The present invention generally relates to error control and error correction encoding and decoding techniques for communication systems, and more particularly relates to block decoding techniques such as low-density parity-check (LDPC) decoding techniques.
Low-density parity-check (LDPC) codes have recently been the subject of increased research interest for their enhanced performance on additive white Gaussian noise (AWGN) channels. As described by Shannon's Channel Coding Theorem, the best performance is achieved when using a code consisting of very long codewords. In practice, codeword size is limited in the interest of reducing complexity, buffering, and delays. LDPC codes are block codes, as opposed to trellis codes that are built on convolutional codes. LDPC codes constitute a large family of codes including turbo codes. Block codewords are generated by multiplying (modulo 2) binary information words with a binary matrix generator. LDPC codes use a parity-check matrix H, which is used for decoding. The term low density derives from the characteristic that the parity-check matrix has a very low density of non-zero values, making it a relatively low complexity decoder while retaining good error protection properties.
The parity-check matrix H measures (N−K)×N, wherein N represents the number of elements in a codeword and K represents the number of information elements in the codeword. The matrix H is also termed the LDPC mother code. For the specific example of a binary alphabet, N is the number of bits in the codeword and K is the number of information bits contained in the codeword for transmission over a wireless or a wired communication network or system. The number of information elements is therefore less than the number of codeword elements, so K<N.
Irregular LDPC codes have been shown to significantly outperform regular LDPC codes, which has generated renewed interest in this coding system since its inception decades ago. The bipartite graph of
Even as the overall computational complexity in decoding regular and irregular LDPC codes can be lower than turbo codes, the memory requirements of an LDPC decoder can be quite high. In an effort to at least partially reduce the memory requirements of an LDPC decoder, various techniques for designing LDPC codes have been developed. And although such techniques are adequate in reducing the memory requirements of an LDPC decoder, such techniques may suffer from an undesirable amount of decoding latency, and/or limited throughput.
In view of the foregoing background, exemplary embodiments of the present invention provide an improved error correction decoder, method and computer program product for block serial pipelined layered decoding of block codes. Generally, and as explained below, exemplary embodiments of the present invention provide an architecture for an LDPC decoder that calculates check-to-variable messages in accordance with an improved min-sum approximation algorithm that reduces degradation that may be otherwise introduced into the decoder by the approximation. Exemplary embodiments of the present invention are also capable of reducing memory requirements of the decoder by storing values from which check-to-variable messages may be calculated, as opposed to storing check-to-variable messages themselves. In addition, exemplary embodiments of the present invention provide a reconfigurable permuter/de-permuter whereby cyclic shifts in data values may be accomplished by means of a permuting Benes network in response to control logic generated by a sorting Benes network.
Further, the decoder may be configured to pipeline operations of an iterative decoding algorithm. In this regard, the architecture of exemplary embodiments of the present invention may include a running sum memory and (duplicate) mirror memory to store accumulated log-likelihood values for iterations of an iterative decoding technique. Such an architecture may improve latency of the decoder by a factor of two or more, as compared to conventional LDPC decoder architectures. In addition, the architecture may include a processor configuration that further reduces latency in performing operations in accordance with a min-sum algorithm for approximating a sub-calculation of the iterative decoding technique or algorithm.
According to one aspect of the present invention, an error correction decoder is provided for block serial pipelined layered decoding of block codes. The decoder includes a plurality of elements capable of processing, for at least one of a plurality of iterations q=0, 1, . . . , Q of an iterative decoding technique, at least one layer l of a parity check matrix H. The elements include an iterative decoder element (or a plurality of such decoder elements) capable of calculating, for one or more iterations q or one or more layers of the parity-check matrix processed during at least one iteration, a check-to-variable message civj[q] upon a first minimum magnitude MIN and a second minimum magnitude MIN2 of a plurality of variable-to-check messages for a previous iteration or layer vjci[q−1], and a sign value Si,j associated with a plurality of variable-to-check messages for the previous iteration or layer. In this regard, the first and second minimum magnitudes and the sign value can be read from a check-to-variable message memory. The iterative decoder element can be capable of calculating the check-to-variable message further based upon a third minimum magnitude of the plurality of variable-to-check messages for a previous iteration or layer. In such instances, the third minimum magnitude can also be read from the check-to-variable message memory.
More particularly, the parity-check matrix H can include a plurality of columns corresponding to a plurality of variable nodes vj such that the plurality of variable-to-check messages vjci have indices j′ corresponding to respective variable nodes. In such instances, the indices can include a first index I1 corresponding to the variable-to-check message having the first minimum magnitudes. The iterative decoder element can therefore be capable of calculating the check-to-variable message further based upon the first index. In this regard, the iterative decoder element can be capable of selecting the first or second minimum value, as well as selecting a sign value from a plurality of sign values associated with the plurality of variable-to-check messages for the previous iteration or layer, based upon the first index I1. The decoder can further include a read interface capable of reading the selected magnitude and sign value from the check-to-variable message memory such that the iterative decoder element can be capable of calculating the check-to-variable message based upon the read magnitude and sign value.
The decoder can also include primary and mirror memories that are each capable of storing log-likelihood ratios (LLRs), L(tj), for at least one of the iterations of the iterative decoding technique. In this regard, the iterative decoder element can be further capable of calculating, for at least one iteration or layer, a LLR adjustment ΔL(tj)[q] based upon the LLR for a previous iteration or layer L(tj)[q−1] and the check-to-variable message for the previous iteration or layer civj[q−1]. In such instances, the LLR for the previous iteration or layer can be read from the primary memory. The decoder can include a summation element capable of reading the LLR for the previous iteration or layer L(tj)[q−1] from the mirror memory, and calculating the LLR for the iteration or layer L(tj)[q] based upon the LLR adjustment ΔL(tj)[q] for the iteration or layer and the LLR for the previous iteration or layer L(tj)[q−1].
The decoder can further include a permuter and/or de-permuter capable of permuting the LLR for the previous iteration or layer L(tj)[q−1], or de-permuting at least a portion of the LLR for the iteration or layer (e.g., adjustment ΔL(tj)[q]. The permuter/de-permuter can include a permuting Benes network and a sorting Benes network. In this regard, the permuting Benes network can include a plurality of switches for permuting the LLR for the previous iteration or layer, or de-permuting the at least a portion of the LLR for the iteration or layer. Driving the permuting Benes network, the sorting Benes network can be capable of generating control logic for the switches of the permuting Benes network.
