The present invention relates to an encoding technology in digital communications, in particular to a check-matrix generating method of generating a parity check matrix for low-density parity check (LDPC) codes, an encoding method of encoding predetermined information bits using the parity check matrix, and a communication apparatus.
Hereinafter, a conventional communication system that employs LDPC codes as an encoding system will be explained. Here, a case in which quasi-cyclic (QC) codes (see Non-patent Document 1) are employed as one example of the LDPC codes will be explained.
First, a flow of encoding/decoding processing in the conventional communication system that employs the LDPC codes as the encoding system will be explained briefly.
An LDPC encoder in a communication apparatus on a transmission-side (it is called a transmission apparatus) generates a parity check matrix H by a conventional method that will be explained below. Further, the LDPC encoder generates, for example, a generator matrix G with K-row×N-column (K: information length, N: code length). Note that when the parity check matrix for LDPC is defined as H (M-row×N-column), the generator matrix G will be a matrix that satisfies GHT=0 (T is a transposed matrix).
Thereafter, the LDPC encoder receives messages (m1, m2, . . . , mK) with the information length K to generate a code C as represented by following Equation (1) using these messages and the generator matrix G, where H(c1, c2, . . . , cN)T=0.
A modulator in the transmission apparatus then performs digital modulation to the code C generated by the LDPC encoder according to a predetermined modulation system, such as binary phase shift keying (BPSK), quadrature phase shift keying (QPSK), multi-value quadrature amplitude modulation (QAM), and transmits a modulated signal x=(x1, x2, . . . , xN) to a reception apparatus.
Meanwhile, in a communication apparatus on a reception-side (which is called a reception apparatus), a demodulator performs digital demodulation to a received modulated signal y=(y1, y2, . . . , yN) according to the modulation system such as BPSK, QPSK, multi-value QAM, or the like, and an LDPC decoder in the reception apparatus further performs repetition decoding to demodulated results based on a “sum-product algorithm” to thereby output the decoded results (corresponding to the original messages m1, m2, . . . , mK).
The conventional parity check-matrix generating method for the LDPC codes will now be explained concretely. As the parity check matrix for the LDPC codes, a following parity check matrix of QC codes is proposed, for example, in following Non-patent Document 1 (see
Generally, a parity check matrix HQC of the (J, L) QC codes with M (=pJ) rows×N (=pL) columns can be defined as following Equation (2). Incidentally, p is an odd prime number (other than 2), L is the number of cyclic permutation matrices in the parity check matrix HQC in a transverse direction (column direction), and J is the number of cyclic permutation matrices in the parity check matrix HQC in a longitudinal direction (row direction)
Where, in 0≦j≦J−1 and 0≦l≦l L−1, I(pj,l) are cyclic permutation matrices in which positions of a row index: r (0≦r≦P−1), and a column index: “(r+pj,l)mod p” are “1”, and other positions are “0”.
In addition, when the LDPC codes are designed, performance degradation generally occurs when there are many loops with a short length, and thus it is necessary to increase an internal diameter and to reduce the number of loops with the short length (loop 4, loop 6, or the like).
Incidentally,
Meanwhile, in following Non-patent Document 1, a range of an internal diameter g in the parity check matrix HQC of (J,L) QC-LDPC codes is given by “4≦g≦12 (where g is an even number)”. However, it is easy to avoid g=4 and, and it results in g≧6 in many cases.
According to the conventional technology, however, while codes equal to loop 6 or more can be easily constituted with a regular configuration, a regular (weights of the row and the column are uniform) parity check matrix for the LDPC codes is generated, so that there is a problem that an irregular (weights of the row and the column are nonuniform) parity check matrix that is generally considered to have excellent performance is not specified.
Additionally, it is necessary to prepare the generator matrix G aside from the check matrix H upon encoding, so that there is a problem that an additional circuit for calculating the generator matrix G is required. Moreover, it is necessary to prepare the check matrixes H corresponding to the number of encoding rates in dealing with a plurality of encoding rates, so that there is a problem that the circuit scale is further increased.
The present invention is made in view of the situation, and aims at obtaining a communication apparatus that can deal with the irregular (weights of the row and the column are nonuniform) parity check matrix for the LDPC codes, and whose circuit scale can be further reduced as compared with that of the conventional technology.
To solve the above problems and to achieve the object, a check-matrix generating method for generating a parity check matrix for low-density parity check (LDPC) codes, according to the present invention, includes a quasi-cyclic matrix generating step of generating a regular (weights of a row and a column are uniform) quasi-cyclic matrix in which cyclic permutation matrices are arranged in a row direction and a column direction and specific regularity is given to the cyclic permutation matrices; a mask-matrix generating step of generating a mask matrix for making the regular quasi-cyclic matrix into irregular (weights of a row and a column are nonuniform), the mask matrix capable of supporting a plurality of encoding rates; a masking step of converting a specific cyclic permutation matrix in the regular quasi-cyclic matrix into a zero-matrix using a mask matrix corresponding to a specific encoding rate to generate an irregular masking quasi-cyclic matrix; and a check-matrix generating step of generating an irregular parity check matrix with a low-density generation matrix (LDGM) structure in which the masking quasi-cyclic matrix and a matrix in which the cyclic permutation matrices are arranged in a staircase manner are arranged in a predetermined location.
According to the present invention, a predetermined masking rule for generating the irregular matrix is applied to the regular quasi-cyclic matrix in which the specific regularity is given, allowing the irregular parity check matrix with the LDGM structure to be easily generated. Moreover, it is not necessary to generate the generator matrix G as is necessary in the conventional technology, allowing the circuit scale to be greatly reduced.
Hereinafter, embodiments of a check-matrix generating method according to the present invention will be explained in detail based on the drawings. Incidentally, the present invention is not limited by these embodiments.
Here, a flow of encoding processing and decoding processing in the communication system that employs LDPC codes will be explained briefly.
The LDPC encoder 1 in the transmission apparatus generates a parity check matrix generated by a check-matrix generating method according to the present embodiment, namely, a parity check matrix HM with M-row×N-column to which masking processing is performed based on a predetermined masking rule described below.
Thereafter, the LDPC encoder 1 receives a message (u1, u2, . . . uK) with an information length K to generate a code v with a length N using this message and the parity check matrix HM as represented by following Equation (3). It should be noted that in the present embodiment, the encoding processing of information bits is performed without using the generator matrix G (K: information length, N: code length) calculated in the conventional technology.
v={(v1,v2, . . . ,vn)εGF(2)|(v1,v2, . . . ,vn)HMT=0} (3)
The modulator 2 in the transmission apparatus then digital-modulates the code v generated by the LDPC encoder 1 according to a predetermined modulation system, such as BPSK, QPSK, and multi-value QAM, and transmits the modulated signal x=(x1, x2, . . . , xN) to the reception apparatus to a communication channel 3.
