Data checking method and device

Information

  • Patent Application
  • 20170359150
  • Publication Number
    20170359150
  • Date Filed
    April 13, 2015
    9 years ago
  • Date Published
    December 14, 2017
    6 years ago
Abstract
Provided are a data checking method and device. The method includes: receiving a transmission signal containing a first data block and transmitted by a transmission node, wherein the length of the first data block is N bits, the first data block is generated by performing an FEC encoding on a second data block which has a length of K bits, and the second data block is generated by performing a CRC encoding on a third data block which has a length of L bits, where N, K and L are all positive integers, and N≧K>L; obtaining a first estimation data block of the first data block according to the transmission signal, and obtaining a second estimation data block of the second data block according to the transmission signal; and checking the third data block according to a relationship between the first estimation data block and an FEC code space and/or a CRC check result of the second estimation data block. By means of the technical solution provided in the present disclosure, the problems that a transmission rate decreases due to the fact that a CRC check code is too long and a false detection rate cannot be ensured due to the fact that the CRC check code is too short are solved.
Description
TECHNICAL FIELD

The present disclosure relates to the field of communications, and more particularly to a data checking method and device.


BACKGROUND

The transmitter of a digital communication system usually includes an source, a channel encoder, a modulator, and other parts, and the receiver usually includes a demodulator, a channel decoder, and an Sink. FIG. 1 is a schematic diagram of a digital communication system in the related art. As shown in FIG. 1, the channel encoder is used to introduce redundant information to the information bits in accordance with a certain rule so that the receiver channel decoder can correct error codes that occur when the information is transmitted over the channel to a certain extent. Therefore, channel encoding is a Forward Error Correction (FEC) technology.


In general, FEC encoding is a process of generating a parity bit sequence from an information bit sequence. The information bit sequence and the parity bit sequence together form a commonly used codeword bit sequence. The commonly used FEC encoding includes Turbo codes, Low Density Parity Check codes (LDPC) and convolution codes. For example, a Turbo code is used in the Long-Term Evolution (LTE) system for data transmission; an LDPC code and a convolution code are used in the IEEE 802.11 system.


The binary Turbo encoding of LTE is a parallel concatenated code with inner interleaver, which is usually concatenated by two Recursive System Code (RSC) component code encoders with the same structure. The Turbo code interleaver randomly substitutes the bit positions in the input binary information sequence before the second component code encoder, and when the interleaver is sufficiently large, the Turbo code has a characteristic of an approximately random long code. The encoding structure of the Turbo code is as shown in FIG. 2. The input binary information sequence Xk generates a check sequence Zk through the first component code encoder. At the same time, after the Xk is interleaved through the Turbo code interleaver, another check sequence Z′k is generated by the second component code encoder.


The Turbo code decoder is also formed by two cascaded sub-decoders, the first component decoder and the second component decoder, respectively, as shown in FIG. 3, the side information (also referred to as extrinsic information) of the information bit output by the first component decoder is input to the second component decoder as prior information after the inner interleaving of the Turbo code. Likewise, the side information of the information bit output by the second component decoder is input to the first component decoder as prior information after being deinterleaved, thus forming an iterative decoding structure. The soft information output by the decoder is the sum of the side information output by the second component decoder plus the input prior information and the soft information input by the channel after being deinterleaved. After several iterations, the decoder judges the output soft information to generate an estimation of the information bit sequence by the decoder.


LDPC code is a linear block code based on a sparse parity check matrix, which can achieve the code of low complexity with the use of its parity check matrix sparsity. The graphical representation of the LDPC parity check matrix is a bipartite graph. There is a one-to-one correspondence between the bipartite graph and the parity check matrix H, and an M*N parity check matrix H defines the constraint that each codeword with N bits satisfies M parity check sets. A bipartite graph includes N variable nodes and M parity check nodes. When the mth check involves the nth bit, that is, the element Hm of the mth row and the nth column in H, where n=1, there will be a connecting line to connect the check node m and the variable node n. In the bipartite graph, there is no connection between any nodes of the same class, and the total number of edges in the bipartite graph is equal to the number of nonzero elements in the parity check matrix.


The decoding of the LDPC code may employ an iterative algorithm (referred to as a belief propagation algorithm) based on belief propagation. The belief propagation algorithm is a decoding algorithm based on the bipartite graph structure. Since the reliability information is transmitted back and forth between the variable nodes and the check nodes in the process of running the algorithm, it is referred to as the belief propagation algorithm. The belief propagation algorithm has two forms, probabilistic domain and logarithmic domain. The probability domain algorithm involves more multiplication, which is relatively expensive in implementation and is relatively poor in the numerical stability. The logarithmic domain algorithm is mainly an addition, which is easy to implement and is also relatively better in the numerical stability. FIG. 4 shows a decoding process of the belief propagation algorithm based on a bipartite graph, where a check node (a square node) represents a check equation, and a variable node (a circular node) represents a codeword bit. In the process of iterative decoding, the reliability information is transmitted back and forth between the variable node and the check node of the binary graph. The information transmitted by the variable node to the check node is the external information of value range of the codeword bit. The information transmitted by the check node to the variable node is the reliability information that the check of the check equation has passed. The LDPC decoder based on the belief propagation algorithm can output the soft information of the codeword bits (including the information bits and the parity bits) after iteration. After several iterations, the decoder judges the output soft information to generate an estimation of the information bit sequence by the decoder.


The convolution code is another commonly used FEC code. The characteristic of the convolution code is that when the input information at a certain moment is encoded, the output codeword is determined together not only on the basis of the input at this moment but also on the basis of the input at p moments before this moment, that is, the generation of the codeword is limited by p+1 input moments. The convolution code is a finite state machine, and its encoding and decoding can be analyzed with the help of a grid diagram.


The basic idea of the decoding of the convolution code is to calculate the distance between it and all other possible and continuous grid paths on the basis of the received codewords, and select one of the most possible distances as the decoded estimation. The most commonly used convolution code decoding algorithm is Viterbi algorithm proposed by Viterbi in 1967. The Viterbi algorithm is essentially a maximum likelihood decoding. The classic Viterbi algorithm can only output hard decision information. We can also use Soft-Output Viterbi Algorithm (SOVA) or BCJR algorithm and other soft output decoding algorithms to generate soft information on information bits. The SOVA algorithm is a soft-output Viterbi algorithm proposed by Hagenauer and Hoeher in 1984. BCJR algorithm is a Maximum A Posteriori (MAP) decoding algorithm, which is proposed by Bahl, Cocke, Jelinek and Raviv in 1974.


The decoding method of the various FEC codes described above can obtain a decoding estimation with respect to the codeword bits or the information bits. But some error detecting means should be taken to know whether the decoding result is correct. Cyclic Redundancy Check code (CRC) is a system shortening cycle code, but also a good error detecting code. Because the CRC has the characteristics such as a low complexity and an excellent performance, it is widely used in a variety of communication systems. In the familiar 3Gpp LTE protocol, a large number of CRCs are used from the physical layer to an upper layer to check the correctness of the data.


In the existing LTE system, the physical layer data sharing channel performs data transmission with a Transmission Block (TB) as the basic unit. The receiver uses the CRC of the TB to determine whether the current TB is correctly received. If the TB is correctly received, the receiver will feed back an ACK message to the transmitting end. If the TB is not received correctly, the receiver will feed back the NACK message to the transmitting end.


When the block size of the TB exceeds the specified threshold, for example, 6120 bits, the transmitting end usually performs Code Block (CB) division, dividing one TB into multiple CBs. After performing encoding, rate matching, code block cascading, modulating and other operations, each CB is then transmitted to the receiver.


The LTE protocol specifies that when a TB includes multiple CBs, each CB also adds a CRC before encoding, and the CRC of the CB is used for the early termination of the decoding.


The LTE protocol specifies CRCs of a total of three lengths, such as 24, 16, and 8 bits, and in the physical shared channel data transmission, TB CRC and CB CRC have 24 bits, but the two CRCs have different generation polynomials.


With the emergence of new applications such as Internet of Things and Machine Type Communication (MTC), small packet communication services of a large number of users are becoming more and more important. Small packets usually refer to the data that a single TB block has a length of tens to hundreds of bits. According to the existing LTE protocol, TB of this length still needs to add a TB CRC with a length of 24 bits. Although the 24-bit CRC can provide good error detecting performance, for small packets, it will bring a greater redundancy rate, thereby reducing the wireless channel transmission efficiency. For example, after adding a 24-bit TB CRC, a TB block with a length of 24 bits has a redundancy rate of 50%, and the actual redundancy rate will be further increased after the channel encoding; even if it is a TB block with a length of 208 bits, the redundancy rate will be at least 10.3% after adding a 24-bit CRC.


How to reduce the redundancy of small packets and improve the transmission efficiency? An easily conceivable way is to reduce the length of the CRC, for example, to reduce the TB CRC of the packet from 24 bits to 8 bits. However, the drawback of this method is also very obvious: reducing the length of the CRC will cause an increase in the false detection rate. For example, 8-bit CRC can only be used for TB blocks with a length of no more than 27-1-127 bits, and the false detection rate is close to 4%. The higher false detection rate cannot meet the requirements of the actual system.


In addition, in other wireless broadband communication systems, such as the IEEE 802.11 system, there is no code block CRC, and a code block size is usually only hundreds of bits. If the efficiency of data retransmission should be improved, some improvements can be made to the system. For example, adding CB CRC to the code block, so that the receiver can know the status of the various code blocks, so as to design some efficient data retransmission schemes. However, if the CRC length is too long, it will also cause a decrease in the actual transmission efficiency. If the CRC length is too short, it cannot meet the requirement of the false detection rate.


No effective technical solution has been proposed for the problems in the related art that a transmission rate decreases due to the fact that a CRC check code is too long and a false detection rate cannot be ensured due to the fact that the CRC check code is too short.


SUMMARY

In certain embodiments of the present disclosure, data checking methods and devices are provided.


According to one embodiment of the present disclosure, a data checking method is provided, which includes: receiving a transmission signal containing a first data block and transmitted by a transmission node, and the length of the first data block is N bits, the first data block is generated by a second data block, the length of which is K bits, after FEC encoding, and the second data block is generated by a third data block, the length of which is L bits, after CRC encoding, where N, K and L are all positive integers, and N≧K>L; obtaining a first estimation data block of the first data block according to the transmission signal, and obtaining a second estimation data block of the second data block according to the transmission signal; and checking the third data block according to a relationship between the first estimation data block and an FEC code space and/or a CRC check result of the second estimation data block.