According to other aspects of the present invention, a network entity and a computer program product are provided for error correction decoding. Exemplary embodiments of the present invention therefore provide an improved network entity, method and computer program product. And as indicated above and explained in greater detail below, the network entity, method and computer program product of exemplary embodiments of the present invention may solve the problems identified by prior techniques and may provide additional advantages.
Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
a is a matrix of an exemplary low-density parity-check mother code, according to exemplary embodiments of the present invention;
b is a bipartite graph depicting connections between variable and check nodes, according to exemplary embodiments of the present invention;
The present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the exemplary embodiments set forth herein; rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.
Referring to
The communication system 30 provides for radio communication between two communication stations, such as a base station (BS) 34 and the terminal 32, by way of radio links formed therebetween. The terminal is configured to receive and transmit signals to communicate with a plurality of base stations, including the illustrated base station. The communication system can be configured to operate in accordance with one or more of a number of different types of spread-spectrum communication, or more particularly, in accordance with one or more of a number of different types of spread spectrum communication protocols. More particularly, the communication system can be configured to operate in accordance with any of a number of 1G, 2G, 2.5G and/or 3G communication protocols or the like. For example, the communication system may be configured to operate in accordance with 2G wireless communication protocols IS-95 (CDMA) and/or cdma2000. Also, for example, the communication system may be configured to operate in accordance with 3G wireless communication protocols such as Universal Mobile Telephone System (UMTS) employing Wideband Code Division Multiple Access (WCDMA) radio access technology. Further, for example, the communication system may be configured to operate in accordance with enhanced 3G wireless communication protocols such as 1X-EVDO (TIA/EIA/IS-856) and/or 1X-EVDV. It should be understood that operation of the exemplary embodiment of the present invention is similarly also possible in other types of radio, and other, communication systems. Therefore, while the following description may describe operation of an exemplary embodiment of the present invention with respect to the aforementioned wireless communication protocols, operation of an exemplary embodiment of the present invention can analogously be described with respect to any of various other types of wireless communication protocols, without departing from the spirit and scope of the present invention.
The base station 34 is coupled to a base station controller (BSC) 36. And the base station controller is, in turn, coupled to a mobile switching center (MSC) 38. The MSC is coupled to a network backbone, here a PSTN (public switched telephonic network) 40. In turn, a correspondent node (CN) 42 is coupled to the PSTN. A communication path is formable between the correspondent node and the terminal 32 by way of the PSTN, the MSC, the BSC and base station, and a radio link formed between the base station and the terminal. Thereby, the communications, of both voice data and non-voice data, are effectual between the CN and the terminal. In the illustrated, exemplary implementation, the base station defines a cell, and numerous cell sites are positioned at spaced-apart locations throughout a geographical area to define a plurality of cells within any of which the terminal is capable of radio communication with an associated base station in communication therewith.
The terminal 32 includes various means for performing one or more functions in accordance with exemplary embodiments of the present invention, including those more particularly shown and described herein. It should be understood, however, that the terminal may include alternative means for performing one or more like functions, without departing from the spirit and scope of the present invention. More particularly, for example, as shown in
It is understood that the controller 50 includes the circuitry required for implementing the audio and logic functions of the terminal 32. For example, the controller may be comprised of a digital signal processor device, a microprocessor device, and/or various analog-to-digital converters, digital-to-analog converters, and other support circuits. The control and signal processing functions of the terminal are allocated between these devices according to their respective capabilities. The controller can additionally include an internal voice coder (VC), and may include an internal data modem (DM). Further, the controller may include the functionality to operate one or more client applications, which may be stored in memory (described below).
The terminal 32 can also include a user interface including a conventional earphone or speaker 52, a ringer 54, a microphone 56, a display 58, and a user input interface, all of which are coupled to the controller 38. The user input interface, which allows the terminal to receive data, can comprise any of a number of devices allowing the terminal to receive data, such as a keypad 60, a touch display (not shown) or other input device. In exemplary embodiments including a keypad, the keypad includes the conventional numeric (0-9) and related keys (#, *), and other keys used for operating the terminal. Although not shown, the terminal can include one or more means for sharing and/or obtaining data (not shown).
In addition, the terminal 32 can include memory, such as a subscriber identity module (SIM) 62, a removable user identity module (R-UIM) or the like, which typically stores information elements related to a mobile subscriber. In addition to the SIM, the terminal can include other removable and/or fixed memory. In this regard, the terminal can include volatile memory 64, such as volatile Random Access Memory (RAM) including a cache area for the temporary storage of data. The terminal can also include other non-volatile memory 66, which can be embedded and/or may be removable. The non-volatile memory can additionally or alternatively comprise an EEPROM, flash memory or the like. The memories can store any of a number of client applications, instructions, pieces of information, and data, used by the terminal to implement the functions of the terminal.
As described herein, the client application(s) may each comprise software operated by the respective entities. It should be understood, however, that any one or more of the client applications described herein can alternatively comprise firmware or hardware, without departing from the spirit and scope of the present invention. Generally, then, the network entities (e.g., terminal 32, BS 34, BSC 36, etc.) of exemplary embodiments of the present invention can include one or more logic elements for performing various functions of one or more client application(s). As will be appreciated, the logic elements can be embodied in any of a number of different manners. In this regard, the logic elements performing the functions of one or more client applications can be embodied in an integrated circuit assembly including one or more integrated circuits integral or otherwise in communication with a respective network entity or more particularly, for example, a processor or controller of the respective network entity. The design of integrated circuits is by and large a highly automated process. In this regard, complex and powerful software tools are available for converting a logic level design into a semiconductor circuit design ready to be etched and formed on a semiconductor substrate. These software tools, such as those provided by Avant! Corporation of Fremont, Calif. and Cadence Design, of San Jose, Calif., automatically route conductors and locate components on a semiconductor chip using well established rules of design as well as huge libraries of pre-stored design modules. Once the design for a semiconductor circuit has been completed, the resultant design, in a standardized electronic format (e.g., Opus, GDSII, or the like) may be transmitted to a semiconductor fabrication facility or “fab” for fabrication.
Reference is now made to
In the illustrated system, an information source 74 of the transmitting entity 70 can output a K-dimensional sequence of information bits m into a transmitter 76 that includes an LDPC encoder 78, modulation element 80 and memory 82, 84. The LDPC encoder is capable of encoding the sequence m into an N-dimensional codeword t by accessing a LDPC code in memory. The transmitting entity can thereafter transmit the codeword t to the receiving entity 72 over one or more channels 86. Before the codeword elements are transmitted over the channel(s), however, the codeword t including the respective elements can be broken up into sub-vectors and provided to the modulation element, which can modulate and up-convert the sub-vectors to a vector x of the sub-vectors. The vector x can then be transmitted over the channel(s).