Meanwhile, in the reception apparatus, the demodulator 4 digital-demodulates a modulated signal y=(y1, y2, . . . , yN) received via the communication channel 3 according to a modulation system, such as the BPSK, QPSK, and multi-value QAM, and the LDPC decoder 5 in the reception apparatus further performs repetition decoding with a well-known decoding algorithm to thereby output the decoded result (corresponding to the original message u1, u2, . . . , uK).
Subsequently, the check-matrix generating method according to the present embodiment will be explained in detail. Incidentally, in the present embodiment, it is supposed that an irregular (weight distribution is nonuniform) parity check matrix is generated, and it is premised that an LDGM (low-density generation matrix) structure is employed as the structure. Moreover, check matrix generation processing of each embodiment explained hereinafter may be performed by the LDPC encoder 1 in the communication apparatus, or may be performed in advance outside the communication apparatus. When it is performed outside the communication apparatus, the generated check matrix is stored in an internal memory.
First, a parity check matrix HQCL of QC-LDPC codes with the LDGM structure, which is a premise for the irregular parity check matrix HM after the masking processing and is generated by the check matrix generation processing of the present embodiment, will be defined.
For example, the parity check matrix HQCL (=[hm,n]) of the QC-LDPC codes with the LDGM structure of M (=pJ) rows×N (=pL+pJ) columns can be defined as following Equation (4-1).
Here, hm,n represents an element at a row index m and a column index n in the parity check matrix HQCL. Additionally, in 0≦j≦J−1 and 0≦l≦L−1, I(pj,l) are cyclic permutation matrices in which positions of a row index: r (0≦r≦p−1), and a column index: “(r+pj,l)mod p” are “1”, and other positions are “0”. For example, I (1) can be represented as following Equation (4-2).
In the parity check matrix HQCL, a left-hand side matrix (a portion corresponding to information bits) is a quasi-cyclic matrix HQC that is the same as the parity check matrix of QC codes shown by Equation (2), and a right-hand side matrix (a portion corresponding to parity bits) is a matrix HT or HD in which I(0) are arranged in a staircase manner as shown in following Equation (5-1) or Equation (5-2).
However, the cyclic permutation matrices used in the staircase structure are not necessarily limited to I(0), but may be a combination of arbitrary I(s|sε[0, p−1]).
Note that, the LDGM structure means a structure in which a part of the parity check matrix is formed into a lower triangular matrix as the matrix shown in Equation (4-1). Encoding can be achieved easily by using this structure without using the generator matrix G. For example, when the systematic code v is represented as following Equation (6), and the information message u=(u1, u2, . . . , uK) is given, parity elements pm=(p1, p2, . . . , pM) are generated so that “HQCL·vT=0” may be satisfied, namely as following Equation (7).
where N=K+M.
Further, in the present embodiment, a specific regularity is provided in the parity check matrix HQCL of the QC-LDPC codes with the LDGM structure defined as the Equation (4-1). Specifically, in the HQC portion of the quasi-cyclic matrix on the left-hand side of the parity check matrix HQCL, a specific regularity is provided to pj,l of the cyclic permutation matrices I(pj,l) with p-row×p-column arranged at a row index j (=0, 1, 2, . . . , J−1) and a column index l (=0, 1, 2, . . . , L−1) so as to satisfy following Equation (8-1) or following Equation (8-2).
pj,l=j(l+1)mod p (8-1)
pj,l=(j+1)(l+1)mod p (8-2)
Additionally, a specific regularity may be provided to pj,l of the cyclic permutation matrices I(pj,l) to satisfy following Equation (9-1) or following Equation (9-2), where p0,1 is an arbitrary integer.
pj,l=p0,1(j+1)mod p (9-1)
pj,l=((p−p0,1)(j+1))mod p (9-2)
Incidentally, in the present embodiment, another regularity that can be composed of parameters, such as j, l, pj,l may be provided, without limiting to Equation (8-1), Equation (8-2), Equation (9-1), and Equation (9-2).
As described above, in the present embodiment, the regularity that can specify pj,l by the row index j and the column index l of the cyclic permutation matrix, or the regularity that can specify pj,l, while setting p0,1 of a specific row index, specifically row index j=0, to an arbitrary integer, by the other row index j is provided. As a result, even when the number of rows of the quasi-cyclic matrix HQC is increased, it is not necessary to store pj,l of the whole HQC, as will be below described.
Additionally, it is not necessary to store anything about the quasi-cyclic matrix HQC when Equation (8-1) or Equation (8-2) is used.
Moreover, what is necessary is to store only p0,1 when Equation (9-1) or Equation (9-2) is used. At this time, what is necessary is just to store p0,1 by the number of columns of the quasi-cyclic matrix HQC, and it can be achieved by a small memory capacity even when HQC has a large number of rows. In addition to that, since a column index of the first row of the permutation matrix of j-th row is decided by integral multiples of p0,1 based on these regularities, specifically, what is necessary is just to add p0,1 for every row, it can be achieved by a small calculation amount.
It is noted that since a range of the combination to be taken in using Equation (8-1) or Equation (8-2) in which nothing is required to be stored becomes wider than that in using Equation (9-1) or Equation (9-2) is used, a combination with excellent performance can be chosen. Incidentally, the search method of p0,1 will be below described.
Subsequently, mask processing for the parity check matrix HQCL, which is distinctive processing in the check-matrix generating method of the present embodiment will be explained.
For example, when the left-hand side matrix shown in Equation (4-1) is represented by the quasi-cyclic matrix HQC of J×L as shown in following Equation (10-1), and a mask matrix Z (=[zj,l]) is defined as a matrix with J-row×L-column on GF(2), the matrix HMQC after the mask processing can be represented as following Equation (10-2) if a predetermined rule described below is applied.
Here, zj,lI(pj,l) in Equation (10-2) is defined as following Equation (11).
The zero-matrix is a zero-matrix with p-row×p-column. Additionally, the matrix HMQC is a matrix in which the quasi-cyclic matrix HQC is masked with 0-elements of the mask matrix Z, and the weight distribution is nonuniform (irregular), while a distribution of the cyclic permutation matrices of the matrix HMQC is the same as a degree distribution of the mask matrix Z.
Note that a weight distribution of the mask matrix Z when the weight distribution is nonuniform shall be determined by a predetermined density evolution method as will be below described. For example, the mask matrix with 64-row×32-column can be represented as following Equation (12) based on a column degree distribution by the density evolution method.
Hence, the irregular parity check matrix HM to be finally determined in the present embodiment can be represented as following Equation (13) using, for example, the mask matrix Z with 64-row×32-column, the quasi-cyclic matrix HQC with 64 (row index j is 0 to 63)×32 (column index l is 0 to 31), and HT of 64 (row index j is 0 to 63)×64 (column index l is 0 to 31).