In certain embodiments, checking the third data block according to a relationship between the first estimation data block and an FEC code space and/or a CRC check result of the second estimation data block, includes: judging that the third data block is received correctly when the first estimation data block is a codeword of the FEC code space and the CRC check of the second estimation data block is correct; and judging that the third data block is not received correctly when the first estimation data block is not a codeword of the FEC code space and/or the CRC check of the second estimation data block fails.


In certain embodiments, the first estimation data block is a codeword of the FEC code space when the first data block is a code block or a transmission block containing a code block, indicating that: the code block or the transmission block is a codeword in the FEC code space; or the first estimation data block is a codeword of the FEC code space when the first data block is a transmission block containing a plurality of data blocks, indicating that: the plurality of data blocks are codewords in the FEC code space.


In certain embodiments, when it is judged that the third data block is received correctly, Acknowledgment (ACK) information is transmitted to the transmission node; and when it is judged that the third data block is not received correctly, Non-Acknowledgment (NACK) information is transmitted to the transmission node.


In certain embodiments, the FEC encoding includes at least one of: a Turbo code, a LDPC code, and a convolution code.


In certain embodiments, when the FEC encoding is a Turbo code, it is determined whether the data block is a codeword in the FEC code space by at least one of the following manners one to seven.


Manner One:


comparing side information Λie1 corresponding to K bits output by a first component decoder after the jth iteration with the first threshold Y1, respectively, if Λie1≧Y1, the bit i is judged to be “1”, if Λie1<Y1, the bit i is judged to be 0, and generating the bit sequence E2 according to the judging result, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1, and e1 represents that the Λie1 is the side information output by the first component decoder;


comparing side information Λie2 corresponding to K bits output by a second component decoder in the jth iteration with the first threshold Y1, respectively, and if Λie2≧Y1, the bit i is judged to be “1”, if Λie2<Y1, the bit i is judged to be 0, and generating the bit sequence E2 according to the judging result, where e2 represents that the Λie2 is the side information output by the second component decoder;


interleaving the bit sequence E1 using an inner interleaver pattern of the Turbo code, generating an interleaved bit sequence E1int, and comparing the size relationship between E1int and E2, and if the E1int=E2, the data block generated by being decoded by the Turbo code after j iterations is a codeword in the FEC code space; if E1int≠E2, the data block generated after j iterations is not a codeword in the FEC code space, where int represents that the E1int is the interleaved information or bit sequence; or


deinterleaving the E2 using an inner interleaver of the Turbo code, generating an deinterleaved bit sequence E2dei, and comparing E1 and E2dei, and if the E2dei=E1, the data block generated by being encoded by the Turbo code after j iterations is a codeword in the FEC code space; if E2dei≠E1, the data block generated after j iterations is not a codeword in the FEC code space, where dei represents that the E2dei is the deinterleaved information or bit sequence.


Manner Two:


comparing the symbol sign(Λij) of soft information of K bits output by the Turbo code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λij)and sign(Λij−1) of each bit are the same, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2.


Manner Three:


comparing the symbol sign(Λij) of soft information of K bits output by the Turbo code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is less than or equal to a second threshold Y2, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2; or


if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to a third threshold Y3, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the third threshold Y3, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Four:


comparing the symbol sign(Λia2) of priori information of K bits input to a second component decoder in the jth iteration and the symbol sign(Λie2) of side information of K bits output by a second component decoder in the jth iteration, and if the number of bits in which sign(Λia2) and sign(Λie2) are the same is less than or equal to a fourth threshold Y4, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, where a2 represents that the sign(Λia2) is priori information input to the second component decoder; or


if the number of bits in which sign(Λia2) and sign(Λie2) are different is less than or equal to a fifth threshold Y5, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λia2) and sign(Λie2) are different is greater than the fifth threshold Y5, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Five:


comparing the absolute value |Λij| of the soft information of K bits output by the Turbo code decoder after the jth iteration with a sixth threshold Y6, and if the maximum value in |Λij| is greater than the sixth threshold Y6, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the sixth threshold Y6, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Six:


comparing the mean value







S
j

=


1
K






i
=
1

k





Λ
i
j









of the absolute value of the soft information of K bits output by the Turbo code decoder after the jth iteration with a seventh threshold Y7, and if Sj is greater than the seventh threshold Y7, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is less than or equal to the seventh threshold Y7, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner seven:


comparing the sum







S
j

=




i
=
1

k





Λ
i
j








of the absolute value of the soft information of K bits output by the Turbo code decoder after the jth iteration with the sum







S

j
-
1


=




i
=
1

k





Λ
i

j
+
1









of the absolute value of the soft information of K bits output by the Turbo code decoder after the j-1th iteration, and if Sj is less than or equal to Sj−1, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is greater than Sj−1, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, and the first threshold Y1 to the seventh threshold Y7 are integers greater than or equal to zero.


In certain embodiments, when the FEC encoding is the LDPC code, it is determined whether the data block is a codeword in the FEC code space by at least one of the following manners one to seven.


Manner One:


comparing soft information Λij of N codeword bits output by an LDPC code decoder after the jth iteration with the eighth threshold Y8, and if Λij≧Y8, the bit i is judged to be “1”, if Λij<Y8, the bit i is judged to be 0, and generating the estimation custom-character of the data block according to the judging result, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;


if custom-character×HT=0, custom-character generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if custom-character×HT≠0, the custom-character is not a codeword in the FEC code space, where H is a check matrix of the LDPC code.


Manner Two:


comparing soft information Λij of N codeword bits output by an LDPC code decoder after the jth iteration with the eighth threshold Y8, and if Λij≧Y8, the bit i is judged to be “1”, if Λij<Y8, the bit i is judged to be 0, generating the estimation custom-character of the first data block according to the judging result, and generating the estimation custom-character of the bit sequence by taking the first K bits for the estimation custom-character, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;


generating the data block C by performing LDPC encoding on the custom-character, and if custom-character=C, the custom-character is a codeword in the FEC code space; and if custom-character≠C, the custom-character is not a codeword in the FEC code space.


Manner Three:


comparing the symbol sign(Λij) of soft information of N codeword bits output by a LDPC code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2.


Manner Four:


comparing the symbol sign(Λij) of soft information of N codeword bits output by a LDPC code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if the number of bits in which sign(Λij) and sign(Λi31 1) are the same is greater than or equal to a ninth threshold Y9, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to the ninth threshold Y9, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2; or


if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to a tenth threshold Y10, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the tenth threshold Y10, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Five:


comparing the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with an eleventh threshold Y11, and if the minimum value in |Λij| is greater than the eleventh threshold Y11, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the eleventh threshold Y11, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1.


Manner Six:


comparing the mean value







S
j

=


1
K






i
=
1

k





Λ
i
j









of the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with a twelfth threshold Y12, and if Sj is greater than the twelfth threshold Y12, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is less than or equal to the twelfth threshold Y12, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1.


Manner Seven:


comparing the sum







S
j

=




i
=
1

k





Λ
i
j








of the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with the sum







S
j

=




i
=
1

k





Λ
i

j
-
1









of the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the j-1th iteration, and if Sj is less than or equal Sj−1, to the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is greater than Sj−1, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2, and the eighth threshold Y8 to the twelfth threshold Y12 are integers greater than or equal to zero.


In certain embodiments, when the FEC encoding is the convolution code, it is determined whether the data block is a codeword in the FEC code space by at least one of the following manners one to five.


Manner One:


comparing the symbol sign(Λij) of soft information of K bits output by the convolution code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2.


Manner Two:


comparing the symbol sign(Λij) of soft information of K bits output by the convolution code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is greater than or equal to a thirteenth threshold Y13, the data block generated after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is less than or equal to the thirteenth threshold Y13, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2; or


if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than or equal to a fourteenth threshold Y14, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the fourteenth threshold Y14, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Three:


comparing the absolute value |Λij| of the soft information of K bits output by the convolution code decoder after the jth iteration with a fifteenth threshold Y15, and if the maximum value in |Λij| is greater than the fifteenth threshold Y15, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the fifteenth threshold Y15, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Four:


comparing the mean value







S
j

=


1
K






i
=
1

k





Λ
i
j









of the absolute value of the soft information of K bits output by the convolution code decoder after the jth iteration with a sixteenth threshold Y16, and if Sj is greater than the sixteenth threshold Y16, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is less than or equal to the sixteenth threshold Y16, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Five:


comparing the sum







S
j

=




i
=
1

k





Λ
i
j








of the absolute value of the soft information of K bits output by the convolution code decoder after the jth iteration with the sum







S

j
-
1


=




i
=
1

k





Λ
i

j
-
1









of the absolute value of the soft information of K bits output by the LDPC code decoder after the j-1th iteration, and if Sj is less than or equal to the data block is a codeword in the FEC code space; and if Sj is greater than Sj−1, the data block is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, and the thirteenth threshold Y13 to the sixteenth threshold Y16 are integers greater than or equal to zero.


In certain embodiments, the method further includes: determining the length of the CRC according to the length L of the third data block.


In certain embodiments, the length of the CRC is determined according to the length L of the third data block, including: dividing the range of values of the length L into T intervals in an ascending order: L1,L2, . . . LT, where each interval corresponds to the CRCs of different lengths: L1CRC,L2CRC, . . . LTCRC, and L1CRC,L2CRC, . . . LTCRC, and T is a positive integer; and selecting the length of the CRC used for encoding the third data block according to the value interval to which the length L of the third data block belongs.


In certain embodiments, the transmission node includes at least one of: a base station, a relay node, and a terminal.


In certain embodiments, when the transmission node is a terminal, a transmission signaling for indicating a data checking mode is transmitted to the transmission node, and the data checking mode includes at least one of: checking data according to the FEC code space and/or the CRC check result; and checking data according to the CRC check result.


In certain embodiments, when the transmission node is a base station or a relay node, an indication signaling for configuring the data checking mode and transmitted by the transmission node is received, and the data checking mode includes at least one of: checking data according to the FEC code space and/or the CRC check result; checking data according to the CRC check result.


In certain embodiments, and a data checking mode in which data is checked according to the FEC code space and/or the CRC check result is used in one of the following cases: the length of the transmission block or code block in the first data block is less than the first preset threshold; or the number of repetitions of the transmission block or code block in the first data block is greater than the second preset threshold.


In certain embodiments, the FEC code space includes: a set of all codewords generated using the FEC encoding manner.


In certain embodiments, the first estimation data block of the first data block is obtained according to the transmission signal, including: obtaining the first estimation data block by demodulating the transmission signal; and the second estimation data block of the second data block is obtained according to the transmission signal, including: obtaining the second estimation data block by demodulating and FEC decoding the transmission signal.