As the vector x is transmitted over the channel(s) 86 (or by virtue of system hardware), additive white Gaussian noise (AWGN) n can be added thereto so that the vector r=x+n is received by the receiving entity 72 and input into a receiver 88 of the receiving entity. The receiver can include a demodulation element 90, a LDPC decoder 92 and memory for the same LDPC code used by the transmitter 76. The demodulation element can demodulate vector r, such as in a symbol-by-symbol manner, to thereby produce a hard-decision vector {circumflex over (t)} on the received information vector t. The demodulation element can also calculate probabilities of the decision being correct, and then output the hard-decision vector and probabilities to the LDPC decoder. Alternatively, the demodulation element may calculate a soft-decision vector on the received information vector, where the soft-decision vector includes the probabilities of the decision made. The LDPC decoder can then decode the received code block and output a decoded information vector {circumflex over (m)} to an information sink 98.
A. Structured LDPC Codes
As shown and explained herein, the LDPC code utilized by the LDPC encoder 78 and the LDPC decoder 92 for performing the respective functions can comprise a structured LDPC code. In this regard, the structured LDPC code can comprise a regular structured LDPC code where each column of parity-check matrix H including exactly the same number m of non-zero elements, and each row including exactly the same number k of non-zero elements. Alternatively, the structured LDPC code can comprise an irregular structured LDPC code where the parity-check matrix H allows for non-uniform counts of non-zero elements among the columns and/or rows. Accordingly, the LDPC code in memory 84, 96 can comprise such a regular or irregular structured LDPC code.
As will be appreciated, the parity-check matrix H of exemplary embodiments of the present invention can be comprised in any of a number of different manners. For example, the parity-check matrix H can comprise an expanded parity-check matrix including a number of sub-matrices, with matrix H being constructed based upon a set of permutation matrices P and/or null matrices (all-zeros matrices where every element is a zero). In this regard, consider a structured irregular rate one-third (i.e., R-⅓) LDPC code defined by the following partitioned parity-check matrix of dimension 12×18:
Generally, the permutation matrices, from which the parity-check matrix H can be constructed, each comprise an identity matrix with one or more permuted columns or rows. The permutation matrices can be constructed or otherwise selected in any of a number of different manners. One permutation matrix, PSPREAD1, capable of being selected in accordance with exemplary embodiments of the present invention can comprise the following single circular shift permutation matrix:
In such instances, cyclically shifted permutation matrices facilitate representing the LDPC code in a compact fashion, where each sub-matrix of the parity-check matrix H can be identified by a shift. It should be understood, however, that other non-circular or even randomly or pseudo-randomly shifted permutation matrices can alternatively be selected in accordance with exemplary embodiments of the present invention. For example, PSPREAD1 can comprise the following alternate non-circular shift permutation matrix:
For more information on one exemplary method for constructing irregularly structured LDPC codes, see U.S. patent application Ser. No. 11/174,335, entitled: Irregularly Structured, Low Density Parity Check Codes, filed Jul. 1, 2005, the content of which is hereby incorporated by reference.
B. Layered Belief Propagation Decoding Algorithm
Irrespective of the type and construction of the LDPC code (parity-check matrix H), the LDPC decoder 92 of exemplary embodiments of the present invention is capable of decoding a received code block in accordance with a layered belief propagation technique. Before describing such a layered belief propagation technique, a belief propagation decoding technique will be described, with the layered belief propagation technique thereafter being described with reference to the belief propagation technique.
1. Belief Propagation Decoding Algorithm
Consider a message vector m encoded with an LCPC code of dimension N×K, where the LDPC code is defined by a parity-check matrix H of dimension (N−K)×N. Also, let t represent the LDPC codeword, and tj represent the jth transmitted code bit. In such an instance, the log-likelihood-ratio (LLR) of tj can be defined as follows:
Further, let rj represent the received value and λj represent the input channel value to the LDPC decoder 92 for the bit tj, which can be computed by the demodulation element 90.
In accordance with a belief propagation decoding algorithm, the LDPC decoder 92 can iteratively calculate extrinsic messages from each check 18 to the participating bits 16 (check-node to variable-node message). In addition, the LDPC decoder can iteratively calculate extrinsic messages from each bit to the checks in which the bit participates (variable-node to check-node message). The calculated messages can then be passed on the edges 20, 22 of an associated bipartite graph (see
More particularly, in accordance with an iterative belief propagation decoding algorithm, the LDPC decoder 92 can be initialized at iteration index q=0. As or after initializing the decoder, the LLR of bit-node j at the end of iteration q (i.e., L(tj)[q]) can be calculated for q=0, such as in the following manner:
L(tj)[0]=λj, j=0, 1, 2, . . . , N−1
In addition to calculating the LLR of bit-node j, extrinsic messages from check node i to variable node j at iteration q (i.e., civj[q]), and from variable node j to check node i at iteration q (i.e., vjci[q]), can be calculated for q=0, where i and j represent the check-node index and bit-node index, respectively. Written notationally, the extrinsic messages can be calculated as follows:
civj[0]=0, ∀jεRi, i=0, 1, 2, . . . , K−1
vjci[0]=λj, ∀iεCj, j=0, 1, 2, . . . , N−1
In the preceding, Ri represents the set of positions of columns having 1's in the ith row, and Cj represents the set of positions of the rows having 1's in the jth column, both of which can be written notationally as follows:
Ri={j|Hi,j=1}∀i,j
Cj={i|Hi,j=1}∀i,j
After initializing the decoder 92 and calculating the LLR and extrinsic messages for q=0, the decoder can perform iterative decoding for iterations q=1, 2, 3, . . . , Q, iterative decoding including performing a horizontal operation, a vertical operation, a soft LLR output operation, a hard-decision operation and a syndrome calculation. The decoder can perform each operation/calculation for each iteration. For fixed iteration decoding, however, the decoder can perform the horizontal and vertical operations for each iteration, and then further perform the soft LLR output operation, hard-decision operation and syndrome calculation for the last iteration, q=Q.