Namely, the parity check matrix HMQC for generating the LDPC codes C is given by a design of the mask matrix Z and a value of the cyclic permutation matrix at the row index j=0 of the quasi-cyclic matrix HQC.
Subsequently, an implementation example when the encoding is achieved using the regular parity check matrix HM without using the generator matrix G will be shown hereinafter, and an operation thereof will be explained. Note herein that, the parity check matrix HQCL of the QC-LDPC codes with the LDGM structure is considered as a matrix shown in following Equation (14-1).
Meanwhile, the irregular parity check matrix HM in which the matrix shown in Equation (14-1) is masked is defined as a matrix shown in following Equation (14-2).
Additionally, the information message is defined as u=(up,1 up,2)=(01100 11001). Note that up,1 is provided by dividing u for every p bits to then give numbers in an ascending order to 1.
Here, as processing in generating codes without using the generator matrix G, a product-sum operation of the matrix HMQC after the mask processing for p rows and the information message u will be explained.
Since the cyclic permutation matrix at the j-th row and l-th column of the quasi-cyclic matrix HQC is I(j·(l+1)), “0≦j≦J−1”, “0≦l≦L−1” in
Meanwhile, as for the information message u, it is divided for every p-length to be then inputted into registers 68 and 69 in order via the delay element 62 per p clock cycles. EXOR between the information message u with length p in the register 69, and a bit string in the register 67 is then calculated by the adder 70, and a summation of each bit of EXOR operation results is calculated by an adder 72. A sum-product calculation between the first row of I(j·(l+1)) and up,1 of the information message can be achieved by this processing. Next, the second row of I(j−(l+1)) can be generated by shifting the register 67 using the delay element 61, thus a sum-product calculation between the second row of I(j·(l+1)) and up,1 of the information message can be similarly achieved. Thereafter, sum-product calculation results pp,j′ for p rows of I(j·(l+1)) can be obtained by repeatedly executing this processing p times. Incidentally, pp,j′ means p bits of the sum-product calculation results of all the cyclic permutation matrices at the j-th row.
Next, to calculate the product-sum between I(j·(l+1)) and up,1 from l=0 to l=L−1, the EXOR operation is repeatedly performed L times by the delay element 62 and the adder 72. This operation is repeatedly executed from j=0 to j=J−1, so that a sum-product calculation result pp,j′ between the matrix HMQC after the mask processing and u is obtained. Incidentally, in the selector 73, 0 is selectively outputted when zj,l=0, and an output of an adder 71 is selectively outputted when zj,l=1.
Meanwhile,
Subsequently, the masking rule when the quasi-cyclic matrix HQC is masked with the O-elements of the mask matrix Z will be specifically explained. Here, the communication apparatus of the present embodiment generates the mask matrix Z for making the quasi-cyclic matrix HQC with 64 (row index j is 0 to 63)×32 (column index l is 0 to 31) non-uniform (irregular) based on the regular masking rule. As one example, the mask matrix Z corresponding to the codes of the encoding rate ⅓ is generated.
First, a size of the mask matrix is set to a multiple of 8 by the LDPC encoder 1 in the communication apparatus (Step S1). Here, as one example, the mask matrix Z corresponding to the codes of the encoding rate ⅓ is set to a matrix with 64-row×32-column, and the mask matrix ZA corresponding to the codes of the encoding rate ½ is set to a matrix with 32-row×32-column. For example, since a size of data used for communication is generally multiples of 8, it is possible to take consistency with the information length that is a multiple of 8, by setting the size of the mask matrix to a multiple of 8 even when a size of p is changed.
Next, the LDPC encoder 1 calculates a column degree distribution of the mask matrix ZA by the density evolution method using the number of rows of the mask matrix ZA as the maximum degree, and a degree distribution of HD shown in Equation (5-2) as constraints (Step S2).
Further, the LDPC encoder 1 calculates a column degree distribution of the mask matrix Z by the density evolution method using the number of rows of the mask matrix Z as the maximum degree, and a degree distribution of HT of 64 (row index j is 0 to 63)×64 (column index l is 0 to 63) shown in Equation (5-1) and the column degree distribution of the mask matrix ZA calculated above as constraints (Step S2).
Next, the LDPC encoder 1 decides a position of “1” of a column with a large column degree in the mask matrix ZA, namely, a column (5/64) of a column degree 14, here, based on the column degree distribution of the mask matrix ZA, so as to satisfy following conditions of priority #1 (Step S3). For example, when there are successive “1s” in Z, there are cyclic permutation matrices in four positions between vertically successive I(0) of the HD, and they may compose a loop 4, thus the possibility is eliminated by satisfying the following conditions of priority #1.
At this time, since the column with the large column degree has a large density of “1”, it does not need to satisfy conditions of priority #2 described below. Additionally, to achieve the column degree 14 that is determined above, “1” may continue in the same column, but the number thereof shall be reduced as much as possible.
There is only one column with the large column degree of 14 here, but when there are a plurality of columns with large column degrees, such as 14, 13, 12, . . . , for example, the columns of the mask matrix ZA are arranged in a descending order of the column degree from the left (Step S3).
Next, the LDPC encoder 1 decides a position of “1” of columns with small column degrees in the mask matrix ZA, namely, columns (18/64, 9/64) with column degrees 4 and 3 here, based on the column degree distribution of the mask matrix ZA, so as to satisfy the conditions of priority #1, and the following conditions of priority #2, (Step S4). For example, when an arrangement of “1” of the mask matrix is also regular to a combination of the cyclic permutation matrices based on a regular rule, there may be many identical loops in multiplex because of its regularity, if there is an arrangement of “1” of the mask matrix that composes a specific loop. However, the occurrence probability can be reduced by satisfying the following conditions of priority #2.
Conditions of priority #2: arrange “1” based on random numbers.
The columns of the mask matrix ZA are then arranged in a descending order of the column degree from the left following the column with the large column degree (Step S4).
For example, the mask matrix ZA generated at Steps S3 and S4 will result in a matrix shown in Equation (15).
It should be noted that in composing the mask matrix ZA based on the column degree distribution of the mask matrix ZA that is determined by the density evolution method, if small loops (loop 4, 6, or the like) are included in a column with the small column degree (column degree 3, 4, or the like), error probability is increased, and thus excellent performance may not be obtained. In such a case, the LDPC encoder 1 avoids performance degradation by increasing the weight of the column with the small column degree. In the case of the mask matrix ZA, the weights of three columns of the columns (9/64) with column degree 3 are increased in the column degree distribution shown in
Next, the LDPC encoder 1 decides a position of “1” of a column with the large column degree in the mask matrix Z, namely, a column (5/96) with column degree 28 here, based on the column degree distribution of the mask matrix Z, so as to satisfy the conditions of priority #1 (Step S5). At this time, since the column with the large column degree has a large density of “1”, it does not need to satisfy the conditions of priority #2. Additionally, to achieve the column degree 28 determined above, “1” may continue in the same column, but the number thereof shall be reduced as much as possible.