According to another embodiment of the present disclosure, there is provided a data checking device, including: a receiving module configured to receive a transmission signal containing a first data block and transmitted by a transmission node, and the length of the first data block is N bits, the first data block is generated by a second data block, the length of which is K bits, after FEC encoding, and the second data block is generated by a third data block, the length of which is L bits, after CRC code encoding, where N, K and L are all positive integers, and N≧K>L; a determining module configured to obtain a first estimation data block of the first data block according to the transmission signal, and obtain a second estimation data block of the second data block according to the transmission signal; and a checking module configured to check the third data block according to a relationship between the first estimation data block and an FEC code space and/or a CRC check result of the second estimation data block.


In certain embodiments, the checking module includes: a first judging unit configured to judge that the third data block is received correctly when the first estimation data block is a codeword of the FEC code space and the CRC check of the second estimation data block is correct; and a second judging unit configured to judge that the third data block is not received correctly when the first estimation data block is not a codeword of the FEC code space and/or the CRC check of the second estimation data block fails.


In certain embodiments, the checking module is configured to check the third data block when the FEC code space includes the following: a set of all codewords generated using the FEC encoding manner.


According to the embodiment of the present disclosure, the technical solution of checking the received data block by comprehensively using the FEC code space and the CRC check solves the problems that a transmission rate decreases due to the fact that a CRC check code is too long and a false detection rate cannot be ensured due to the fact that the CRC check code is too short, so as to reduce the length of the CRC in the case of meeting the requirement of the system error detection rate, thereby reducing the data redundancy rate and improving the transmission efficiency.





BRIEF DESCRIPTION OF THE DRAWINGS

The drawings are described here to provide further understanding of the present disclosure, and form a part of the present application. The schematic embodiments and description of the present disclosure are adopted to explain the present disclosure.



FIG. 1 is a schematic diagram of a digital communication system in the related art.



FIG. 2 is a schematic diagram of Turbo coding in related art.



FIG. 3 is a schematic diagram of Turbo decoding in a related art.



FIG. 4 is a schematic diagram of LDPC decoding in related art.



FIG. 5 is a flow diagram of a data checking method according to an embodiment of the present disclosure.



FIG. 6 is a structure block diagram of a data checking device according to an embodiment of the present disclosure.



FIG. 7 is another structure block diagram of a data checking device according to an embodiment of the present disclosure.



FIG. 8 is a flow diagram of a data checking method according to a exemplary embodiment of the present disclosure.



FIG. 9 is a schematic diagram of a data block of a plurality of code blocks according to a exemplary embodiment of the present disclosure.





DETAILED DESCRIPTION OF THE EMBODIMENTS

The present disclosure is described below with reference to the drawings and the embodiments in detail. It is to be noted that the embodiments of the present application and the characteristics in certain embodiments may be combined with each other under the condition of no conflicts.


In order to make a better understanding of the present disclosure by those skilled in the art, the technical solutions In certain embodiments of the present disclosure will be described in a clear and complete manner in conjunction with the accompanying drawings In certain embodiments of the present disclosure, and it will be apparent that the described embodiments is merely a part of embodiments of the present disclosure, rather than all embodiments. All other embodiments obtained by those of ordinary skill in the art without making creative work are intended to be within the scope of the present disclosure based on embodiments of the present disclosure.


In the present embodiment, there is provided a data checking method. FIG. 5 is a flow diagram of a data checking method according to an embodiment of the present disclosure. As shown in FIG. 5, the flow includes the following steps.


At Step S502: A transmission signal containing a first data block and transmitted by a transmission node is received, and the length of the first data block is N bits, the first data block is generated by a second data block, the length of which is K bits, after FEC encoding, and the second data block is generated by a third data block, the length of which is L bits, after CRC encoding, where N, K and L are all positive integers, and N≧K>L.


At Step S504: A first estimation data block of the first data block is obtained according to the transmission signal, and a second estimation data block of the second data block is obtained according to the transmission signal.


At Step S506: The third data block is checked according to a relationship between the first estimation data block and an FEC code space and/or a CRC check result of the second estimation data block.


Through the above steps, the technical solution of checking the received data block by comprehensively using the FEC code space and the CRC checks is realized, solving the problems that a transmission rate decreases due to the fact that a CRC check code is too long and a false detection rate cannot be ensured due to the fact that the CRC check code is too short, so as to reduce the length of the CRC in the case of meeting the requirement of the system error detection rate, thereby reducing the data redundancy rate and improving the transmission efficiency.


In certain embodiments of the present disclosure, there are many implementations for the above Step S506. In the exemplary embodiment of the present disclosure, there may be several following solutions: judging that the third data block is received correctly when the first estimation data block is a codeword of the FEC code space and the CRC check of the second estimation data block is correct; and judging that the third data block is not received correctly when the first estimation data block is not a codeword of the FEC code space and/or the CRC check of the second estimation data block fails. That is, as long as one of the fact that the first estimation data block is not a codeword of the FEC code space and the CRC check of the second estimation data block fails is coincident, it will be judged that the third data block is not received correctly.


In the specific implementation process, the first data block may have a plurality of cases (including a code block or a plurality of code blocks), and specifically, the first estimation data block is a codeword of the FEC code space when the first data block is a code block or a transmission block containing a code block, indicating that: the code block or the transmission block is a codeword in the FEC code space; or the first estimation data block is a codeword of the FEC code space when the first data block is a transmission block containing a plurality of data blocks, indicating that: the plurality of data blocks are codewords in the FEC code space.


Herein when it is judged that the third data block is received correctly, ACK information is transmitted to the transmission node; and when it is judged that the third data block is not received correctly, NACK information is transmitted to the transmission node.


In the above technical solution, when it is judged whether the data block is a codeword in the code space, there are a plurality of different implementations contained in the FEC encoding, which will be detailed below. The FEC encoding includes at least one of: a Turbo code, a LDPC code, and a convolution code.


(1) When the FEC code is a Turbo code, when the FEC encoding is a Turbo code, it is determined whether the data block is a codeword in the FEC code space by at least one of the following manners, and the following manners one to seven can be arbitrarily combined.


Manner One:


Comparing side information Λie1 corresponding to K bits output by a first component decoder after the jth iteration with the first threshold Y1, respectively, and if Λie1≧Y1, the bit i is judged to be “1”, if Λie1<Y1, the bit i is judged to be 0, and generating the bit sequence E1 according to the judging result, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1, and e1 represents that the Λie1 is the side information output by the first component decoder.


Comparing side information Λie2 corresponding to K bits output by a second component decoder in the jth iteration with the first threshold Y1, respectively, and if Λie2≧Y1, the bit i is judged to be “1”, if Λie2<Y1, the bit i is judged to be 0, and generating the bit sequence E2 according to the judging result, where e2 represents that the Λie2 is the side information output by the second component decoder.


Interleaving the bit sequence E1 using an inner interleaver pattern of the Turbo code, generating an interleaved bit sequence E1int, and comparing the size relationship between E1int and E2, and if the E1int=E2, the data block generated by being decoded by the Turbo code after j iterations is a codeword in the FEC code space; if E1int≠E2, the data block generated after j iterations is not a codeword in the FEC code space, where int represents that the E1int is the interleaved information or bit sequence; or


Deinterleaving the E2 using an inner interleaver of the Turbo code, generating an deinterleaved bit sequence E2dei, and comparing E1 and E2dei, and if the E2dei=E1, the data block generated by being encoded by the Turbo code after j iterations is a codeword in the FEC code space; if E2dei≠E1, the data block generated after j iterations is not a codeword in the FEC code space, where die represents that the E2dei is the deinterleaved information or bit sequence.


Manner Two:


comparing the symbol sign(Λij) of soft information of K bits output by the Turbo code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2.


Manner Three:


comparing the symbol sign(Λij of soft information of K bits output by the Turbo code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is less than or equal to a second threshold Y2, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2; or


if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to a third threshold Y3, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the third threshold Y3, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Four:


comparing the symbol sign(Λia2) of priori information of K bits input to a second component decoder in the jth iteration and the symbol sign(Λie2) of side information of K bits output by a second component decoder in the jth iteration, and if the number of bits in which sign(Λia2) and sign(Λie2) are the same is less than or equal to a fourth threshold Y4, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, where a2 represents that the sign(Λia2) is priori information input to the second component decodern; or


if the number of bits in which sign(Λia2) and sign(Λie2) are different is less than or equal to a fifth threshold Y5, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λia2) and sign(Λie2) are different is greater than the fifth threshold Y5, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Five:


comparing the absolute value |Λij| of the soft information of K bits output by the Turbo code decoder after the jth iteration with a sixth threshold Y6, and if the maximum value in |Λij| is greater than the sixth threshold Y6, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the sixth threshold Y6, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Six:


comparing the mean value







S
j

=


1
K






i
=
1

k





Λ
i
j









of the absolute value of the soft information of K bits output by the Turbo code decoder after the jth iteration with a seventh threshold Y7, and if Sj is greater than the seventh threshold Y7, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is less than or equal to the seventh threshold Y7the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Seven:


comparing the sum







S
j

=




i
=
1

k





Λ
i
j








of the absolute value of the soft information of K bits output by the Turbo code decoder after the jth iteration with the sum







S

j
-
1


=




i
=
1

k





Λ
i

j
+
1









of the absolute value of the soft information of K bits output by the Turbo code decoder after the j-1th iteration, and if Sj is less than or equal to Sj−1, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is greater than Sj−1, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, and the first threshold Y1 to the seventh threshold Y7 are integers greater than or equal to zero.


(2) When the FEC encoding is the LDPC code, it is determined whether the data block is a codeword in the FEC code space by at least one of the following manners, and the following manners one to seven can be arbitrarily combined.


Manner One:


comparing soft information Λij of N codeword bits output by an LDPC code decoder after the jth iteration with the eighth threshold Y8, and if Λij≧Y8, the bit i is judged to be “1”, if Λij<Y8, the bit i is judged to be 0, and generating the estimation custom-character of the data block according to the judging result, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;


if custom-character×HT=0, custom-character generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if custom-character×HT≠0, the custom-character is not a codeword in the FEC code space, where H is a check matrix of the LDPC code.


Manner Two:


comparing soft information Λij of N codeword bits output by an LDPC code decoder after the jth iteration with the eighth threshold Y8, and if Λij≧Y8, the bit i is judged to be “1”, if Λij<Y8, the bit i is judged to be 0, generating the estimation custom-character of the first data block according to the judging result, and generating the estimation custom-character of the bit sequence by taking the first K bits for the estimation custom-character, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;


generating the data block C by performing LDPC encoding on the custom-character, and if custom-character=C, the custom-character is a codeword in the FEC code space; and if custom-character≠C, the custom-character is not a codeword in the FEC code space.