The decoder 92 can perform the horizontal operation by calculating a check-to-variable message for each parity check node. Written notationally, for example, the horizontal operation can be performed in accordance with the following nested loop:
The decoder 92 can perform the soft LLR output operation by calculating a soft LLR for each bit tj, such as in accordance with the following nested loop:
The decoder 92 can perform the hard-decision operation by calculating a hard-decision code bit {circumflex over (t)}j for bit-nodes j=0, 1, 2, . . . , N−1, such as in the following manner:
Further, during the iterative decoding, the decoder 92 can calculate a syndrome s based upon the LDPC codeword t and the parity-check matrix H, such as in the following manner:
s={circumflex over (t)}HT
where, as used herein, superscript T notationally represents a matrix transpose. The decoder can then repeat the above iterative decoding operations/calculations for each iteration, that is until q>Q, or until s=0.
2. Layered Belief Propagation Decoding Algorithm
The number of iterations q required under the belief propagation algorithm can be reduced by employing the layered belief propagation algorithm. The layered belief propagation, described in this section, can be efficiently implemented for irregular structured partitioned codes. In this regard, consider the previously-given structured irregular LDPC code:
As shown, the preceding parity-check matrix H can be partitioned into smaller non-overlapping sub-matrices of dimension 3×3, where each sub-matrix can be referred to as a permuted identity matrix. Generally, then, a LDPC code of dimension N×K can be defined by a parity check matrix partitioned into sub-matrices of dimension S1×S2. In such instances, it should be noted that each row of a partition can include an equal number of 1's, as can each column of a partition.
With reference to the above LDPC code, then, a set of non-overlapping rows can form a layer or a block-row (sometimes referred to as a “supercode”), where the parity check matrix may include L=K/S1, partitioned layers (i.e., supercodes), and C=N/S2 block columns. In this regard, a layer can include a group of non-overlapping checks in parity-check matrix, all of which can be decoded in parallel without exchanging any information. In accordance with a layered belief propagation decoding algorithm, the extrinsic messages can be updated after each layer is processed. Thus, layered belief propagation can be summarized as computing new check-to-variable messages for each layer of each of a number of iterations, and updating the variable-to-check messages using updated check-to-variable messages. For a final iteration, then, a hard-decision and syndrome vector can be computed.
More particularly, in accordance with a layered belief propagation decoding algorithm, the LDPC decoder 92 can be initialized at iteration index q=0, such as in the same manner as in the belief propagation algorithm including calculating the LLR of bit-node j for q=0 (i.e., L(tj)[0]) and the check-to-variable message for q=0 (i.e., civj[0]). The decoder 92 can then perform iterative decoding for iterations q=1, 2, 3, . . . , Q, iterative decoding including performing a horizontal operation, a soft LLR update operation and a syndrome calculation. The decoder can perform each operation/calculation for each iteration. For fixed iteration decoding, however, the decoder can perform the horizontal and soft LLR update operations for each iteration, and then further perform the hard-decision operation and syndrome calculation for the last iteration, q=Q.
The decoder 92 can perform the horizontal and soft LLR update operations by calculating a check-to-variable message for each parity check node, and updating the soft LLR output for each bit tj, for each layer. Written notationally, for example, the horizontal and vertical operations can be performed in accordance with the following nested loop:
For l=0, 1, 2, . . . , L−1:
Similar to in the belief propagation algorithm, the decoder 92 implementing the layered belief propagation algorithm can perform the hard-decision operation by calculating a hard-decision code bit {circumflex over (t)}j for bit-nodes j=0, 1, 2, . . . , N−1, such as in the following manner:
In addition, the decoder 92 can calculate a syndrome s based upon the hard-decision LDPC codeword {circumflex over (t)} and the parity-check matrix H, such as in the following manner:
s={circumflex over (t)}HT
The decoder can then repeat the above iterative decoding operations/calculations for each iteration, that is until q>Q, or until s=0.
Even though tan-h (i.e., ψ(x)) may be one of the more common descriptions of belief propagation and layered belief propagation in the log-domain, those skilled in the arts will recognize that several other operations (e.g. log-MAP) and/or approximations (e.g. look-up table, min-sum, min-sum with correction term) can be used to implement (ψ(x)). A reduced complexity min-sum approach or algorithm may also be used, where such a min-sum approach may simplify complex log-domain operations at the expense of a reduction in performance. In accordance with such an algorithm, the M(civj[q]) calculation of the horizontal operation can be approximated as follows:
M(civj[q])≈min(|L(xj′)[q−1]−civj′[q−1]|, j′=1, 2, . . . , ρj−1, j′≠j)
To further reduce the complexity of the min-sum algorithm, exemplary embodiments of the present invention are capable of determining the above minimum value based upon a first minimum value and a next, second minimum value. More particularly, the horizontal operation can be performed by first calculating a minimum value in accordance with the following:
MIN=min(|L(xj′)[q−1]−civj′[q−1]|, j′=1, 2, . . . , ρj−1)
For example, if the index j′ of the minimum value is set to I1, then the next minimum value can be calculated from among the remaining values (i.e., excluding the minimum value MIN), such as in accordance with the following:
MIN2=min(|L(xj′)[q−1]−civj′[q−1]|, j′=1, 2, . . . , ρj−1, j′≠I1)
Then, after calculating S(civj[q]), the horizontal operation can conclude by calculating the check-to-variable message based upon the minimum and next minimum values, such as in accordance with the following:
If j=I1,
civj[q]=−S(civj[q])×MIN2,
else,
civj[q]=−S(civj[q])×MIN
During implementation of the min-sum algorithm, the soft LLR update and hard decision-operations can be performed as before.
