( )k k k  k k k k 

 j r j h x j h x j n jζ ≠

= − = +∑   (4)

is the distortion in r( j) with respect to user-k.

 B.   Algorithm for Chip-by-Chip Detection

A brief description of CBC algorithm [1] has been presentedhere. The operations of SEB and APP decoding are carried out

user-by-user.

 Algorithm for Chip-by Chip Detection in a single path

Channel:

 Step (i):

Set

Then( ( )) ( ( ))k k 

 E r j h E x j⇐ ∑ 

2 2( ( )) ( ( ))k k 

Var r j h Var x j   σ = +∑  

,

2

( ( )) ( ( )) ( ( ))

( ( )) ( ( )) ( ( ))

k l k k  

k k 

 E j E r j h E x j

Var j Var r j h Var x j

ξ 

ξ 

= −

= −k 

( )k   jξ    is the distortion (including interference-plus-noise)

in received signal with respect to user-k.

Step (ii): Process for LLR Generation:

Step (iii): Process for updating of data:

 Now, these steps are repeated depending on no. of iterationsand users.

III.  MASTER R ANDOM I NTERLEAVER GENERATION METHOD 

In an IDMA scheme, each user has a user specific

interleaver {Π  k } having length equal to chiplength ‘J’.

Therefore, a considerable amount of memory will be required

to store the indexes for these interleavers.

To minimize this memory cost problem, a master random

er method is proposed in [2]. In this paper, a master

interleaver Φ  is taken, and the subsequent k-interleavers are

generated using Π k  = Φk .

interleav

 where Φk 

(c) is defined as Φ1(c)= Φ(c).

Φ2(c) = Φ ( Φ(c)).

where Φ  is an ideal random permutation.

This method not only reduces the amount of information

exchange between Base Station (BS) and Mobile Stations

(MSs), but also greatly reduces the memory cost in comparison

to random interleaver.

In generation of interleaver, if the intermediate variables like

Φ2 , (Φ2 )  2, are not stored, then for generating the interleaving

sequence for the k th user , (k-1) cycles are needed. Even if the

intermediate values are stored as stated in the paper [2], it is

mentioned that a maximum of 2(n-1) cycles are needed for

generating the required interleaver, if 2 n-1 <k<2 n , where n>1is an integer . 

In this paper, we examine a Tree Based Interleaver (TBI) to

alleviate this concern.

IV.  TREE BASED I NTERLEAVER  

The Tree Based Interleaver is basically aimed to minimize

the computational complexity and memory requirement that( ( ) )e x j   = 0

 D E C k 

2

( ) ( ( )) ( ( ))( ( )) 2 .

( ) ( ( ))

k k SEB k k  

 j k k 

r j E r j h E x je x j h

Var r h Var x j

− +=

1

( ( ( ))) ( ( ( )))S 

 DEC k SEB k 

 j

e x j e x jπ π =

= ∑1,..., j S =

Page 3: Analysis and Design of Tree Based Interleaver

7/27/2019 Analysis and Design of Tree Based Interleaver

http://slidepdf.com/reader/full/analysis-and-design-of-tree-based-interleaver 3/4

occurs in power interleaver and random interleavers

respectively.

In a Tree Based Interleaver generation, two randomly

generated interleavers are chosen, let Π  1  and Π  2 is the two

randomly selected interleavers. These interleavers are tested to

have zero cross correlation between each other. The

combinations of these two interleavers in a particular manner

as shown in the figure 2 are used as interleaving masks for the

users.The allocations of the interleaving masks follow the tree

format. The interleaving masking diagram is shown upon

fourteen users only for the shake of simplicity. It is shown

through the figure that, for obtaining the interleaving sequence

of the 14th user, it needs only 2 cycles of clock, as compared to

many more cycles needed in case of master random interleaver

method.

Π 14 = Π 2 (  Π 2 ( Π 2 )).

The memory required by the Tree Based Interleaver

generation method is only slightly more than that required for

master random interleaver generation method [2] due to

requirement of two orthogonal interleavers in place of oneinterleaver [2].