Manner Three:


comparing the symbol sign(Λij) of soft information of N codeword bits output by a LDPC code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λj) and sign(Λij−1) of each bit are the same, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2.


Manner Four:


comparing the symbol sign(Λij) of soft information of N codeword bits output by a LDPC code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is greater than or equal to a ninth threshold Y9, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to the ninth threshold Y9, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2; or


if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to a tenth threshold Y10, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the tenth threshold Y10, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Five:


comparing the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with an eleventh threshold Y11, and if the minimum value in |Λij| is greater than the eleventh threshold Y11, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the eleventh threshold Y11, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1.


Manner Six:


comparing the mean value







S
j

=


1
N






i
=
1

k





Λ
i
j









of the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with a twelfth threshold Y12, and if Sj is greater than the twelfth threshold Y12, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is less than or equal to the twelfth threshold Y12, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1.


Manner Seven:


comparing the sum







S
j

=




i
=
1

k





Λ
i
j








of the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with the sum







S
j

=




i
=
1

k





Λ
i

j
-
1









of the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the j-1th iteration, and if Sj is less than or equal to Sj−1, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is greater than Sj−1, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2, and the eighth threshold Y8 to the twelfth threshold Y12 are integers greater than or equal to zero.


(3) When the FEC encoding is the convolution code, it is determined whether the data block is a codeword in the FEC code space by at least one of the following manners, and the following manners one to five can be arbitrarily combined.


Manner One:


comparing the symbol sign(Λij) of soft information of K bits output by the convolution code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈{0,1,2, . . . K-1}, j is an integer greater than or equal to 2.


Manner Two:


comparing the symbol sign(Λij) of soft information of K bits output by the convolution code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is greater than or equal to a thirteenth threshold Y13, the data block generated after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is less than or equal to the thirteenth threshold Y13, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2; or


if the number of bits in which sign(Λij) and sign(Λik−1) are different is greater than or equal to a fourteenth threshold Y14, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the fourteenth threshold Y14, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Three:


comparing the absolute value |Λij| of the soft information of K bits output by the convolution code decoder after the jth iteration with a fifteenth threshold Y15, and if the maximum value in |Λij| is greater than the fifteenth threshold Y15, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the fifteenth threshold Y15, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈{0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Four:


comparing the mean value







S
j

=


1
K






i
=
1

k





Λ
i
j









of the absolute value of the soft information of K bits output by the convolution code decoder after the jth iteration with a sixteenth threshold Y16, and if Sj is greater than the sixteenth threshold Y16, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is less than or equal to the sixteenth threshold Y16, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Five:


comparing the sum







S
j

=




i
=
1

k





Λ
i
j








of the absolute value of the soft information of K bits output by the convolution code decoder after the jth iteration with the sum







S

j
-
1


=




i
=
1

k





Λ
i

j
-
1









of the absolute value of the soft information of K bits output by the LDPC code decoder after the j-1th iteration, and if Sj is less than or equal to Sj−1, the data block is a codeword in the FEC code space; and if Sj is greater than Sj−1, the data block is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, and the thirteenth threshold Y13 to the sixteenth threshold Y16 are integers greater than or equal to zero.


In certain embodiments of the present disclosure, during the CRC encoding, it is also possible to perform a process of determining the length of the CRC according to the length L of the third data block. For the technical solution, in an example of the embodiment of the present disclosure, it be achieved by the following technical solution: dividing the range of values of the length L into T intervals in an ascending order: L1,L2, . . . LTCRC, where each interval corresponds to the CRCs of different lengths: L1CRC,L2CRC, . . . LTCRC, and L1CRC, L2CRC, . . . LTCRC, and T is a positive integer, and selecting the length of the CRC used for encoding the third data block according to the value interval to which the length L of the third data block belongs.


It should be noted that the transmission node includes at least one of: a base station, a relay node, and a terminal.


(1) When the transmission node is a terminal, a transmission signaling for indicating a data checking mode is transmitted to the transmission node, and the data checking mode includes at least one of: checking data according to the FEC code space and/or the CRC check result; and checking data according to the CRC check result.


(2) When the transmission node is a base station or a relay node, an indication signaling for configuring the data checking mode and transmitted by the transmission node is received, and the data checking mode includes at least one of: checking data according to the FEC code space and/or the CRC check result; checking data according to the CRC check result.


In the actual application process, it is possible to flexibly select between the data checking method provided by the embodiment of the present disclosure and the conventional process using only the CRC check. Specifically, the technical solution provided by the embodiment of the disclosure is used in one of the following cases: a data checking mode in which data is checked according to the FEC code space and/or the CRC check result: the length of the transmission block or code block in the first data block is less than the first preset threshold; or the number of repetitions of the transmission block or code block in the first data block is greater than the second preset threshold. The determination of the first preset threshold and the second preset threshold can be flexibly set as required.


It should be noted that the FEC code space In certain embodiments of the present disclosure includes a set of all the codewords generated using the FEC encoding manner, and the main body executing the above steps may be, but is not limited to, any network elements such as a terminal, a base station, and a relay having the function of receiving data.


In the present embodiment, the process referred to in the above Step S504 obtains the first estimation data block of the first data block according to the transmission signal, which may be implemented by the following process: obtaining the first estimation data block by demodulating the transmission signal; and obtains the second estimation data block of the second data block according to the transmission signal, which may be implemented by the following process: obtaining the second estimation data block by demodulating and FEC decoding the transmission signal.


In summary, the embodiments of the present disclosure propose a data checking method of using a combination of CRC and FEC codes. The method only requires the addition of a shorter CRC to the data block, and can judge according to the characteristics of the FEC decoder whether the codeword passing the CRC check is a codeword in the FEC code space, and if so, it is judged that the data is received correctly and the ACK is fed back to the transmitting end; if not, it is judged that the data is not received correctly, and the NACK is fed back to the transmitting end.


In the present embodiment, there is also provided a data checking device for realizing the above embodiments and exemplary embodiments. Those having been described will not be described in detail. As used herein, the term “module” may implement a combination of software and/or hardware of a predetermined function. Although the device described in the following embodiments are preferably implemented in software, the implementation of hardware, or a combination of software and hardware, is also possible and conceivable.



FIG. 6 is a structure block diagram of a data checking device according to an embodiment of the present disclosure. As shown in FIG. 6, the device includes:


a receiving module 60 configured to receive a transmission signal containing a first data block and transmitted by a transmission node, and the length of the first data block is N bits, the first data block is generated by a second data block, the length of which is K bits, after FEC encoding, and the second data block is generated by a third data block, the length of which is L bits, after CRC encoding, where N, K and L are all positive integers, and N≧K>L;


a determining module 62 connected to the receiving module 60 and configured to obtain a first estimation data block of the first data block according to the transmission signal, and obtain a second estimation data block of the second data block according to the transmission signal; and


a checking module 64 connected to the determining module 62 and configured to check the third data block according to a relationship between the first estimation data block and an FEC code space and/or a CRC check result of the second estimation data block.


Through the combination of the above modules, the technical solution of checking the received data block by comprehensively using the FEC code space and the CRC checks is realized, solving the problems that a transmission rate decreases due to the fact that a CRC check code is too long and a false detection rate cannot be ensured due to the fact that the CRC check code is too short, so as to reduce the length of the CRC in the case of meeting the requirement of the system error detection rate, thereby reducing the data redundancy rate and improving the transmission efficiency.


In the present embodiment, as shown in FIG. 7, in order to complete the function of the checking module 64, In certain embodiments of the present disclosure, the checking module 64 may include the following units:


a first judging unit 640 configured to judge that the third data block is received correctly when the first estimation data block is a codeword of the FEC code space and the CRC check of the second estimation data block is correct; and


a second judging unit 642 configured to judge that the third data block is not received correctly when the first estimation data block is not a codeword of the FEC code space and/or the CRC check of the second estimation data block fails.


In one example of the embodiment of the present disclosure, the checking module 64 is configured to check the third data block when the FEC code space includes the following: a set of all codewords generated using the FEC encoding manner.


In order to better understand the data checking process in the above embodiments, the following description will be made with reference to the exemplary embodiments:


Exemplary Embodiment One

The present embodiment proposes a data checking method, applied to a first transmission node. As shown in FIG. 8, the method includes the following steps.


At Step S802: The first transmission node receives a transmission signal containing a data block D (equivalent to the first data block of the above embodiment) and transmitted by the second transmission node, and the length of the data block D is N bits, the data block D is generated by a data block K (equivalent to the second data block of the above embodiment), the length of which is K bits, after Turbo encoding, and the data block K is generated by a data block L, the length of which is L bits, after CRC encoding, where N, K and L are all positive integers, and N≧K>L.


Herein the first transmission node is a terminal and the second transmission node is a base station or a relay; or the first transmission node is a base station or a relay, the second transmission node is a terminal.


Herein the Turbo code space is a set of codewords generated by traversing all data blocks of the same length and by the Turbo encoder.


For example, the data block having the length of F bits has 2F codewords in the code space generated after the FEC encoding.


In the present embodiment, the first transmission node receives the transmission signal containing the data block D and transmitted by the second transmission node, indicating that the method further includes: the transmission signal including the signal after being by modulated the data block D.


In the present embodiment, the data block D may be a code block or a transmission block including only one code block, or may be a transmission block including a plurality of code blocks.


Specifically, if the data block D is a code block or a transmission block including only one code block, the transmission signal is generated by the following manners, including Step S8020 to Step S8026 (not shown).


At Step S8020: A data block I is subjected to CRC encoding, and the CRC redundancy bit is added to generate a data block K, and if the data block K is a block, the added CRC redundancy bit is a redundant bit generated by the code block CRC generation polynomial; if the data block K is a transmission block, the added CRC redundancy bit is a redundant bit generated by the transmission block CRC generation polynomial.


Herein the method further includes: determining the length of the redundant bit of the code block CRC or the transmission block CRC according to the length L of the data block I.


In the present embodiment, the range of values of the length L is dividied into T intervals in an ascending order: L1,L2, LT, where each interval corresponds to the CRC redundant bits of different lengths, L1CRC,L2CRC, . . . LTCRC, and L1CRC, L2CRC, . . . LTCRC. The data block K is generated by CRC encoding the data block I with a corresponding length according to the value range to which L belongs.


At Step S8021: The data block K is subjected to the Turbo code encoding to generate a master codeword M, and the master codeword M is subjected to rate matching to generate the data block D, and the rate matching includes at least one of interleaving the master codeword M, and deleting or repeating the master codeword according to the transmission code rate.