As will be appreciated, the reduced complexity of the min-sum algorithm may come with the price of performance degradation (e.g., 0.3−0.5 dB) compared with log-map or tan-h algorithms. To improve the performance of the min-sum algorithm, then, exemplary embodiments of the present invention may account for such degradation by approximating error introduced in approximating the magnitude M(civj[q]). In this regard, consider that the error term in the min-sum algorithm (with two variable nodes may be represented as follows):
ψ−1(ψ(x)+ψ(y))=min(x, y)+error
∴error=ψ−1(ψ(x)+ψ(y))−min(x, y)
∴error=ln[1+e−|x+y|]−ln[1+e−|x−y|]≈−ln[1+e−|x−y|]
From the preceding, then, the min-sum algorithm including the error term can be rewritten as follows:
ψ−1(ψ(x)+ψ(y))≈min(x, y)−ln[1+e−|x−y|]
If so desired, the error term in the above expression can be approximated by a function of x and y, as follows:
which can be implemented with simple hardware circuit. In accordance with such a modified min-sum algorithm, then, the magnitude M(civj[q]) can be calculated as follows:
In the preceding equation, I2 represents the index j′ of the next minimum value, and MIN3 represents a following, third minimum value. In this regard, similar to MIN2, MIN3 can be calculated as follows:
MIN3=min(|L(xj′)[q−1]−civj′[q−1]|, j′=1, 2, . . . , ρj−1, j′≠I1, I2)
C. Pipelined Layered Decoder Architecture
As explained above, the layered belief propagation algorithm can improve performance by passing updated extrinsic messages between the layers within a decoding iteration. In a structured parity-check matrix H as defined above, each block row can define one layer. The more the overlap between two layers, then, the more the information passed between the layers. However, decoders for implementing the layered belief propagation algorithm can suffer from dependency between the layers. Each layer can be processed in a serial manner, with information being updated at the end of each layer. Such dependence can create a bottleneck in achieving high throughput.
One manner by which higher throughput can be achieved is to simultaneously process multiple layers. In such instances, information can be passed between groups of layers, as opposed to being passed between each layer. To analyze this approach, conventional min-sum can be viewed as clubbing all the layers in one group, while layered belief propagation can be viewed as having one layer (block row) in each group of layers. It can be shown that the performance gain may gradually improve when reducing the number of layers grouped together in one group. Moreover, it can be shown that in some cases it may be beneficial to group consecutive block-rows in one fixed layer, while in others the non-consecutive block rows are grouped in one fixed layer, thereby resulting in performance close to that achievable by the actual layered decoding algorithm. This is because different block rows have different overlap in a parity check matrix. Thus, in parallel layer processing, scheduling block rows with better connection in different groups improves the performance. The best scheduling can therefore depend on the code structure. Such scheduling may also be utilized to obtain faster convergence in fading channels.
Parallel block row processing such as that explained above, however, can require more decoder resources. In this regard, the decoder resources for check and variable node processing can linearly scale with the number of parallel layers. The memory partitioning and synchronization at the end of processing of a group of layer can be rather complex. As explained below, however, grouping layers as indicated above can be leveraged to employ a pipelined decoder architecture.
In accordance with exemplary embodiments of the present invention, then, the LDPC decoder 92 can have a pipelined layered architecture for implementing a layered belief propagation decoding technique or algorithm. Before describing the pipelined layered decoder architecture of exemplary embodiments of the present invention, other decoder architectures for implementing the belief propagation and layered belief propagation decoding techniques will be described, the pipelined layered decoder architectures thereafter being described with reference to those architectures.
1. Belief Propagation Decoder Architecture
A number of decoder architectures have been developed for implementing the belief propagation algorithm. To implement the belief propagation algorithm, computational complexity can be minimized using the min-sum approach or a look-up table for a tan-h implementation. Such approaches can reduce the decoder calculations to simple add, compare, sign and memory access operations. A joint coder/decoder design has also been considered where decoder architectures exploit the structure of the parity-check matrix H to obtain better parallelism, reduce required memory and improve throughput.
The various belief propagation decoder architectures that have been developed can generally be described as serial, fully-parallel and semi-parallel architectures. In this regard, while serial architectures require the least amount of decoder resources, such architectures typically have limited throughput. Fully-parallel architectures, on the other hand, may yield a high throughput gain, but such architectures may require more decoder resources and a fully connected message-passing network. LDPC decoding, while in theory offers a lot of inherent parallelism, requires a fully connected network that presents a complex interconnect problem even with structured codes. Fully-parallel architectures may be very code-specific and may not be reconfigurable or flexible. Semi-parallel architectures, on the other hand, may provide a trade-off between throughput, decoder resources and power consumption.
Another bottleneck in implementing a belief propagation decoding algorithm may be memory management. In this regard, since the message-passing feature of belief propagation can be accomplished via memory accesses, a lack of structure in the parity-check matrix H can lead to access conflicts, and adversely affect the throughput. Structured codes, however, may be designed to improve memory management in the LDPC decoder 92.
In its simplest form, a decoder implementing a belief propagation algorithm may require
memory locations to store check-to-variable messages,
memory locations to store variable-to-check messages, and N memory locations to store the final log-likelihood-ratios (LLRs) of the coded bits.
2. Layered Belief Propagation Decoder Architecture
Generally, as extrinsic messages can be updated during each sub-iteration, only one memory location may be required by a decoder to maintain the LLR and accumulated variable-to-check messages. As such, in comparison toga decoder implementing a belief propagation algorithm, a decoder implementing a layered belief propagation algorithm may only require N memory locations, instead of
memory locations, to store variable-to-check messages.
In one layered belief propagation decoder architecture, accumulated variable-to-check messages may not be stored, but rather computed at every layer. That is,
Such a decoder architecture can lead to reduction in memory at the expense of the extra computations at each layer, with the check-to-variable for the current layer being over-written for the next layer. Also, such a decoder architecture may be particularly applicable to instances where there are fewer layers and the maximum variable node degree is comparatively small (e.g., 3, 4, etc.). For a code with more layers, however, such an architecture, may exhibit higher latency or require greater decoder resources, as discussed in greater detail below.
3. Pipelined Layered Belief Propagation Decoder Architecture
Different decoder architectures for decoding irregular structured LDPC codes will now be evaluated. For purposes of illustration, the following discussion assumes LDPC codes constructed using a partitioned technique with a shifted identity matrix as a sub- matrix. In this regard, assume a N×K LDPC code defined by a parity-check matrix partitioned into sub-matrices of dimension S×S. In such an instance, the parity-check matrix can include L=K/S partitioned layers (i.e., supercodes), and C=N/S block columns. Also, let ρl represent the number of non-zero sub-matrices in layer l, and υc represent the number of non-zero sub-matrices in block column c.
First, consider a block-by-block architecture where a LDPC decoder 100 can process each sub-matrix in a serial fashion, as shown in the schematic block diagram of
The decoder 100 can include a channel LLR initialization element 112 for initializing the bit-node LLR memory 110 with input soft bits at iteration index q=0 (i.e., L(tj)[0]=λj), as well as an iteration initialization element 114 for initializing the check-to-variable messages at iteration index q=0 (i.e., Civj[0]). The decoder can also include a number of iterative decoder elements 116 (e.g., S iterative decoder elements for sub-matrices of dimension S×S) for performing the horizontal and soft LLR update operations for iterations q=1, 2, 3, . . . , Q. To perform the horizontal and soft LLR update operations, each iterative decoder element can include a check-to-variable buffer 118, a variable-to-check element 120, a variable-to-check buffer 122, a processor 124 and an LLR element 126.