The Tree Based Interleaving scheme reduces the

computational complexity that occurs in the power interleaving

scheme. It is shown by the help of a table below. The results in

the figure 3 are shown if the intermediate variables are not

stored.

The mechanism involved in generation of tree based user

specific interleavers is shown in figure 2. The two randomly

selected interleavers are solely responsible for generation of

other interleavers related to other users.

Figure 2. Interleaving Figure mask allocation for the proposed Tree BasedInterleaving scheme.

The Tree Based Interleaving scheme is extremely

efficient for reduction of computational complexity as

compared to that in Master Random Interleaving scheme [2] as

shown in figure 1.

The algorithm for tree based interleaver is based on selection

of combination of two master interleavers which are having

zero cross correlation between them. The odd number of users

is taken upside while even number of users is taken downside

as shown in figure 2. In this manner, large number of users

may be allocated with user specific interleavers with extremely

less complexity.

0 10 20 30 40 50 60 70 80 90 1000

10

20

30

40

50

60

70

80

90

100

User Number 

    C   o   m

   p   l   e   x   i   t   y

   o    f   i   n   t   e   r   l   e   a   v   e   r    (   N   o .

   o    f   I   n   t   e   r   l   e   a   v   i   n   g   s    /   u   s   e   r    )

Comparison Graph shoeing Complexity of 3 Interleavers

With Random Interelaver 

With Mast er Random Interleaver 

With Tree Based Interleaver 

 

Figure 3: Graph Showing Computational Complexity b/n Random Interleaver,Power Interleaver, and Tree Based Interleaver.

The Memory requirement of Tree Based Interleaver is

extremely low as compared to that of the Random Interleaver,

while is slightly high if compared with master random

interleaver [2], as shown in figure 4.

0 10 20 30 40 50 60 70 80 90 1000

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5x 10

6

User Number 

   M

   e   m

   o   r   y

   R   e   q   u   i   r   e   m

   e   n   t   o   f   I   n   t   e   r   l   e   a   v   e   r   (   N   o .   o

   f   b   i   t   s

   r   e   q   u   i

   r   e   d   /   u   s   e   r   )

  Comparison Graph shoeing Memory Requirement of 3 Interleavers with m=256 sl=16

With Random Interleaver 

With Master Random Interleaver 

With Tree Based Interleaver 

Figure 4: Graph Showing Memory Requirement b/n Random Interleaver,Power Interleaver, and Tree Based Interleaver

V.   NUMERICAL RESULTS 

For simplicity, assuming IDMA system with BPSK

signaling in single path AWGN channels and hk =1, ∀ k.

Without loss of generality, a uniform CREP {+1, -1, +1, -1, ------

---} is used with spread length sl =16, for all users and 20

Page 4: Analysis and Design of Tree Based Interleaver

7/27/2019 Analysis and Design of Tree Based Interleaver

http://slidepdf.com/reader/full/analysis-and-design-of-tree-based-interleaver 4/4

iterations. In figure 5, uncoded IDMA cases are considered,

where no forward error correction (CFEC) coding is introduced.

The data length is 256 bits is used, for an uncoded system.

From figure 5, the performances of IDMA scheme is found

to be similar for random and tree based interleavers, while on

the front of computational complexity, the tree based

interleaver is outperforming the master random interleaver

while having very small hike when compared with random

interleaver.

Figure 5. Comparison of Random Interleaver and TBI with 64 users in single path AWGN channel, with uncoded IDMA systems.

Considering the memory requirement, the proposed Tree

Based Interleaver is far better than random interleaver while

having slight increment in memory requirement when

compared with master random interleaver. So, we may

conclude that Tree Bases Interleaver may replace the random

interleaver and master random interleaver efficiently without

compromise in system performance.

VI.  CONCLUSION 

The proposed ‘Tree Based Interleaver’ is very easy to

generate and is better than the random interleavers in terms of

memory requirement problems. The ‘Tree Based Interleaver’ is

 better than master random interleaver in terms of

computational complexity. The proposed interleavers can take

the place of the random and master random interleaver

techniques without performance loss.