At Step S8022: The data containing the data block D is modulated to generate the transmission signal, and the modulation includes at least one of: performing digital baseband modulation of the data containing the data block D to generate a modulation symbol; performing Multiple-Input Multiple-Output (MIMO) precoding on the modulation symbol; mapping the modulation symbol to a corresponding physical channel resource to generate a baseband signal; and converting the baseband signal into a radio frequency signal.


Herein the digital baseband modulation includes at least one of the following modulation modes: Binary Phase Shift Key (BPSK), Quadrature Phase Shift Keying (QPSK), 16 Quadrature Amplitude Modulation (QAM), 32QAM, 64QAM, 256QAM, 512QAM, and 1024QAM.


Specifically, if the data block D is a transmission block containing a plurality of code blocks, the transmission signal is generated in the following manner.


At Step S8023: The data block I is subjected to transmission block CRC encoding, the transmission block CRC redundancy bit is added, and the data block I is generated.


At Step S8024: The code block I is subjected to code block division to generate a plurality of code blocks, each of the code blocks is subjected to the code block CRC encoding, and the code block CRC redundancy bit is added; and the data block K contains the data block I and the added transmission block CRC and the code block CRC, as shown in FIG. 9, the data block K containing a plurality of code blocks in FIG. 9.


Herein the method further includes determining the length of the redundant bits of the transmission block CRC according to the length L of the data block I.


In the present embodiment, the range of values of the length L is dividied into T intervals in an ascending order: L1,L2, . . . LT where each interval corresponds to the CRC redundant bits of different lengths, L1CRC,L2CRC, . . . LTCRC, and L1CRC,L2CRC, . . . LTCRC. The data block K is generated by CRC encoding the data block I with a corresponding length according to the value range to which L belongs.


Herein the method further includes determining the length of the redundant bits of the code block CRC by the length L′ of each code block after the code block division is performed according to the data block I.


In the present embodiment, the range of values of the length L′ is dividied into T intervals in an ascending order: L′1,L′2, . . . L′T, where each interval corresponds to the CRC redundant bits of different lengths, L′1CRC, L′2CRC, . . . L′TCRC, and L′1CRC,L′2CRC, . . . L′TCRC. The data block is subjected to CRC encoding with a corresponding length according to the value range to which L′ belongs.


At Step S8025: The data block K is subjected to the Turbo code encoding, and a plurality of code blocks (including a code block CRC and a transmission block CRC) in the data block K are respectively encoded to generate a master codeword of each code bloc. The master codeword is subjected to rate matching and code block concatenation to generate the data block K, and the rate matching includes at least one of: interleaving the master codeword; deleting or repeating the master codeword according to the transmission rate or the available physical channel resources and the modulation mode;


At Step S8026: The data containing the data block D is modulated to generate the transmission signal, and the modulation includes at least one of: performing digital baseband modulation of the data containing the data block D to generate a modulation symbol; performing MIMO precoding on the modulation symbol; mapping the modulation symbol to a corresponding physical channel resource and generating a time domain baseband signal; and converting the time domain baseband signal into a radio frequency signal.


Herein the digital baseband modulation includes at least one of the following modulation modes: BPSK, QPSK, 16QAM, 32QAM, 64QAM, 256QAM, 512QAM, and 1024QAM.


At Step S804: The first transmission node generates estimation custom-character (equivalent to the first estimation matrix of the above embodiment, and the estimation matrix of the data block represents the estimation custom-character in FIG. 8) of the data block D and estimation custom-character (equivalent to the second estimation matrix of the above embodiment, and the estimation matrix of the data block K represents the estimation custom-character in FIG. 8) of the data block K according to the transmission signal.


Herein the first transmission node demodulates the received transmission signal to generate estimation custom-character of the data block D; and the demodulation includes at least one of converting the radio frequency signal into a time domain baseband signal; extracting a modulation symbol from the time domain baseband signal; performing a demodulation MIMO on the modulation symbol; and performing digital baseband demodulation on the modulation symbol.


If the data block D is a block or a transmission block including only one code block, the first transmission node demodulates the received transmission signal and the Turbo decoder generates estimation custom-character of the data block D.


In the present embodiment, if the data block D is a transmission block including a plurality of code blocks, the first transmission node demodulates the received transmission signal and performs Turbo decoding on each code block after performing code block division on the demodulated soft bits, respectively, to generate estimation custom-character of the data block K.


At Step S806: If the custom-character is a codeword in the Turbo code space, and the CRC check of the custom-character is correct, the first transmission node judges that the information block I is received correctly; if the custom-character is not a codeword in the Turbo code space, or the CRC check of the custom-character is wrong, the first transmission node judges that that the information block I is not received correctly.


Herein if the data block D is a code block or a transmission block including only one code block, the custom-character is a codeword in the code space, indicating that: the code block or the transmission block is a codeword in the Turbo code space.


Herein if the D is a transmission block including a plurality of code blocks, the custom-character is a codeword in the code space, indicating that: all of the code blocks in the custom-character are codewords in the Turbo code space.


In certain embodiment, it is determined that the data block (a code block or transmission block) in the custom-character is a codeword in the code space by at least one of the following manners or any combination thereof.


Manner One:


comparing side information Λie1 corresponding to K bits output by a first component decoder after the jth iteration with the first threshold Y1, respectively, and if Λie1≧Y1, the bit i is judged to be “1”, if Λie1<Y1, the bit i is judged to be 0, and generating the bit sequence E1 according to the judging result, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1, and e1 represents that the Λie1 is the side information output by the first component decoder;


comparing side information Λie2<Y1, corresponding to K bits output by a second component decoder in the jth iteration with the first threshold Y1, respectively, and if Λie2≧Y1, the bit i is judged to be “1”, if Λie2<Y1, the bit i is judged to be 0, and generating the bit sequence E2 according to the judging result, where e2 represents that the Λie2 is the side information output by the second component decoder;


interleaving the bit sequence E1 using an inner interleaver pattern of the Turbo code, generating an interleaved bit sequence E1int, and comparing the size relationship between E1int and E2, and if the E1int=E2, the data block generated by being decoded by the Turbo code after j iterations is a codeword in the FEC code space; if E1int≠E2, the data block generated after j iterations is not a codeword in the FEC code space, where int represents that the E1int is the interleaved information or bit sequence; or


deinterleaving the E2 using an inner interleaver of the Turbo code, generating an deinterleaved bit sequence E2dei, and comparing E1 and E2dei, and if the E2dei=E1, the data block generated by being encoded by the Turbo code after j iterations is a codeword in the FEC code space; if E2dei≠E1, the data block generated after j iterations is not a codeword in the FEC code space, where die represents that the E2dei is the deinterleaved information or bit sequence.


Manner Two:


comparing the symbol sign(Λij of soft information of K bits output by the Turbo code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2.


Manner Three:


comparing the symbol sign(Λij) of soft information of K bits output by the Turbo code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is less than or equal to a second threshold Y2, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2; or


if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to a third threshold Y3, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the third threshold Y3, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Four:


comparing the symbol sign(Λia2) of priori information of K bits input to a second component decoder in the jth iteration and the symbol sign(Λie2) of side information of K bits output by a second component decoder in the jth iteration, and if the number of bits in which sign(Λia2) and sign(Λie2) are the same is less than or equal to a fourth threshold Y4, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, where a2 represents that the sign(Λia2) is priori information input to the second component decoder; or


if the number of bits in which sign(Λia2) and sign(Λie2) are different is less than or equal to a fifth threshold Y5, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λia2) and sign(Λie) are different is greater than the fifth threshold Y5, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Five:


comparing the absolute value |Λij| of the soft information of K bits output by the Turbo code decoder after the jth iteration with a sixth threshold Y6, and if the maximum value in |Λij| is greater than the sixth threshold Y6, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the sixth threshold Y6, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Six:


comparing the mean value







S
j

=


1
K






i
=
1

k





Λ
i
j









or the absolute value of the soft information of K bits output by the Turbo code decoder after the jth iteration with a seventh threshold Y7, and if Sj is greater than the seventh threshold Y7, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is less than or equal to the seventh threshold Y7, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Seven:


comparing the sum







S
j

=




i
=
1

k





Λ
i
j








of the absolute value of the soft information of K bits output by the Turbo code decoder after the jth iteration with the sum







S

j
-
1


=




i
=
1

k





Λ
i

j
+
1









of the absolute value of the soft information of K bits output by the Turbo code decoder after the j-1th iteration, and if Sj is less than or equal to Sj−1, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is greater than Sj−1, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, and the first threshold Y1 to the seventh threshold Y7 are integers greater than or equal to zero, and the first threshold Y1 to the seventh threshold Y7 may be equal or partially equal, or may be completely unequal.


Herein the CRC check of custom-character is correct or wrong, indicating that the method includes that:


if the data block D is a code block or a transmission block containing only one code block, the custom-character is subjected to the code block CRC or the transmission block CRC check, and if the code block CRC or the transmission block CRC check is passed, the CRC check of the custom-character is correct, otherwise, the CRC check of the custom-character is wrong; and


if the data block D is a transmission block including a plurality of code blocks, if the following conditions are satisfied at the same time, the CRC check of the custom-character is correct, otherwise, the CRC check of the custom-character is wrong.


Condition 1: In the custom-character, the code block CRC checks of all the code blocks are passed.


Condition 2: In the custom-character, after the CRC of each code block is removed, the estimation custom-character of the data block I′ is obtained, and the transmission block CRC check of custom-character is passed.


In the present embodiment, the method further includes the following steps.


At Step S808: If the first transmission node judges that the information block I is received correctly, an ACK message is transmitted to the second transmission node; and if the first transmission node judges that the information block I is not received correctly, NACK information is transmitted to the second transmission node.


In certain embodiments, the method further includes the following steps.


At Step S808-1: When the first transmission node is a terminal and the second transmission node is a base station (or relay); or when the first transmission node is a base station (or relay) and the second transmission node is a terminal, the method further includes that:


the terminal receives an indication signaling for configuring the data checking mode and transmitted by the base station (or relay), and the data checking mode includes at least one of: the data checking method as described in Step 103, or the data checking method based on CRC.


In certain embodiments, the method further includes:


At Step S808-2: When the first transmission node is a terminal and the second transmission node is a base station (or relay); or when the first transmission node is a base station (or relay) and the second transmission node is a terminal, the method further includes that:


the terminal receives an indication signaling for configuring the data checking mode and transmitted by the base station (or relay), and the data checking mode includes at least one of: the data checking method as described in Step 103, or the data checking method based on CRC.


In certain embodiments, the method further includes the following steps.