For each iteration q, the variable-to-check element 120 is capable of receiving the LLR for iteration q−1, (i.e., L(tj)[q−1]) from a LLR permuter 128, which is capable of permuting the LLRs for processing by the iterative decoder elements 116, as more particularly explained below. In addition, the variable-to-check element is capable of receiving the check-to-variable message for iteration q−1 (i.e., civj[q−1]) and a LLR from the check-to-variable buffer 118. The variable-to-check element can then output, to the variable-to-check buffer 122 and processor 124, the variable-to-check message (i.e., L(tj)[q−1]−civj[q−1]) for iteration q−1. The processor is capable of performing the horizontal operation of the iterative decoding by calculating the check-to-variable message for iteration q (i.e., civj[q]) based upon the variable-to-check message for iteration q−1. The LLR element 126 is then capable of receiving the check-to-variable message from the processor, as well as the variable-to-check message from the variable-to-check buffer, and performing the soft LLR update by calculating the LLR for iteration q (i.e., L(tj)[q]). The calculated soft LLR for iteration q can be provided to a LLR de-permuter 130, which is capable of de-permuting the current iteration LLR, and outputting the current iteration LLR to the bit-node LLR memory 110 via the LLR write interface 109. For the last iteration Q, then, the soft LLR (i.e., L(tj)[Q],j=0, 1, 2, . . . , N−1) can be read from the bit-node LLR memory to a hard-decision/syndrome decoder element 132, which can calculate hard-decision code bits {circumflex over (t)}j based thereon. In addition, the hard-decision/syndrome decoder element can calculate a syndrome s based upon the hard-decision LDPC codeword {circumflex over (t)} and the parity-check matrix H.
In the illustrated architecture, each sub-matrix in a parity-check matrix H can be treated as a block, with processing of each row within a block being implemented in parallel. Thus, the decoder 100 can include S iterative decoder elements 116 in parallel, with each processor 124 of each iterative decoder element being capable of processing one of the parity-check equations in parallel. In this regard, the iterative decoder element can calculate the variable-to-check messages, and store those messages in a running-sum memory 110 that, as indicated above, can be initialized with input soft-bits. Thus, the illustrated decoder architecture may only require one memory 110 of length N for storing both input LLR and accumulated variable-to-check messages, thereby reducing the memory otherwise required by a belief propagation decoder by a factor of
As also shown, the check-to-variable memory 106 can be organized in a vertical dimension of the parity-check matrix H, and check-to-variable messages can be stored for each parity-check equation. Thus, a total of
soft-words may be required to store check-to-variable messages.
A control flow diagram of a number of elements of the decoder 100 implementing the iterative decoding of layered belief propagation is shown in
For illustrative purposes to evaluate performance of the decoder architecture of
As will be appreciated, the latency associated with layered mode belief propagation can be undesirably high, especially for an LDPC code with multiple layers. It should be noted, however, that for the same performance, conventional belief propagation can require more than two times the iterations required by the layered belief propagation. As such, the latency of conventional belief propagation can be much more than that of layered decoding.
To further reduce the latency of layered decoding, exemplary embodiments of the present invention exploit the results of parallel layer processing to enforce pipelining across layers over the entire parity-check matrix H. In this regard, the LDPC decoder of exemplary embodiments of the present invention is capable of beginning to process the next layer as soon as the last sub-matrix of the current layer is read and processed (reading the next layer as soon as the last-sub matrix of the current layer is read), as shown in the timing diagram of
Reference is now made to the control flow diagram of
More particularly, similar to the LDPC decoder 100 of
Also similar to the decoder 100 of
As before, for each iteration q, the variable-to-check element 120 is capable of receiving the LLR for iteration q−1, (i.e., L(tj)[q−1]) from a LLR permuter 128, which is capable of permuting the LLRs for processing by the iterative decoder elements 142, as more particularly explained below. In addition, the variable-to-check element is capable of receiving the check-to-variable message for iteration q−1(i.e., civj[q−1]) and a LLR from the check-to-variable buffer 118, which is also capable of outputting the check-to-variable message for iteration q−1 to the LLR update element 144. The variable-to-check element can then output, to the processor 124, the variable-to-check message (i.e., L(tj)[q−1]−civj[q−1]) for iteration q−1. The processor is capable of performing the horizontal operation of the iterative decoding by calculating the check-to-variable message for iteration q (i.e., civj[q]) based upon the variable-to-check message for iteration q−1. The LLR update element 144 is capable of receiving the check-to-variable message from the processor, as well as the check-to-variable message for iteration q−1 from the check-to-variable buffer. The LLR update element can then perform a portion of the soft LLR update by calculating a bit-node (LLR) adjustment for iteration q (i.e., ΔL(tj)[q]=civj[q]−civj[q−1]). The calculated LLR adjustment for iteration q can be provided to a LLR de-permuter 130, which is capable of de-permuting the current iteration LLR adjustment, and outputting the current iteration LLR adjustment to a summation element 146. The summation element can also receive, from the mirror bit-node LLR memory 110b via the second LLR read interface 108b, the bit-node LLR for the previous iteration (i.e., L(tj)[q−1]).
The summation element 146 can complete the soft LLR update by summing the previous iteration bit-node LLR with the current iteration LLR adjustment (i.e., L(tj)[q]=L(tj)[q−1]+ΔL(tj)[q]), thereby updating the running sum with the calculated update. The current iteration bit-node LLR can then be written to the primary and mirror bit-node LLR memories 110a, 110b via the LLR write interface 109. Similar to before, for the last iteration Q, the soft LLR (i.e., L(tj)[Q], j=0, 1, 2, . . . , N−1) can be read from the primary bit-node LLR memory to a hard-decision/syndrome decoder element 132, which can calculate hard-decision code bits {circumflex over (t)}j based thereon. In addition, the hard-decision/syndrome decoder element can calculate a syndrome s based upon the hard-decision LDPC codeword {circumflex over (t)} and the parity-check matrix H.