R EFERENCES 

[1]  Li ping, Lihai Liu, Keying Wu and W. K. Leung, “Interleave-DivisionMultiple-Access,” IEEE Trans. Wireless Commun., vol. 5, pp. 938-947,April 2006.

[2]  H. Wu, L. Ping and A. Perotti, “User-specific chip-level interleaverdesign for IDMA systems,” IEEE Elec. Lett., vol. 42, no. 4, Feb. 2006.

[3]  Li Ping and L. Liu, “Analysis and design of IDMA systems based onSNR evolution and power allocation,” in Proc. VTC’2004-Fall, LosAngles, CA, Sept. 2004

[4]  Zhisong Bie,W. Wu, “PEG Algorithm Based Interleavers Design forIDMA System,” proceedings of IEEE 41st Annual Conference , March,2007, pp. 480-483

[5]  Berrou and A. Glavieux, “Near optimum error correcting coding anddecoding: Turbo-codes,” IEEE Trans. Commun., vol 44, pp. 1261-1271,Oct. 1996.

[6]  M. Moher, “An iterative multiuser decoder for near-capacitycommunications,” IEEE Trans. Commun., vol. 46, pp. 870–880, July1998.

[7]  S. Brück, U. Sorger, S. Gligorevic, and N. Stolte, “Interleaving for outerconvolutional codes in DS-CDMA Systems,” IEEE Trans. Commun.,vol. 48, pp. 1100–1107, July 2000.

[8]  Tarable, G. Montorsi, and S. Benedetto, “Analysis and design ofinterleavers for CDMA systems,” IEEE Commun. Lett., vol. 5, pp. 420– 422, Oct. 2001.

[9]  F. N. Brannstrom, T. M. Aulin, and L. K. Rasmussen, “Iterative multi-user detection of trellis code multiple access using a posteriori

 probabilities,” in Proc. ICC 2001, Finland, June 2001, pp. 11–15.[10]  J. Viterbi, “Very low rate convolutional codes for maximum theoretical

 performance of spread spectrum multiple-access channels,” IEEE J.Select. Areas Commun., vol. 8, pp. 641–649, Aug. 1990.

[11]  S. Verdú and S. Shamai, “Spectral efficiency of CDMA with randomspreading,” IEEE Trans. Inform. Theory, vol. 45, pp. 622–640, Mar.1999.

[12]  M. Moher and P. Guinand, “An iterative algorithm for asynchronouscoded multi-user detection,” IEEE Commun. Lett., vol. 2, pp. 229–231,Aug. 1998.

[13]  R. H. Mahadevappa and J. G. Proakis, “Mitigating multiple accessinterference and intersymbol Interference in uncoded CDMA Systemswith chip level interleaving,” IEEE Trans. Wireless Commun., vol. 1, pp.781–792, Oct. 2002.

[14]  L. Liu, W. K. Leung, and Li Ping, “Simple chip-by-chip multi-userdetection for CDMA systems,” in Proc. IEEE VTC-Spring, Korea, Apr.2003, pp. 2157-2161.

[15]  Li Ping, L. Liu, K. Y. Wu, and W. K. Leung, “A unified approach tomulti-user detection and space time coding with low complexity andnearly optimal performance,” in Proc. 40th Allerton Conference, AllertonHouse, USA, Oct. 2002, pp. 170–179.

[16]  L. Liu, W. K. Leung, and Li Ping, “Simple iterative chip-by-chipmultiuser detection for CDMA systems,” in Proc. IEEE VTC 2003,Korea, Apr. 2003.

[17]  X. Wang and H. V. Poor, “Iterative (Turbo) Soft InterferenceCancellation and Decoding for Coded CDMA,” IEEE Trans. Commun.,vol. 47, July 1999, pp. 1046–61.

[18]  H. Schoeneich and P. Hoeher, “Adaptive interleave-division multipleaccess – A potential air interface for 4G bearer services and wirelessLANs,” in Proc. WOCN 2004, Muskat, Oman, June 2004, pp. 179–182.

[19]  Theodore S. Rappaport, “Wireless Communication”, PHI, pp. 25-40,447-460, 2007.