At Step S808-3: If the length of the transmission block or code block in the data block D is smaller than the preset threshold value Z1 (bit) or the number of repetitions of the transmission block or code block in the data block D is greater than the preset threshold value Z2, the first transmission node performs data checking using the data checking method described in Step S806, otherwise, the first transmission node uses the manner of CRC to perform data checking.


EXAMPLE 1

In the MTC application, the base station receives the transmission signal containing the data block D and transmitted by the terminal, the length of the data block D is 1536 bits, and the data block D includes only one code block. The data block D is generated by the data block K of 768 bit after Turbo encoding, and the Turbo encoder first encodes the master codeword having a length of 2316 bits, and then, performs rate matching operation on the master codeword such as deleting according to the transmission code rate of ½ to obtain the data block D having a length of 1536 bits,


Herein the data block K is obtained by a transmission block I with a length of 760 bits after a transmission block CRC encoding of 8 bits.


Herein the transmission signal received by the base station is a signal transmitted by the terminal after the data block D has been modulated.


The base station demodulates the received transmission signal to obtain the estimation custom-character of the data block D, inputs the custom-character to the Turbo code decoder, and determines the custom-character is a codeword in the code space in the following manner:


comparing side information Λie1 corresponding to K bits output by a first component decoder after the jth iteration with the first threshold Y1=0, respectively, and if Λie1≧Y1, the bit i is judged to be “1”, if Λie1<Y1, the bit i is judged to be 0, and generating the bit sequence E1 according to the judging result, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1, and ei represents that the Λie1 is the side information output by the first component decoder;


comparing side information Λie2 corresponding to K bits output by a second component decoder in the jth iteration with the first threshold Y1=0, respectively, and if Λie1≧Y1, the bit i is judged to be “1”, if Λie2<Y1, the bit i is judged to be 0, and generating the bit sequence E2 according to the judging result, where e2 represents that the Λie2 is the side information output by the second component decoder;


interleaving the bit sequence E1 using an inner interleaver pattern of the Turbo code, generating an interleaved bit sequence E1int, and comparing the size relationship between E1int and E2, and if the E1int=E2, the data block generated by being decoded by the Turbo code after j iterations is a codeword in the FEC code space; if E1int≠E2, the data block generated after j iterations is not a codeword in the FEC code space, where int represents that the E1int is the interleaved information or bit sequence; or


deinterleaving the E2 using an inner interleaver of the Turbo code, generating an deinterleaved bit sequence E2dei, and comparing E1 and E2dei=E1, and if the E2de1 =E1, the data block generated by being encoded by the Turbo code after j iterations is a codeword in the FEC code space; if E2dei≠E1, the data block generated after j iterations is not a codeword in the FEC code space, where die represents that the E2dei is the deinterleaved information or bit sequence.


If the custom-character is not a codeword in the code space, the base station judges that the transmission block I is not received correctly.


If the custom-character is a codeword in the code space, the estimation custom-character of the data block K obtained by the Turbo code after j iterations is subjected to the transmission block CRC checking of 8 bits; if the check is passed, the base station judges that the transmission block I is received correctly; otherwise, the base station judges that the transmission block I is not received correctly.


In the present embodiment, if the base station judges that the transmission block I is received correctly, the base station feeds back the ACK to the terminal; if the base station judges that the transmission block I is not received correctly, the base station feeds back the NACK to the terminal.


EXAMPLE 2

The difference between Example 2 and Example 1 is that the terminal receives the transmission signal containing the data block D and transmitted by the base station and if the terminal also receives the indication signaling transmitted by the base station, the indication signaling is used to configure the data checking mode of the data block D. If the signaling indicates a data checking method of combining CRC and FEC is used, the terminal uses the same data checking method as Example 1; otherwise, the terminal still uses the conventional CRC data checking method.


EXAMPLE 3

The difference between Example 3 and Example 1 is that the base station determines the data checking method according to the size of the transmission block transmitted by the terminal or the number of repetitions of the transmission block. Specifically, when the length of the transmission block is smaller than a preset threshold value Z1 or the number of repetitions of the transmission block or code block is greater than the preset threshold value Z2, the base station uses the same data checking method as Example 1; otherwise, the base station still employs a conventional CRC data checking method.


EXAMPLE 4

The difference between Example 4 and Example 1 is that the base station also transmits an indication signaling to the terminal about the data checking mode, and the checking mode at least includes indicating that the data checking method is a data checking method in Example or a conventional CRC data checking method.


The exemplary embodiment of the present disclosure achieves the following technical effects: in the LTE system, transmissions block I, which normally has a length of 760 bits, and needs to add a 24-bit CRC. As can be seen in Example 1, the transmission block I only add an 8-bit CRC, but by means of the code space detecting method, it is possible to overcome the case that the false detection rate is increased due to the shorter CRC. Therefore, according to the method of the present disclosure, it is possible to reduce the CRC length of the data block and improve the transmission efficiency.


Exemplary Embodiment Two

The difference between the exemplary embodiment two and the exemplary embodiment one is that, in the exemplary embodiment two, the FEC is an LDPC code.


Step S805: It is determined that the data block (a code block or transmission block) in custom-character is a codeword in the code space by at least one of the following manners one to seven or any combination thereof.


Manner One:


comparing soft information Λij of N codeword bits output by an LDPC code decoder after the jth iteration with the eighth threshold Y8, and if Λij≧Y8, the bit i is judged to be “1”, if Λij<Y8, the bit i is judged to be 0, and generating the estimation custom-character of the data block according to the judging result, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;


if custom-character×HT=0, E generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if custom-character×HT≠0, the custom-character is not a codeword in the FEC code space, where H is a check matrix of the LDPC code.


Manner Two:


comparing soft information Λij of N codeword bits output by an LDPC code decoder after the jth iteration with the eighth threshold Y8, and if Λij≧Y8, the bit i is judged to be “1”, if Λij<Y8, the bit i is judged to be 0, generating the estimation custom-character of the first data block according to the judging result, and generating the estimation custom-character of the bit sequence by taking the first K bits for the estimation custom-character, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;


generating the data block C by performing LDPC encoding on the custom-character, and if custom-character=C, the custom-character is a codeword in the FEC code space; and if custom-character≠C, the custom-character is not a codeword in the FEC code space.


Manner Three:


comparing the symbol sign(Λij) of soft information of N codeword bits output by a LDPC code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2.


Manner Four:


comparing the symbol sign(Λij) of soft information of N codeword bits output by a LDPC code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is greater than or equal to a ninth threshold Y9, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to the ninth threshold Y9, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2; or


if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to a tenth threshold Y10, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the tenth threshold Y10, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Five:


comparing the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with an eleventh threshold Y11, and if the minimum value in |Λij| is greater than the eleventh threshold Y11, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the eleventh threshold Y11, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1.


Manner Six:


comparing the mean value







S
j

=


1
N






i
=
1

k





Λ
i
j









of the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with a twelfth threshold Y12, and if Sj is greater than the twelfth threshold Y12, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is less than or equal to the twelfth threshold Y12, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1.


Manner Seven:


comparing the sum







S
j

=




i
=
1

k





Λ
i
j








of the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with the sum







S
j

=




i
=
1

k





Λ
i

j
-
1









of the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the j-1th iteration, and if Sj is less than or equal to Sj−1, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is greater than Sj−1, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2, and the eighth threshold Y8 to the twelfth threshold Y12 are integers greater than or equal to zero, and the eighth threshold Y8 to the twelfth threshold Y12 may be equal or partially equal, or may be completely unequal.


EXAMPLE 5

In the wireless broadband application IEEE 802.11 system, the terminal receives the transmission signal containing the data block D and transmitted by the base station, the length of the data block D is 6720 bits, and the data block D includes 10 code blocks. The data block D is generated by the 5040-bit data block K after LDPC encoding, and the information bit sequence length of each code block in the data block K is 504 bits, and an LDPC encoder with a ¾ rate is used to generate a codeword bit sequence of each code block of 672 bits. 10 code blocks are cascaded to obtain the data block D with a length of 6720 bits.


Herein the data block K is obtained by a transmission block I with a length of 4952 bits after the 8-bit transmission block CRC and the code block CRC encoding; it is described specifically as follows.


The 8-bit transmission block CRC is first added to the transmission block Ito generate a data block I′ with a length of 4960 bits; the code block I′ is subjected to code block division to obtain 10 code blocks, each of which has a length of 496 bits, the length of each code block is 504 bits after each code block is added with an 8-bit code block CRC; the 10 code blocks are concatenated to obtain the data block K.


Herein the transmission signal received by the base station is a signal transmitted by the terminal after the data block D has been modulated.


The base station demodulates the received transmission signal to obtain the estimation custom-character of the data block D, performs code block division on the custom-character to obtain 10 code blocks, inputs the 10 code blocks to the LDPC code decoder, respectively, and determines that a data block (a code block) in the custom-character is a codeword in the code space in the following manner:


comparing soft information Λij of N codeword bits output by an LDPC code decoder after the jth iteration with the eighth threshold Y8, and if Λij≧Y8, the bit i is judged to be “1”, if Λij<Y8, the bit i is judged to be 0, and generating the estimation custom-character of the data block according to the judging result, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;


if custom-character×HT=0, custom-character generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if custom-character×HT≠0, the custom-character is not a codeword in the FEC code space, where H is a check matrix of the LDPC code.


In the present example, the data block D is a transmission block including a plurality of code blocks. If all the code blocks are codewords in the code space, the data block custom-character is a codeword in the code space, otherwise, the data block custom-character is not a codeword in the code space.


In the present example, the data block D is a transmission block including a plurality of code blocks. If the following conditions are satisfied at the same time, the CRC check of custom-character is correct, otherwise, the CRC check of the custom-character is wrong.


Condition 1: In the custom-character, the code block CRC checks of all the code blocks are passed.


Condition 2: In the custom-character, after the CRC of each code block is removed, the estimation custom-character of the data block I′ is obtained, and the transmission block CRC check of the custom-character is passed.


If the custom-character is not a codeword in the code space, the base station judges that the transmission block I is not received correctly.


If the custom-character is a codeword in the code space, and the CRC check of the custom-character is correct, the base station judges that the transmission block I is received correctly, otherwise, the base station judges that the transmission block I is not received correctly.


In the present embodiment, if the base station judges that the transmission block I is received correctly, the base station feeds back the ACK to the terminal; if the base station judges that the transmission block I is not received correctly, the base station feeds back the NACK to the terminal.