In the exemplary embodiment shown in
A control flow diagram of a number of elements of the decoder 141 implementation is shown in
For various LDPC codes, then, each layer can have check-node degrees that are within a unit distance of one another (i.e., difference between max check-node degree and min check-node degree is one). This allows efficient layout and usage of the processors 124. Also, the decoder 141 can be configured such that the pipeline can only be enforced if processing time in each layer is equal. A pseudo-computation cycle, then, can be inserted in order to enforce the pipeline. If it is assumed that each layer has ρ sub-matrices, then, neglecting differences in pipeline stages, the improvement in latency over the architecture of
D. Processor, Permuter/De-Permuter and Memory Configurations in Decoder Architecture
As will be appreciated, the processors 124, permuter 128, de-permuter 130 and memory 106 of the decoder architecture of exemplary embodiments of the present invention can be organized or otherwise configured in any of a number of different manners, such as in the manners explained below.
1. Processor Configuration
As will be appreciated, the processors 124 of the decoder architecture of exemplary embodiments of the present invention can be organized or otherwise configured in any of a number of different manners. The processors 124 of the iterative decoder elements 116, 142 of the LDPC decoder 100 can be configured in a number of different manners. In one exemplary hardware or software implementation, the processors 124 can be implemented using adders, look-up tables and sign manipulation elements. A reduced complexity min-sum implementation employs comparators and sign manipulation elements. In accordance with one configuration, for example, ρl comparator and sign manipulation elements 134 that compute the extrinsic check-to-variable messages civj can be arranged in parallel for the parity check, as shown in
In the configuration of
In another embodiment, as shown in
The output values F1 and F2 can then be fed into multiplexers 140 for updating the MIN and MIN2 values, such as in accordance with the following truth table (table I):
where “--” represents a “don't care” condition (although as shown, if F1=1, then F2=1). As will be appreciated, a similar two-level computational logic can be implemented with tan-h or log-map algorithms. In such instances, however, extra logic may be required to track the index of the minimum value in order to pass the correct check-to-variable message. Corresponding sign operation can be implemented as sign accumulation and subtraction element 142 (implemented, e.g., with a one-bit X-OR Boolean logic element). The current MIN and MIN2 values, along with the output of the sign operation (i.e., S(civj[q]) can then be provided to a check-to-variable element 144 along with the index I1 of the current minimum value MIN from an index element 146. The check-to-variable element can then calculate the check-to-variable message civj[q] based upon the index I1 and one of the MIN or MIN2 values, such as in accordance with the min-sum algorithm.
2. Permuter/De-Permuter Configuration
Similar to the processors 124, the permuter 128 and de-permuter 130 of the decoder architecture of exemplary embodiments of the present invention can be organized or otherwise configured in any of a number of different manners. The description below provides one such configuration for the permuter of exemplary embodiments of the present invention. It should be understood, however, that the configuration may equally apply to the de-permuter, without departing from the spirit and scope of the present invention.
In one exemplary embodiment, the permuter 128 (and de-permuter 130) can be implemented using multiplexers. To support any cyclic shift for a permutation matrix of size S, however, a total of S multiplexers of size S×1 may be required, thereby resulting in an overall complexity of O(S2). In another, lower-complex implementation, the permuter can include smaller, multi-stage multiplexers, thereby reducing the complexity to O(S log2 S). Such low-complexity implementations, however, may be limited in the number of supported values of S, easily supporting S=Smax, Smax/2, . . . , 1, but oftentimes requiring complex control logic and pre-permutation logic for the other values of S. Further, efficient implementations can be easily derived for a single permutation matrix of size S, but such implementations may not be re-usable for implementing a cyclic shift of any permutation matrix of sizes 1, 2, . . . , S.
The permuter 128 (and de-permuter 130) of one exemplary embodiment can be implemented using Benes networks. Benes networks are known for being optimal non-blocking input-to-output routers. As shown in
As shown in
Assume that the permuter 128 receives an input array x0, x1, . . . , xS−1, [Gentlemen—Should this be S or S−1 (the final report indicated S)?] and that the desired output is a cyclic shifted version of the of the input array, with a shift s<S. That is, assume that the desired output of the permuter is as follows:
yi=xmod(s+i, S)
For example, with an eight element input array (i.e., S=8), the possible cyclic shifts are listed in Table II. If each element xi is assigned a unique integer ranging from 0 to S−1 at the input, by sorting the integers through the Benes network, it can be possible to achieve the desired cyclic shift operation through the same Benes network (and with the same switch control matrix C). For instance, consider an eight element input array, x0, . . . , x7 and a desired shift of s=3. In such an instance, the desired output array can comprise x3, . . . , x7, x0, x1, x2. Table III illustrates how a sorting Benes network 160 can be used to achieve cyclic shifts of an input array with appropriate integer assignments to the elements in the array. In this regard, the assignment (mapping) can be represented as follows:
ni=mod(i+S−s, S), i=0, 1, . . . , S−1
where ni is the integer assigned to input element xi for desired shift s.
After illustrating that the integer sorting Benes network can be used for cyclic shifting, a switch control matrix C can be calculated by the sorting Benes network 160 in accordance with a Benes network sorting (BNS) algorithm (BNSA). In the BNS algorithm, for simplicity, assume that S is a power of two, although it should be understood that S need not be a power of two. Now, presume that the sorting Benes network receives an input integer array n0, n1, . . . , nS−1(0≦ni<S and ni≠nj, if i≠j), and outputs switch control matrix C=BNSA(S; n0, n1, . . . , nS−1), which can be represented as follows:
where Cm,n represents a control state for switch 154 m of stage 152 n of each of the S/2×S/2 Benes networks 158a, 158b of the permuter 128, and T=2 log2 (S)−1. The BNS algorithm, then, can operate on the input array in three stages (i.e., a first stage, middle stage and final stage) to calculate the output switch control matrix C. Notationally, the three stages can be written as follows:
In the preceding BNS algorithm, ni>>1 refers to a bit right-shift-by-one operation (i.e., removing the last bit from the binary representation of number ni), and C[m1:m2][n1:n2]refers to the following matrix:
Also, shuffle(j, n0, . . . , nS−1) refers to hard-wire interconnections between adjacent switch stages 152 j and j+1, which can be predetermined in the Benes network.
In various instances, the last stage of the BNS algorithm can be further simplified by determining the control Ci,T−1 of the switch 152 by the parity of the last bit of n2i, instead of comparing n2i and n2i+1. In such instances, if the last bit n2i has parity one, the control Ci,T−1 can also comprise one, thereby resulting in the two inputs to the respective switch being exchanged. Otherwise, the switch can pass the two inputs to respective outputs. Such a simplification, then, can further reduce the hardware resources required to implement the BNS algorithm.