There is only one column with the large column degree of 28 here, but when there are a plurality of columns with the large column degree, the columns of the mask matrix Z are arranged in a descending order of the column degree from the left (Step S5).
Next, the LDPC encoder 1 decides a position of “1” of columns with the small column degrees in the mask matrix Z, namely, some columns (10/96, 8/96, 9/96) of the column degrees 8, 4, and 3 here, based on the column degree distribution of the mask matrix Z, so as to satisfy the conditions of priority #1, and the conditions of priority #2 (Step S6).
The columns of the mask matrix Z are then arranged in a descending order of the column degree from the left following the column with the large column degree (Step S6).
For example, the mask matrix Z generated at Steps S5 and S6 can be represented as Equation (12). In Equation (12), ZA(1:32,2:5) represents submatrices in the first row to 32nd row, and the second column to the fifth column of the mask matrix ZA, ZA(1:32,1) represents submatrices in the 1st row to 32nd row, and the 1st column of the mask matrix ZA, and ZA(1:32,7:16) represents submatrices in the first row to 32nd row, and the seventh column to the sixteenth column of the mask matrix ZA.
Incidentally, in composing the mask matrix Z based on the column degree distribution of the mask matrix Z that is determined by the density evolution method, if a small loop (loop 4, 6, or the like) is included in the column with the small column degree (column degree 3, 4, 8, or the like), error probability is increased, and thus excellent performance may not be obtained. In such a case, the LDPC encoder 1 avoids performance degradation by increasing the weight of the column with the small column degree.
Meanwhile, in applying the LDPC codes to applications of unequal error probability such as multi-level modulation, if a bit with small error probability is allocated to a bit corresponding to the column with the large column degree, and a bit with large error probability is allocated to a bit corresponding to the column with the small column degree, performance is improved. In such a case, when the columns are arranged from the left-hand side in a descending order of the column degree as shown at Steps S3 to S6, ordering of the bits becomes easy.
Subsequently, a mask matrix designing method using a pseudo-random number sequence will be explained. For example, in the explanation, the position of “1” in the column with the small column degree is decided so as to satisfy the conditions of priority #1 and conditions of priority #2. Specifically, in the present embodiment, the position of “1” in the column with the small column degree is decided using the pseudo-random number sequence in which a difference between the positions of 1” in the same column is two or more.
For example, random numbers are generated based on Fermat's little theorem shown in following Equation (16) in the present embodiment. Incidentally, G0 is a primitive element of GF(p).
A(i)=G0i mod p,i=0,1,2, . . . ,p−2 (16)
If there are any elements whose difference is 1 in the random number sequence, processing in which a back element is moved to the last is performed, for example, to thereby decide a position of “1” in the column with the small column degree using a random number sequence after performing this processing.
Specifically, when the random number sequence is generated as P=11 and G0=2,
{1 2 4 8 5 10 9 7 3 6}
is obtained, so that respective back elements 2 and 9 of an element 1 and an element 2, and an element 10 and an element 9, in which the difference between the elements is 1 are moved to the end. Namely,
{1 4 8 5 10 7 3 6 2 9}
is obtained.
Thereafter, the random number sequence after the rearrangement is divided for every column degree to make it as a row position number. For example, supposing that the column degree 3 is 2 columns, and the column degree 4 is 1 column, the random number sequence is divided as
{1 4 8}, {5 10 7}, {3 6 2 9}, and
each element after the division is a row index of “1” in the column.
When the positioning of “1” is then completed according to this random number sequence, a random number sequence is further generated in a different primitive element similarly to thereby decide a position of “1” of the remaining columns using its random number sequence.
An effect that the small loops are hardly generated is provided by this processing. Moreover, although there is a possibility that the short loop may be generated when HT is used and “1s” adjoin to each other in the same column of the mask matrix, the possibility can be avoided by using the random number sequence.
Note herein that the method of generating the random number sequence is one example, and any types of sequence may be used as long as it is a pseudo-random number sequence in which the difference between the elements in the same column is two or more.
Subsequently, the search method of p0,1 will be explained. The search method of p0,1 by the communication apparatus according to the present embodiment when the mask matrix ZA is used and the quasi-cyclic matrix HQC based on Equation (9-1) or Equation (9-2) is used will be explained here. Additionally, it is assumed that HM(1/2) is “HM(1/2)=[ZA×HQCU|HD]” using the mask matrix ZA determined in
Next, the LDPC encoder 1 changes a value of p0,L−2 from 1 to p−1 based on “HM(1/2)=[ZA×HQCU|HD]” to thereby determine p0,L−2 in which the minimum loop is the maximum and the number of the minimum loops is the minimum (Step S12). At this time, it is a condition that all the cyclic permutation matrices from the first column to the (L−3)-th column of HM(1/2) are replaced to the zero-matrices.
Hereafter, the LDPC encoder 1 continues to determine p0,L−3, p0,L−4, p0,L−5 by the processing similar to that described above, and lastly, changes a value of p0,0 from 1 to p−1 based on “HM(1/2)=[ZA×HQCU|HD]” to thereby determine p0,0 in which the minimum loop is the maximum and the number of the minimum loops is the minimum (Step S13).
Since p0,1 is preferentially decided by performing the processing of Steps S11 to S13 from the column with the small column degree that is easy to be influenced by the minimum loop, the check matrix with excellent performance can be designed.
Here, one example of p0,1 determined by the search method will be shown hereinafter. For example, when Equation (9-2) is applied to HQC of 32 (row index j is 0 to 31)×32 (column index l is 0 to 31),
p0,0=39, p0,0=21, p0,2=41, p0,3=61, p0,4=6, p0,5=40, p0,6=1, p0,7=37, p0,8=3, p0,9=34, p0,10=26, p0,11=10, p0,12=22, p0,13=16, p0,14=37, p0,15=17, p0,16=25, p0,17=23, p0,18=12, p0,19=1, p0,20=10, p0,21=14, p0,22=6, p0,23=24, p0,24=25, p0,25=26, p0,26=27, p0,27=28, p0,28=29, p0,29=30, p0,30=31, p0,31=3 2
is obtained.
Note herein that in the present embodiment, the mask matrix design method using the pseudo-random number sequence and the search method of p0,1 are easily applicable even when neither HD nor HT is included in the parity check matrix.