The exemplary embodiment of the present disclosure achieves the following technical effects. In the IEEE 802.11, the code block generally does not have a CRC, and if the data is not received correctly, the entire transmission block needs to be retransmitted. In order to improve the retransmission efficiency, it is possible to add a CRC to the code block, and retransmission can only be done for the wrong code block. However, if the CRC length is too long, it will bring more redundancy and reduce the transmission efficiency. If the CRC is too short, it will make the error detection performance not credible. By using the method of the present disclosure, CRC of only 8 bits is added for each code block so as to reach the detection target of the code block level, and the proportion of the increased CRC redundancy does not exceed 2%.


Exemplary Embodiment Three

The difference between the exemplary embodiment three and the exemplary embodiment one is that, in the exemplary embodiment three, the FEC is a convolution code.


Step S805: It is determined that the data block (a code block or transmission block) in the custom-character is a codeword in the code space by at least one of the following manners one to seven or any combination thereof.


Manner One:


comparing the symbol sign(Λij) of soft information of K bits output by the convolution code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2.


Manner Two:


comparing the symbol sign(Λij) of soft information of K bits output by the convolution code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is greater than or equal to a thirteenth threshold Y13, the data block generated after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is less than or equal to the thirteenth threshold Y13, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2; or


if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than or equal to a fourteenth threshold Y14, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the fourteenth threshold Y14, the data block generated after the jth iteration is not a codeword in the FEC code space.


Manner Three:


comparing the absolute value |Λij| of the soft information of K bits output by the convolution code decoder after the jth iteration with a fifteenth threshold Y15, and if the maximum value in |Λij| is greater than the fifteenth threshold Y15, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the fifteenth threshold Y15, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Four:


comparing the mean value







S
j

=


1
K






i
=
1

k





Λ
i
j









of the absolute value of the soft information of K bits output by the convolution code decoder after the jth iteration with a sixteenth threshold Y16and if Sj is greater than the sixteenth threshold Y16, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if Sj is less than or equal to the sixteenth threshold Y16, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1.


Manner Five:


comparing the sum







S
j

=




i
=
1

k





Λ
i
j








of the absolute value of the soft information of K bits output by the convolution code decoder after the jth iteration with the sum







S

j
-
1


=




i
=
1

k





Λ
i

j
-
1









of the absolute value of the soft information of K bits output by the LDPC code decoder after the j-1th iteration, and if Sj is less than or equal to Sj−1, the data block is a codeword in the FEC code space; and if Sj is greater than Sj−1, the data block is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, and the thirteenth threshold Y13 to the sixteenth threshold Y16 are integers greater than or equal to zero.


EXAMPLE 6

In the wireless broadband application IEEE 802.11 system, the terminal receives the transmission signal containing the data block D and transmitted by the base station, the length of the data block D is 6720 bits, and the data block D includes 10 code blocks. The data block D is generated by the 5040-bit data block K after convolution code encoding, and the information bit sequence length of each code block in the data block K is 504 bits, and a convolution encoder with a ¾ rate is used to generate a codeword bit sequence of each code block of 672 bits. 10 code blocks are cascaded to obtain the data block D with a length of 6720 bits.


Herein the data block K is obtained by a transmission block I with a length of 4952 bits after the 8-bit transmission block CRC and the code block CRC encoding; it is described specifically as follows.


The 8-bit transmission block CRC is first added to the transmission block Ito generate a data block I′ with a length of 496 bits; the code block I′ is subjected to code block division to obtain 10 code blocks, each of which has a length of 496 bits, the length of each code block is 504 bits after each code block is added with an 8-bit code block CRC; the 10 code blocks are concatenated to obtain the data block K.


Herein the transmission signal received by the base station is a signal transmitted by the terminal after the data block D has been modulated.


The base station demodulates the received transmission signal to obtain the estimation {dot over (D)} of the data block D, performs code block division on the custom-character to obtain 10 code blocks, inputs the 10 code blocks to a SOVA decoder of the convolution code, respectively, and determines that a data block (a code block) in the custom-character is a codeword in the code space in the following manner:


comparing the symbol sign(Λij) of soft information of K bits output by the convolution code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, and if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2.


In the present example, the data block D is a transmission block including a plurality of code blocks. If all the code blocks are codewords in the code space, the data block custom-character is a codeword in the code space, otherwise, the data block custom-character is not a codeword in the code space.


In the present example, the data block D is a transmission block including a plurality of code blocks. If the following conditions are satisfied at the same time, the CRC check of custom-character correct, otherwise, the CRC check of the custom-character is wrong.


Condition 1: In the custom-character, the code block CRC checks of all the code blocks are passed.


Condition 2: In the custom-character, after the CRC of each code block is removed, the estimation custom-character of the data block I′ is obtained, and the transmission block CRC check of custom-character is passed.


If the custom-character is not a codeword in the code space, the base station judges that the transmission block I is not received correctly.


If the custom-character is a codeword in the code space, and the CRC check of the custom-character is correct, the base station judges that the transmission block I is received correctly, otherwise, the base station judges that the transmission block I is not received correctly.


In the present embodiment, if the base station judges that the transmission block I is received correctly, the base station feeds back the ACK to the terminal; if the base station judges that the transmission block I is not received correctly, the base station feeds back the NACK to the terminal.


The exemplary embodiment of the present disclosure achieves the following technical effects. In the IEEE 802.11, the code block generally does not have a CRC, and if the data is not received correctly, the entire transmission block needs to be retransmitted. In order to improve the retransmission efficiency, it is possible to add a CRC to the code block, and retransmission can only be done for the wrong code block. However, if the CRC length is too long, it will bring more redundancy and reduce the transmission efficiency. If the CRC is too short, it will make the error detection performance not credible. By using the method of the present disclosure, CRC of only 8 bits is added for each code block so as to reach the detection target of the code block level, and the proportion of the increased CRC redundancy does not exceed 2%.


The units described as a separating component may or may not be physically separate, and the components shown as units may or may not be physical units, i.e., may be located in one place or may be distributed over a plurality of network units. A part or all of the units may be selected according to the actual needs to achieve the object of the solution of the present embodiment.


Alternatively, all or a part of the steps of the embodiments described above may also be implemented using an integrated circuit. These steps may be separately made into one integrated circuit module or a plurality of modules or steps therein may be made into a single integrated circuit module for implementing. Thus, the present disclosure is not limited to any particular combination of hardware and software.


In another embodiment, there is also provided a software for performing the technical solutions described in the above embodiments and exemplary embodiments.


In another embodiment, there is also provided a storage medium in which the above software is stored, including but not limited to optical disks, floppy disks, hard disks, erasable memories, and so on.


It is to be understood that the terms “first”, “second” and so on in the specification and claims of the present disclosure and in the accompanying drawings are for distinguishing similar objects and are not necessarily used to describe a particular order or sequence. It is to be understood that the objects so used are interchangeable where appropriate so that the embodiments of the present disclosure described herein can be carried out in an order other than those illustrated or described herein. In addition, the terms “including” and “having” and any variations thereof are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device that includes a series of steps or units are not necessarily limited to these steps or units that are clearly listed, but may include other steps or units that are not clearly listed or inherent to these processes, methods, products, or devices.


The embodiment of the present disclosure has the following technical effect: the problems that a transmission rate decreases due to the fact that a CRC check code is too long and a false detection rate cannot be ensured due to the fact that the CRC check code is too short are solved, so as to reduce the length of the CRC in the case of meeting the requirement of the system error detection rate, thereby reducing the data redundancy rate and improving the transmission efficiency.


Obviously, those skilled in the art should know that each module or step of the embodiment of the present disclosure may be implemented by a universal computing device, and the modules or steps may be concentrated on a single computing device or distributed on a network formed by a plurality of computing devices, and may optionally be implemented by programmable codes executable for the computing devices, so that the modules or steps may be stored in a storage device for execution with the computing devices, and, in some cases, the steps shown or described may be performed in a order different from the order herein, or the modules or steps may form each integrated circuit module, or multiple modules or steps therein may form a single integrated circuit module for implementation. As a consequence, the present disclosure is not limited to any specific hardware and software combination.


The above is only the exemplary embodiment of the present disclosure and not intended to limit the present disclosure, and for the technician of the field, the present disclosure may have various modifications and variations. Any modifications, equivalent replacements, improvements and the like shall fall within the scope of protection as defined in the present disclosure.


INDUSTRIAL APPLICABILITY

According to the technical solution provided by the embodiment of the present disclosure, the technical solution of checking the received data block by comprehensively using the FEC code space and the CRC check solves the problems that a transmission rate decreases due to the fact that a CRC check code is too long and a false detection rate cannot be ensured due to the fact that the CRC check code is too short, so as to reduce the length of the CRC in the case of meeting the requirement of the system error detection rate, thereby reducing the data redundancy rate and improving the transmission efficiency.