As suggested above, the permuter 128 (and de-permuter 130) of exemplary embodiments of the present invention can support any cyclic shift S0 smaller than S. For example, consider calculating a cyclic shift of a five-bit input array (i.e., S0=5) with a shift offset of two (i.e., inputting array x0, . . . , x4, and outputting array x2, . . . , x4, x0, x1), the shift being calculated by a permuter including an 8-input Benes network (i.e., S=8). In such instances, the input and output positions can be predetermined and independent from the input array sizes and the shift offsets. The BNS algorithm, then, can be performed to calculate the input array shift, typically provided the input and output arrays are both positioned at the first S0 pins of the Benes network, and provided the mapping of the integers follows the following rule:
In
Now, assume that MIN and MIN2 are calculated at j=0 (i.e., I1=0) and j=1 (i.e., I2=7), respectively, as follows:
MIN=|v0ck[q−1]|=min(|v0ci[q−1]|, |v1ci[q−1]|, . . . , |v7ci[q−1]|)
MIN2=|v7ck[q−1]|=min 2(|v0ci[q−1]|, |v1ci[q−1]|, . . . , |v7ci[q−1]|)
The check-to-variable messages above can then be rewritten based upon MIN and MIN2 as follows:
Now, instead of storing civ0[q], civ1[q], . . . , civ7[q], the memory 106 can be configured to store MIN, MIN2, sign bits Si,0, Si,1, . . . , Si,7, and index I1, where the sign of each message can be represented by a single bit.
For WiMAX applications, the maximum check node degree (number of non-zero sub-matrices in a layer) for a R-¾ code may be fifteen. Assuming 8-bit fixed-point precision, then, each check-node may require 15×8=120 bits of memory to store the associated check-to-variable messages. In exemplary embodiments of the present invention alternatively storing MIN, MIN2, sign bits and index I1, on the other
3. Memory Configuration
As explained above, the magnitude of the check-to-variable messages, M(civj[q]), can be approximated in accordance with a min-sum algorithm, such as in accordance with the following:
M(civj[q])≈min(|vj′ci[q−1]|, j′=1, 2, . . . , ρj−1, j′≠j)
where vj′ci[q−1]=L(xj′)[q−1]−civj′[q−1]. From the preceding, then, it can be shown that the magnitude M(civj[q]) can comprise MIN or MIN2. Thus, although the memory 106 of various exemplary embodiments of the present invention can store the check-to-variable messages civj[q], the memory 106 of other exemplary embodiments alternatively store MIN and MIN2, along with a sign values
and index of minimum value I1. The check-to-variable messages, then, can be calculated from the stored minimum, next minimum, sign and index values.
To illustrate the memory savings of such a memory configuration, consider an exemplary LDPC code with check-node degree of eight. Further, consider a check-node connected to variable nodes [0, 1, 2, . . . , 7] such that R[i]={0, 1, 2, 3, . . . , 7}. In such an instance, the eight variable-to-check messages and check-to-variable messages can be described as follows:
variable-to-check messages: v0ci[q−1], v1ci[q−1], . . . , v7ci[q−1]
check-to-variable messages: civ0[q], civ1[q], . . . , civ7[q]
In accordance with the min-sum algorithm, then, the check-to-variable messages can be calculated as follows: hand, 33 bits of memory may be required. In such instances, the number of bits can be calculated as the sum of 7 bits for each of MIN and MIN2, 1 sign bit for each of fifteen check-to-variable messages, and 4 bits (ceil(log2 15)) for index I1. Also in such instances, storing MIN, MIN2, sign bits and index I1 instead of the check-to-variable messages can reduce the required memory by roughly 70% or more. In addition, configuring the memory in this manner may reduce the number of latches required to delay check-to-variable messages in the pipelined decoder architecture.
In various instances, as explained above, the decoder architecture may implement a modified min-sum algorithm that accounts for an approximation error in the min-sum algorithm. In such instances, the modified min-sum algorithm also includes calculation of the third minimum value, and may also include storage of I2 and MIN3. Thus, in accordance with the modified min-sum algorithm, the amount of storage that may be required to accommodate a check-node for R-¾ WiMAX code with a check-node degree of fifteen can be calculated as the previous 33 bits plus an additional 8 bits (7-bit magnitude MIN3 and 4-bit value for the index of MIN3), for a total of 44 bits. Thus, in either instance of implementing the min-sum algorithm or modified min-sum algorithm, the number of bits required to store the magnitude and sign values, and the indices of the check-to-variable messages for those values, can be significantly lower than that required to store the check-to-variable messages themselves.
According to one exemplary aspect of the present invention, the functions performed by one or more of the entities of the system, such as the terminal 32, BS 34 and/or BSC 36 including respective transmitting and receiving entities 70, 72, may be performed by various means, such as hardware and/or firmware, including those described above, alone and/or under control of one or more computer program products. The computer program product(s) for performing one or more functions of exemplary embodiments of the present invention includes at least one computer-readable storage medium, such as the non-volatile storage medium, and software including computer-readable program code portions, such as a series of computer instructions, embodied in the computer-readable storage medium.
In this regard,
Accordingly, blocks or steps of the functional block and control flow diagrams support combinations of means for performing the specified functions, combinations of steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that one or more blocks or steps of the functional block and control flow diagrams, and combinations of blocks or steps in the functional block and control flow diagrams, can be implemented by special purpose hardware-based computer systems which perform the specified functions or steps, or combinations of special purpose hardware and computer instructions.
Many modifications and other embodiments of the invention will come to mind to one skilled in the art to which this invention pertains having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
The present application is a continuation of U.S. patent application Ser. No. ______, entitled: Error Correction Decoder, Method and Computer Program Product for Block Serial Pipelined Layered Decoding of structured Low-Density Parity-Check (LDPC) Codes, Including Calculating Check-To-Variable Messages, filed concurrently herewith, which is a continuation-in-part of U.S. patent application Ser. No. 11/253,207, entitled: Block Serial Pipelined Layered Decoding Architecture for Structured Low-Density Parity-Check (LDPC) Codes, filed Oct. 18, 2005, the contents of both of which are incorporated herein by reference in their entireties.
Number | Date | Country | |
---|---|---|---|
Parent | 11273552 | Nov 2005 | US |
Child | 11272919 | Nov 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11253207 | Oct 2005 | US |
Child | 11272919 | Nov 2005 | US |