As is understood, in the present embodiment, specific regularity that the column index of the first row of the cyclic permutation matrix arranged at the row index j and the column index l of the HQC portion in the quasi-cyclic matrix becomes Equation (8-1), Equation (8-2), Equation (9-1), and Equation (9-2) is provided to the parity check matrix HQCL of the QC-LDPC codes with the LDGM structure, and the quasi-cyclic matrix HQC to which the specific regularity is provided is masked using the mask matrix generated by the predetermined method, so that the irregular parity check matrix is generated. As a result of this, the irregular parity check matrix HM with the LDGM structure can be generated from the parity check matrix HQCL with the LDGM structure. Moreover, encoding can be achieved easily without using the generator matrix G as a result of forming a part of the parity check matrix into the staircase structure, and thus allowing the circuit scale to be greatly reduced since it is not necessary to generate the generator matrix G.
While the code configuration method up to the encoding rate ⅓ is explained in the first embodiment, the code configuration method up to, for example, the encoding rate 1/10 will be explained in the present embodiment. Incidentally, a system configuration thereof is similar to that shown in
A masking rule when the quasi-cyclic matrix HQC of 288 (row index j is 0 to 287)×32 (column index l is 0 to 31) corresponding to the encoding rate 1/10 is masked with the O-elements of the mask matrix Z with 288-row×32-column will be specifically explained here. Here, the communication apparatus of the present embodiment generates the mask matrix Z for making the quasi-cyclic matrix HQC of 288×32 irregular based on the regular masking rule.
Hereinafter, the processing different from that shown in
In addition, the HT is defined as following Equation (18), and TD in HT is further defined as following Equation (19).
Meanwhile, it is assumed that the irregular parity check matrix corresponding to the codes of the encoding rate ½ is “HM(1/2)=[ZA×HQC(1/2)|HT(1/2)]”. Note that ZA (=ZA(1/2)) is the mask matrix with 32-row×32-column, HQC(1/2) represents the quasi-cyclic matrix of 32 (row index j is 0 to 31)×32 (column index l is 0 to 31) of 1/9 from the top in the quasi-cyclic matrix HQC, and HT(1/2) is the TD. Additionally, corresponding to the encoding rates ⅓, ¼, . . . , 1/10, the irregular parity check matrices are represented as HM(1/3), HM(1/4), . . . , HM(1/10) (=HM), the mask matrices are represented as ZA(1/3), ZA(1/4), . . . , ZA(1/10) (=Z), the quasi-cyclic matrices are represented as HQC(1/3), HQC(1/4), . . . , HQC(1/10) (=HQC), and are represented as HT(1/3), HT(1/4), . . . , HT(1/10) (=HT), respectively.
For example, in the processing at Step S2 shown in
Next, the LDPC encoder 1 decides a position of “1” of each column of the mask matrix corresponding to the encoding rates ½ and ⅓ based on the conditions of priority #1 and the conditions of priority #2 in manner similar to that of the first embodiment in the processing of Steps S3 to S6 in
For example, the mask matrix Z generated by the processing of the present embodiment can be represented as following Equation (20).
As is understood, since the mask matrix Z is composed only using the submatrices of the mask matrix ZA corresponding to the encoding rate ½ in the present embodiment, the memory capacity for storing the mask matrix can be reduced even when the mask matrix becomes large according to the encoding rate.
Additionally, each mask matrix according to the encoding rate is used while shifting the submatrices of the mask matrix ZA so that the same pattern may not be formed in a column direction. Specifically, the submatrices of the mask matrix ZA are separated into submatrices with a heavy column degree (weight 14), and submatrices with light column degrees (weight is four or less), and are used while shifting each of them. For example, ZA(1:32,1:5) are the submatrices with the column degree 14 in the mask matrix ZA, whereas in the mask matrix ZA(1/3), they are shifted to the left per column, and ZA(1:32,2:5) ZA(1:32,1) after the shift are coupled under ZA(1:32,1:5) of the mask matrix ZA. Meanwhile, ZA(1:32,6:32) are submatrices with four or less column degrees in the mask matrix ZA, whereas in the mask matrix ZA(1/3), the submatrices ZA(1:32,7:16) with the required number of columns are used among ZA(1:32,6:32), and these ZA (1:32,7:16) are couple under ZA (1:32,6:15) of the mask matrix ZA. The mask matrices ZA(1/4), ZA(1/5), and ZA(1/6) . . . are also used while shifting the submatrices of the mask matrix ZA so that the same pattern may not be formed in the column direction. As a result of this, small loops that are easy to be generated when HT is used can be avoided.
Subsequently, rules when the parity check matrix generated in the first and second embodiments deals with the arbitrary code length will be explained.
It is possible to deal with the arbitrary code length by changing the size p of the cyclic permutation matrix I(pj,l), and in that case, a value of pj,l is changed base on following rules in the present embodiment.
(1) In “p≦pA”, the value of pj,l is changed as shown in following Equation (21).
pj,llen=pj,lPA mod p (21)
Note that pj,llen is a column index of 1 of the first row of the cyclic permutation matrices at the time of the size p, and pj,lPA is a column index of 1 of the first row of the cyclic permutation matrices at the time of a size pA, where these pj,lPA and pA shall be determined in advance.
(2) In “p>pA”, the value of pj,l is changed as shown in following Equation (22), following Equation (23), following Equation (24), or Equation (21).
Where, SM in Equation (22) is the number of rows of the mask matrix, and α is a constant of an arbitrary real number of “0≦α≦1”. Additionally, the second term of Equation (23) generally represents an integer to be added to or subtracted from the first term. This portion may be “random numbers equal to ((p/pA)×α) or less”.
With respect to the (1), there is a feature that it does not change if pj,llen does not exceed p even when p changes, thereby, an effect that the distribution of the loop hardly changes is obtained.
Meanwhile, with respect to the (2), although a distribution of the loop does not change when p increases in integral multiples, there is an effect of complementing an intermediate value in the case of a multiple that cannot be divided by integral multiples.
For example, it is assumed that a certain LDPC codes are composed of a masking quasi-cyclic matrix H as following Equation (25) at pA=10.
Here, in the case of following Equation (27), a necessary and sufficient condition for a quasi-cyclic matrix H′ as shown in following Equation (26) to have loop 2i will result in following Equation (28).
Incidentally, the Δ is following Equation (29).
[Numerical Expression 19-2]
Δj
Hence, considering to use this condition, it is understood that there is the loop 6 of (1−2)+(6−9)+(6−2)=0 in the Matrix H shown in Equation (25).
Meanwhile, when P=110 to pA=10, it results in following Equation (30) if Equation (24) is applied. In this case, it becomes (11−22)+(66−99)+(66−22)=0 in the same position, and the distribution of the loop does not change, so that this method (Equation (24)) may be used in the sense that the distribution of the loop at the time of pA=10 can be assured.
However, considering that there is no numeric character other than multiples of p/pA when p is integral multiples of pA, the loop can be further resolved if a value smaller than p/pA is added to a value of Equation (24), and thus a possibility that a distribution of large loops can be composed will increase. For example, when α=¼ is used in Equation (22), following Equation (31) is obtained, and it becomes (11−22)·(66−102)·(67−22)=−2≠0 in the same position, so that conditions of the loop 6 are not satisfied.