Claims
  • 1. A data checking method, comprising: receiving a transmission signal containing a first data block and transmitted by a transmission node, wherein the first data block has a length of N bits, and the first data block is generated by performing a Forward Error Correction code (FEC) encoding on a second data block which has a length of K bits, and the second data block is generated by performing a Cyclic Redundancy Check code (CRC) encoding on a third data block which has a length of L bits, where N, K and L are positive integers, and N≧K>L;obtaining a first estimation data block of the first data block according to the transmission signal, and obtaining a second estimation data block of the second data block according to the transmission signal; andchecking the third data block according to a relationship between the first estimation data block and an FEC code space and/or a CRC check result of the second estimation data block.
  • 2. The method as claimed in claim 1, wherein checking the third data block according to a relationship between the first estimation data block and an FEC code space and/or a CRC check result of the second estimation data block, comprises: judging that the third data block is received correctly when the first estimation data block is a codeword of the FEC code space and the CRC check of the second estimation data block is correct; andjudging that the third data block is not received correctly when the first estimation data block is not a codeword of the FEC code space and/or the CRC check of the second estimation data block fails.
  • 3. The method as claimed in claim 2, wherein when the first data block is a code block or a transmission block containing a code block, the first estimation data block is a codeword of the FEC code space indicating that: the code block or the transmission block is a codeword in the FEC code space; orwhen the first data block is a transmission block containing a plurality of data blocks, the first estimation data block is a codeword of the FEC code space indicating that: the plurality of data blocks are codewords in the FEC code space.
  • 4. The method as claimed in claim 2, wherein when it is judged that the third data block is received correctly, transmitting Acknowledgment (ACK) information to the transmission node; andwhen it is judged that the third data block is not received correctly, transmitting Non-Acknowledgment (NACK) information to the transmission node.
  • 5. The method as claimed in claim 2, wherein the FEC encoding comprises at least one of: a Turbo code, a Low Density Parity Check (LDPC) code, and a convolution code.
  • 6. The method as claimed in claim 5, wherein when the FEC encoding is a Turbo code, determining whether the data block is a codeword in the FEC code space by at least one of the following manners: manner one:comparing side information Λie1 corresponding to K bits output by a first component decoder after the jth iteration with the first threshold Y1, respectively, wherein if Λie1≧Y1, the bit i is judged to be “1”, if Λie1<Y1, the bit i is judged to be 0, and generating the bit sequence E1 according to the judging result, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1, and e1 represents that the Λie1 is the side information output by the first component decoder;comparing side information Λie2 corresponding to K bits output by a second component decoder in the jth iteration with the first threshold Y1, respectively, wherein if Λie2≧Y1, the bit i is judged to be “1”, if Λie2<Y1, the bit i is judged to be 0, and generating the bit sequence E2 according to the judging result, where e2 represents that the Λie2 is the side information output by the second component decoder;interleaving the bit sequence E1 using an inner interleaver pattern of the Turbo code, generating an interleaved bit sequence E1int, and comparing E1int with E2, wherein if the E1int=E2, the data block generated by being decoded by the Turbo code after j iterations is a codeword in the FEC code space; if E1int≠E2, the data block generated after j iterations is not a codeword in the FEC code space, where int represents that the E1int is the interleaved information or bit sequence; ordeinterleaving the E2 using an inner interleaver of the Turbo code, generating an deinterleaved bit sequence E2dei, and comparing E1 with E2dei, wherein if the E2dei=E1, the data block generated by being encoded by the Turbo code after j iterations is a codeword in the FEC code space; if E2dei≠E1, the data block generated after j iterations is not a codeword in the FEC code space, where die represents that the E2dei is the deinterleaved information or bit sequence;manner two:comparing the symbol sign(Λij) of soft information of K bits output by the Turbo code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, wherein if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and ifsign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2;manner three:comparing the symbol sign(Λij) of soft information of K bits output by the Turbo code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, wherein if the number of bits in which sign(Λij) and sign(Λij−1) are the same is less than or equal to a second threshold Y2, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2; orif the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to a third threshold Y3, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λhu j−1) are different is greater than the third threshold Y3, the data block generated after the jth iteration is not a codeword in the FEC code space;manner four:comparing the symbol sign(Λia2) of priori information of K bits input to a second component decoder in the jth iteration and the symbol sign(Λie2) of side information of K bits output by a second component decoder in the jth iteration, wherein if the number of bits in which sign(Λia2) and sign(Λie2) are the same is less than or equal to a fourth threshold Y4, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2, where a2 represents that the sign(Λia2) is priori information input to the second component decodern; orif the number of bits in which sign(Λia2) and sign(Λie2) are different is less than or equal to a fifth threshold Y5, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λia2) and sign(Λie2) are different is greater than the fifth threshold Y5, the data block generated after the jth iteration is not a codeword in the FEC code space;manner five:comparing the absolute value |Λij| of the soft information of K bits output by the Turbo code decoder after the jth iteration with a sixth threshold Y6, wherein if the maximum value in |Λij| is greater than the sixth threshold Y6, the data block generated by the Turbo code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the sixth threshold Y6, the data block generated by the Turbo code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1;manner six:comparing the mean value
  • 7. The method as claimed in claim 5, wherein when the FEC encoding is the LDPC code, determining whether the data block is a codeword in the FEC code space by at least one of the following manners: manner one:comparing soft information Λijof N codeword bits output by an LDPC code decoder after the jth iteration with the eighth threshold Y8, wherein if Λij≧Y8, the bit i is judged to be “1”, if Λij<Y8, the bit i is judged to be 0, and generating the estimation of the data block according to the judging result, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;if ×HT=0, generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if HT ≠0, the is not a codeword in the FEC code space, where H is a check matrix of the LDPC code;manner two:comparing soft information Λij of N codeword bits output by an LDPC code decoder after the jth iteration with the eighth threshold Y8, wherein if Λij≧Y8, the bit i is judged to be “1”, if Λij<Y8, the bit i is judged to be 0, generating the estimation of the first data block according to the judging result, and generating the estimation of the bit sequence by taking the first K bits for the estimation , where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;generating the data block C by performing LDPC encoding on the , wherein if =C, the is a codeword in the FEC code space; and if ≠C, the is not a codeword in the FEC code space;manner three:comparing the symbol sign(Λij) of soft information of N codeword bits output by a LDPC code decoder after the jth iteration with the soft information sign(Λjj−1) output by a decoder after the j-1th iteration, wherein if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2;manner four:comparing the symbol sign(Λij) of soft information of N codeword bits output by a LDPC code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, wherein if the number of bits in which sign(Λij) and sign(Λij−1) are the same is greater than or equal to a ninth threshold Y9, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; if the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to the ninth threshold Y9, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 2; orif the number of bits in which sign(Λij) and sign(Λij−1) are different is less than or equal to a tenth threshold Y10, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the tenth threshold Y10, the data block generated after the jth iteration is not a codeword in the FEC code space;manner five:comparing the absolute value of the soft information of N codeword bits output by the LDPC code decoder after the jth iteration with an eleventh threshold Y11, wherein if the minimum value |Λij| is greater than the eleventh threshold Y11, the data block generated by the LDPC code decoder after the jth iteration is a codeword in the FEC code space; and if the minimum value in |Λij| is less than or equal to the eleventh threshold Y11, the data block generated by the LDPC code decoder after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . N-1}, j is an integer greater than or equal to 1;manner six:comparing the mean value
  • 8. The method as claimed in claim 5, wherein when the FEC encoding is the convolution code, determining whether the data block is a codeword in the FEC code space by at least one of the following manners: manner one:comparing the symbol sign(Λij) of soft information of K bits output by the convolution code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, wherein if sign(Λij) and sign(Λij−1) of each bit are the same, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if sign(Λij) and sign(Λij−1) of at least one bit are different, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2;manner two:comparing the symbol sign(Λij) of soft information of K bits output by the convolution code decoder after the jth iteration with the soft information sign(Λij−1) output by a decoder after the j-1th iteration, wherein if the number of bits in which sign(Λij) and sign(Λij−1) are the same is greater than or equal to a thirteenth threshold Y13, the data block generated after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are the same is less than or equal to the thirteenth threshold Y13, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 2; orif the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than or equal to a fourteenth threshold Y14, the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space; and if the number of bits in which sign(Λij) and sign(Λij−1) are different is greater than the fourteenth threshold Y14, the data block generated after the jth iteration is not a codeword in the FEC code space;manner three:comparing the absolute value |Λij| of the soft information of K bits output by the convolution code decoder after the jth iteration with a fifteenth threshold Y15, wherein if the maximum value in is greater than the fifteenth threshold Y15the data block generated by the convolution code decoder after the jth iteration is a codeword in the FEC code space;and if the minimum value in |Λij| is less than or equal to the fifteenth threshold Y15, the data block generated after the jth iteration is not a codeword in the FEC code space, where i is an integer and i ∈ {0,1,2, . . . K-1}, j is an integer greater than or equal to 1;manner four:comparing the mean value
  • 9. The method as claimed in claim 1, further comprising: determining the length of the CRC according to the length L of the third data block.
  • 10. The method as claimed in claim 9, wherein determining the length of the CRC according to the length L of the third data block, comprising: dividing the range of values of the length L into T intervals in an ascending order: L1,L2, . . . LT, where each interval corresponds to the CRCs of different lengths: L1CRC,L2CRC, . . . LTCRC, wherein L1CRC,L2CRC, . . . LTCRC, and T is a positive integer; andselecting the length of the CRC used for encoding the third data block according to the value interval to which the length L of the third data block belongs.
  • 11. The method as claimed in claim 1, wherein the transmission node comprises at least one of: a base station, a relay node, and a terminal.
  • 12. The method as claimed in claim 11, wherein when the transmission node is a terminal, a transmission signaling for indicating a data checking mode is transmitted to the transmission node, wherein the data checking mode comprises at least one of: checking data according to the FEC code space and/or the CRC check result; and checking data according to the CRC check result.
  • 13. The method as claimed in claim 11, wherein when the transmission node is a base station or a relay node, an indication signaling for configuring the data checking mode and transmitted by the transmission node is received, wherein the data checking mode comprises at least one of: checking data according to the FEC code space and/or the CRC check result; checking data according to the CRC check result.
  • 14. The method as claimed in claim 13, wherein a data checking mode in which data is checked according to the FEC code space and/or the CRC check result is used in one of the following cases: the length of the transmission block or code block in the first data block is less than the first preset threshold;the number of repetitions of the transmission block or code block in the first data block is greater than the second preset threshold.
  • 15. The method as claimed in claims 1, wherein the FEC code space comprises: a set of all codewords generated using the FEC encoding manner.
  • 16. The method as claimed in claim 1, wherein obtaining the first estimation data block of the first data block according to the transmission signal comprises: obtaining the first estimation data block by demodulating the transmission signal; andobtaining the second estimation data block of the second data block according to the transmission signal comprises: obtaining the second estimation data block by demodulating and FEC decoding the transmission signal.
  • 17. A data checking device, comprising: a receiving module, configured to receive a transmission signal containing a first data block and transmitted by a transmission node, wherein the length of the first data block is N bits, the first data block is generated by performing a Forward Error Correction code (FEC) encoding on a second data block which has a length of K bits, and the second data block is generated by performing a Cyclic Redundancy Check code (CRC) encoding on a third data block which has a length of L bits, where N, K and L are all positive integers, and N≧K>L;a determining module, configured to obtain a first estimation data block of the first data block according to the transmission signal, and obtain a second estimation data block of the second data block according to the transmission signal; anda checking module, configured to check the third data block according to a relationship between the first estimation data block and an FEC code space and/or a CRC check result of the second estimation data block.
  • 18. The device as claimed in claim 17, wherein the checking module comprises: a first judging unit, configured to judge that the third data block is received correctly when the first estimation data block is a codeword of the FEC code space and the CRC check of the second estimation data block is correct; anda second judging unit, configured to judge that the third data block is not received correctly when the first estimation data block is not a codeword of the FEC code space and/or the CRC check of the second estimation data block fails.
  • 19. The device as claimed in claim 17, wherein the checking module is configured to check the third data block when the FEC code space comprises the following: a set of all codewords generated using the FEC encoding manner.
  • 20. The method as claimed in claim 14, wherein the first estimation data block of the first data block is obtained according to the transmission signal, comprising: obtaining the first estimation data block by demodulating the transmission signal; andthe second estimation data block of the second data block is obtained according to the transmission signal, comprising: obtaining the second estimation data block by demodulating and FEC decoding the transmission signal.
Priority Claims (1)
Number Date Country Kind
201410624160.3 Nov 2014 CN national
PCT Information
Filing Document Filing Date Country Kind
PCT/CN2015/076490 4/13/2015 WO 00