Meanwhile, since all the loops are specified by the multiples of p/pA in Equation (24), the probability that conditions to newly specify the small loops will occur becomes low if the second term of Equation (22) is small enough compared with p/pA. Namely, it can be expected that the distribution of the loop will shift to a large value when Equation (22) is applied.
In a fourth embodiment, the LDPC codes corresponding to the encoding rates are configured using the irregular parity check matrix HM determined in the first to third embodiments.
A construction method of the LDPC codes dealing with the encoding rates will be specifically explained here. For example, it is supposed that the lowest encoding rate prepared by the system is R0=⅓ or less.
For example, when the codes corresponding to the encoding rate R0= 1/10 are stored in the memory, and codes of an encoding rate R1 are constructed, if the encoding rate R1 is less than ½, namely, if the encoding rate R1 is between ½ to 1/10, the parity bits are punctured from the end of the code in order.
Meanwhile, when the encoding rate R1 is higher than ½, a set r′ of the puncturing bits of the LDPC codes is represented as follows. For example, assuming parity bits with a length r to the encoding rate R1=K/(K+K/2(l−1)) (1=2, 3, . . . ), the set r′ of the puncturing bits can be represented as following Equation (32).
r′=r\{r(1:2(l−1):K)} (32)
Note that {r(1:2(l−1):K)} shows elements from the first element to the K-th element of a set r at 2(l−1) step, and Equation (32) means a set excluding the set {r(1:2(l−1):K)} from the set r.
Hence, when puncturing 1 bit at a time, deletion is performed in order from an element behind an element to be {r(1:2(l−1):K)}\{r(1:2(l−1+1):K)} to the set {r(1:2(l−1):K)}, and it is removed from the set of r to be made a puncture bit. At this time, the puncture bits shown in
As is understood, in the present embodiment, the code of the specific encoding rate is set as a reference, the puncture of the parity is performed with respect to the encoding rate higher than the reference code, whereas the parity is increased with respect to the low encoding rate, and at that time, the puncture processing and parity adding processing are achieved using one parity check matrix HM without individually generating the parity check matrix according to the encoding rate. As a result of this, it is possible to easily deal with the encoding rates, and it further becomes unnecessary to prepare the parity check matrix corresponding to the number of encoding rates, allowing the circuit scale to be greatly reduced.
In a fifth embodiment, applications of the LDPC codes to erasure correction codes will be described. While the LDPC codes explained so far are the error correcting codes with a type mounted in a physical layer of communication instruments, they can be utilized for the erasure correction codes as they are, thus description will be added henceforth.
In aiming at succeeding in the decode for an arbitrary code length and an encoding rate by the stochastically small number of received packets, the erasure correction codes based on the LDPC codes are suitable. Meanwhile, when the number of decodable erasure packets needs to be assured for the encoded packets, or when the number of burst erasure packets needs to be assured, erasure correction codes based on cyclic codes, such as BCH codes, become effective.
The codes for erasure correction are composed based on the LDPC codes according the present invention explained so far, or the general LDPC codes. Additionally, in the sense of assuring the number of erasure packets, they are composed based on Hamming codes, cyclic codes, BCH codes, or LDPC codes that can assure the minimum distance. These erasure correction codes can be utilized for wireless communications, cable communications using an optical fiber, a copper wire, or the like. Alternatively, when the encoded packets are distributedly stored on a disk, and some disk is damaged, it is also possible to reproduce it by the erasure correction codes. In this case, to a system that distributedly stores encoded packets in which data is erasure correction encoded into a packet unit (data packet) on different disks, it has a function, when the storage disk breaks partially, to reproduce only the encoded packets on the broken disk by collecting only the necessary minimum encoded packets separately stored. Additionally, when the data packets are partially updated, only the related minimum encoded packets are corrected.
An encoding decoding-method using algebraic codes, such as BCH codes, will be described in the present embodiment. Note that while subsequent descriptions will be described per packet, as for the processing, encoding decoding processing shall be performed in parallel per the same bit position within the packet.
First, as for codes generally defined by the check matrix, a treating method when the codes are used as the erasure correction codes will be shown. A binary check matrix HERA with M-row N-columns of arbitrary linear codes is converted into a check matrix for erasure correction according to following procedures.
(1) HERA is defined as following Equation (33) using an M×(N−M) matrix A, and an M×M matrix B.
HERA=[A|B]
B≠0 (33)
(2) Conversion shown in following Equation (34) is performed using an inverse matrix B−1 of B to thereby generate following Equation (35). Incidentally, I is a unit matrix of M×M.
HERA′=[B−1A|B−1B]=[B−1A|I] (34)
HERAL′=[B−1A] (35)
(3) A parity packet p=(p1 p2 . . . pM) is created as following Equation (36) to an information packet u=(u1 u2 . . . uN−M) using HERAL′.
pT=HERA′×uT (36)
(4) As a transmission packet, v=(u|p) is sent as shown in
In the flow so far, a difference from the conventional method is a procedure that the information sequence u is not transmitted, but only the parity is transmitted in LT codes or Raptor codes, or the system used in the error correction encoding unit of “Japanese Patent Application 2005-101134”.
When representing linear block codes, such as BCH codes, they are called (N, k) codes using a code length N and an information length k. Now, a check matrix of binary (7, 4) codes of the BCH codes is shown in following Equation (37) as an example.
From the procedure (1), following Equation (38) and following Equation (39) are obtained.
Incidentally, since B=I, HBCH′=[B−1A|B−1B]=[B−1A|I] is already completed. Generally, it is required a work to perform the operation to thereby generate the unit matrix I.
Next, HBCHL′=[B−1A] is determined. Since B=I, B−1=I is obtained, resulting in HBCHL′=[B−1A]=[A]. Similarly, if GBCH=[E|D]=[E−1E|E−1D]=[I|E−1D] from the generator matrix GBCH, [E−1D]T=[B−1A]=HBCH is obtained, so that it may be determined from the generator matrix or a generating polynomial to define its generator matrix.
Meanwhile, an encoded packet is generated as c=u×GBCHT by using the generator matrix GBCH as it is, and a lower triangular matrix is included in HBCH′=[B−1A|B−1B]=[B−1A|I] corresponding to an encoded packet ci that is successfully received, and thus the code v=(u|p) is determined by backward substitution.
For example, when a product-sum operation is performed to u=(u1 u2 u3 u4)=(0 1 0 1) on GF (2) using the first row of A by the backward substitution, “1×0+1×1+1×0+0×0=1” is obtained, and to satisfy HBCH′×vT=0, p1 of a parity packet p=(p1 p2 p3) becomes p1=1 using the first row of I from “1+p1×1=0”. The second row and the third row also become p2=0 and p3=0 using similar calculations.
Meanwhile, p can also be determined by pT=HERAL′×uT, those codes match with each other. Additionally, if success in receiving packet is “u1, u2, p2, p3=0, 1, 0, 0” upon decoding, p2, p3 of following Equation (40) correspond to the second row and the third row, respectively, and thus a matrix for calculation shown in following Equation (41) is prepared using those rows.
This matrix is converted into a matrix described in following Equation (42) by applying the Gaussian elimination or the like thereto.
It is possible to solve “u3, u4=0, 1” by the backward substitution using “u1, u2, p2, p3=0, 1, 0, 0” from this matrix.
Meanwhile, an encoded packet is generated as c=u×GBCHT using the generator matrix GBCH as it is, and rows of GBCHT corresponding to the encoded packet ci that is successfully received are collected, and thereafter, the Gaussian elimination or the like may be applied thereto. A portion of I of following Equation (43) is removed from a calculation object also in this case, and only the E−1D submatrix may be calculated in a manner similar to that described above.
According to the conventional system, since the information packet is not transmitted, a check matrix with 7-row×4-column is prepared to be applied to a communication channel with an equivalent error rate, and the Gaussian elimination for 4 rows must be performed if 4 packets among them are successfully received, resulting in a large calculation amount. Additionally, when a plurality of disks that store the packet do not break at one time like a distributed disc system, it can be self-reproduced only from a part of the encoded packets according to the procedure (5) without using all the encoded packets. For example, if it turns out that the parity packet p1 is broken, it can be reproduced by p1=u1+u2+u3 using only the information packet “u1, u2, u3=0, 1, 0” corresponding to the column where 1 is set in the first row of Equation (40). Additionally, equivalent operations may be performed using the original parity check matrix shown in Equation (37).
For example, using the packets corresponding to the columns where 1 is set other than its own column in the row for the rows where 1 is set in the column corresponding to the erasure (broken) packet desired to be reproduced, when the packets other than its own packet corresponding to them are all normal, its own packet can be self-reproduced from the packet of the row weight−1. Hence, any methods may be used.
Further, also in the case of applications as the distributed disc system, when the contents in which a certain information packet is stored are updated, it is needed to encode all the disks again to be then distributed, conventionally. Since it is inefficient, a procedure of updating only the parity packet relevant to the updated data packet will be employed. For example, when u1 is desired to be updated to Equation (40), what is necessary is to update only p1, p3 using p1=u1+u2+u3 and p3=u1+u2+u4. Although it seems that the calculation amount is not reduced so much in the example, the effect of the calculation amount is increased since the actual check matrix is further nondense. Equivalent operations may be performed using the original parity check matrix shown in Equation (37).
For example, the related parity is updated from the packet of row weight−1 using the packets corresponding to the columns where 1 is set other than its own column in the rows for the rows where 1 is set in the column corresponding to the information packet desired to be updated. Hence, any methods may be used.
All the operations can perform the erasure correction encoding decode using similar operations, if they are general linear codes (Hamming codes, cyclic codes, BCH codes, LDPC codes, convolutional codes, turbo codes, or the like).
Meanwhile, (n+1, k) linear codes formed by increasing a check symbol C of (n, k) linear codes C by 1 are called expansion codes of C. Particularly, for the binary (n, k) linear codes whose minimum distance is an odd number, the minimum distance can be increased by 1 by adding the check bit by 1 bit. For the purpose, what is necessary is just to add the check bit to each code so that weight may be even numbers. Namely, a check bit pA to satisfy following Equation (44) is added to a code (w1, w2, . . . , wn), and codes C′ to be a code (w1, w2, . . . , wn, pA) is formed. The check bit pA like this is called all parity check bit.
pA=w1+w2+ . . . +wn (44)
The codes C′ formed as described above are (n+1, k) linear codes in which, if a check matrix of the original codes is H, (n−k+1)×n matrix H′ obtained by adding a column of 0 to all the components of H and by adding one row of 1 to all the components is a check matrix as shown in following Equation (45). The expansion codes in which the minimum distance is d+1 may be used for the erasure correction codes while using such codes.
Moreover, even when one added row has arbitrary elements in which 0 or 1 are mixedly present, it is possible to compose the codes after assuring the minimum distance d, and thus this configuration may be used.
(Application of Method for Expanding Minimum Distance)
Additionally, upon generating the generator matrix GBCH, although a generating polynomial of the BCH codes, for example, in the case of the (7, 4) codes, g(x)=x3+x+1 is used, a generator matrix G′BCH is generated using g(x)′(=x3+x+1)(x+1) that is obtained by multiplying this g(x)=x3+x+1 by x+1, an encoded packet is generated as c=u×G′BCHT, rows of G′BCHT corresponding to the encoded packet ci that is successfully received are collected, and thereafter, the Gaussian elimination or the like may be applied thereto. A portion of I of G′BCHT=[I/E−1D is removed from a calculation object also in this case, and only the E−1D submatrix may be calculated in a manner similar to that described above. The codes using this G′BCH become the (n+1, k) codes of the minimum distance d+1 to GBCH of the (n, k) codes of the minimum distance d.
(Method of Preparation for Code Length)
If H″, in which an arbitrary matrix E of n−k×z is connected with the check matrix H of the (n, k) codes with the minimum distance d, is connected as H″=[H|E], the (n+z, k) codes with the minimum distance d can be composed. The codes corresponding to actual parameters are composed using these techniques to thereby be used for the erasure correction.
(Effect of the System)
According to the present invention, the code v=(u|p) including both the information sequence and the parity sequence can be transmitted using HERAL′, and decoding can be executed if a total number of information packets u′ that are successfully received and parity packets p′ that are successfully received is collected by about “the number of packets of u×105%”. Namely, it is possible to decode HERAL′, in which the information packet length k=N−M is a column size and the parity packet length M is a row size shown in
According to the conventional system, the information packet is not transmitted, so that when it applies to a communication channel with an equivalent error rate, the check matrix with 7-row×4-column is prepared as the check matrix, and the Gaussian elimination for 4 rows must be performed if 4 packets among them are successfully received in the embodiment, resulting in a large calculation amount. The calculation amount can be reduced compared with this conventional example.
Additionally, when the BCH codes are used, “encoded packet N: information packet k: correctable packet d−1 (d: minimum distance)” can be decided as follows.
Encoded packet N: Information packet k: Correctable packet d−1 (d: minimum distance) or the like.
Consequently, there is a merit that can assure the number of erasable packets d−1. Namely, it is possible to certainly perform the correction even when d−1 packets are erased. Moreover, when 1-bit expansion codes of the BCH codes are used,
Encoded packet N: Information packet k: Correctable packet d−1 (d: minimum distance) or the like.
Consequently, there is a merit that the number of erasable packets d−1 can be assured. Namely, it is possible to certainly perform the correction even when d−1 packets are erased. Similar effects are applicable to all of them if they are the codes in which the minimum distance d is assured.
Meanwhile, when neither the code length nor the information length matches with the requirement as described above, there is a method of padding an information part with known data.
For example, to set an information length k′ to about 100 at a code length n′=150, the information part is padded with known 0s of 105 (pcs) or the like using
255:207:12 As a result,
150:102:12
is obtained. Since it is only padded with the known value, the number of packets that can be corrected does not change.
The cyclic codes, such as the BCH codes, can also be used for a method of showing a similar effect after shortened the codes. In this case, in order not to lose features of the cyclic codes, it is common to shorten from the left end of the encoded packets except for continuous information packets. In this case, a check matrix corresponding to the information packet excluding the check matrix is deleted.
Additionally, when a method of the expansion codes is used for this,
256:207:13
in which the code length is +1, and the correctable number of packets is +1 can be formed. In this case, when the information part is padded with the known 0s of 106 (pcs) or the like,
150:101:13
can be formed.
Further, in the case of the cyclic codes such as the BCH codes, since it is correctable even when N-K packets that all continue are erased, there is a merit that error correction capability against burst errors can also be assured. Additionally, reproduction and update can be performed using a part of packets also for self-reproduction or updating, so that there is a merit that it becomes unnecessary to form the encoded packets using all the information packets as before. This does a similar effect also by the 1-bit expansion codes. When it is limited to a single burst error, it is correctable even when N-K packets are erased also in shortening cyclic codes.
Subsequently, an efficient erasure correction encoding decoding method using the LDPC codes according to the present invention will be shown.
(First Step)
A row of HM corresponding to the first row of HT where 1 is set in a column at the TD left end and the second row of HM are added. Next, addition is similarly continued to a column where 1 is set in the second one. Submatrices of TD are converted into unit matrices by repeating this operation (conversion from
(Second Step)
Next, HT that has become “Dual Diagonal” is processed in a manner similar to that of the first step (conversion from
This conversion method is applicable to all of them using a part of or all of the steps as far as the LDGM structure in which the row weight of the lower triangular matrix is 2. Meanwhile, even when the row weight is 2 or more, it is applicable by repeating similar operations by the number of times of weight.
Additionally, an encoded packet is generated as c=u×GBCHT by using the generator matrix GM=[I|A] as it is, rows of GBCHT corresponding to the encoded packet ci that is successfully received are collected, and thereafter, the Gaussian elimination or the like may be applied thereto. A portion of I of GBCHT=[I/A] is removed from a calculation object also in this case, and only the submatrix A may be calculated in a manner similar to that described above.
Hereinafter, the RTP protocol relevant to FEC will be explained using
For example, when the BCH codes “n:k:d−1=63:36:10” of the fifth embodiment is used, “5 RTP packets (each seven TS packets)+1 TS packet” (total 36 TS packets) are composed of the information packets “6 TS packets+3 RTP packets (each seven TS packets)” (total 27 TS packets). In this case, correction can be made until the erasure of random 10 TS packets or continuous 27 TS packets.
For example, when they are reduced by 1 packet using the expansion codes “n:k:d−1=64:36:11” of the BCH codes of the fifth embodiment, “n:k:d−1=63:35:11” is obtained. In this case, it can be composed of the information packet of 5 RTP packets (total 35 packets), and the parity packet of 4 RTP packets (total 28 packets). Additionally, correction can be made until the erasure of random 11 TS packets.
The parameter of other BCH codes, the LDPC codes, and all other linear codes can be applied to this erasure correction code. In addition to that, it is applicable to all the applications that perform the erasure correction per packet and disk.
Subsequently, a system to which the encoding processing/decoding processing according to the first to seventh embodiments is applied will be is explained. For example, the LDPC encoding processing and decoding processing according to the present invention can apply to whole telecommunication equipment, such as mobile communications (terminal, base station), wireless LAN, optical communications, satellite communications, a quantum encryption device, and specifically, the LDPC encoder 1 (corresponding to the first to fourth embodiments) and the LDPC decoder 5, which are shown in
Moreover, in the mobile terminal 200 and the base station 300 shown in
When data is transmitted from the mobile terminal 200 in the mobile communications system composed as described above, first, information data, such as voice, mail, and WEB, is packetized as data, for example, to then encode it by the erasure-correction LDPC encoder 201. Next, in the physical layer, the physical-layer LDPC encoder 202 for fading communication channel encodes this packet data unit. This encoded data is sent out to a radio communication channel via the modulator 203 and the antenna 207.
Meanwhile, in the base station 300, received signals including errors generated in the radio communication channel are received via the antenna 307 and the demodulator 303, and received data after demodulation is corrected by the physical-layer LDPC decoder 302 for the physical layer. In the physical layer, whether the error correction is successfully performed per packet is then notified to the upper layer. In the upper layer, the erasure-correction LDPC decoder 301 reproduces the information packet using only the packets whose error correction is succeeded. Subsequently, this information packet is transmitted to a communication destination via the network. Note that also when the mobile terminal 200 receives various data from the network, the base station 300 transmits the encoded data to the mobile terminal 200, and the mobile terminal 200 reproduces the various data, by the processing similar to that described above. When the base station 300 transmits the encoded data to the mobile terminal 200, first, information data, such as voice, mail, and WEB, is packetized as data, for example, to then encode it by the erasure-correction LDPC encoder 306. Next, the physical-layer LDPC encoder 305 for fading communication channel encodes this packet data unit in the physical layer. This encoded data is sent out to the radio communication channel via the modulator 304 and the antenna 307. Meanwhile, in the mobile terminal 200, received signals including errors generated in the radio communication channel are received via the antenna 207 and the demodulator 204, the received data after demodulation is corrected by the physical layer LDPC decoder 205. In the physical layer, whether the error correction is successfully performed per packet is then notified to the upper layer. In the upper layer, the erasure-correction LDPC decoder 206 reproduces the information packet using only the packets whose error correction is succeeded.
As described above, the check-matrix generating method and encoding method according to the present invention are useful as the encoding technology in digital communications, and are particularly suitable for the communication apparatuses that employ the LDPC codes as the encoding system.
Number | Date | Country | Kind |
---|---|---|---|
2005-367077 | Dec 2005 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2006/324869 | 12/13/2006 | WO | 00 | 6/13/2008 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2007/072721 | 6/28/2007 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
7620873 | Kanaoka et al. | Nov 2009 | B2 |
8024641 | Livshitz et al. | Sep 2011 | B2 |
Number | Date | Country |
---|---|---|
1 924 001 | May 2008 | EP |
2005 312061 | Nov 2005 | JP |
2004 107640 | Dec 2004 | WO |
2005 107081 | Nov 2005 | WO |
2007 018066 | Feb 2007 | WO |
Number | Date | Country | |
---|---|---|---|
20090164864 A1 | Jun 2009 | US |