Mappings between codewords of two distinct (N,K) Reed-Solomon codes over GF (2J)

Information

  • Patent Grant
  • 5377207
  • Patent Number
    5,377,207
  • Date Filed
    Thursday, September 3, 1992
    32 years ago
  • Date Issued
    Tuesday, December 27, 1994
    30 years ago
Abstract
A process for realizing mappings between codewords of two distinct (N,K) Reed-Solomon codes over GF(2.sup.J) having selected two independent parameters: J, specifying the number of bits per symbol; and E, the symbol error correction capability of the code, wherein said independent parameters J and E yield the following: N=2.sup.J -1, total number of symbols per codeword; 2E, the number of symbols assigned a role of check symbols; and K=N-2E, the number of code symbols representing information, all within a codeword of an (N,K) RS code over GF(2.sup.J), and having selected said parameters for encoding, the implementation of a decoder are governed by: 2.sup.J field elements defined by a degree J primitive polynomial over GF(2) denoted by F(x); a code generator polynomial of degree 2E containing 2E consecutive roots of a primitive element defined by F(x); and, in a Berlekamp RS code, the basis in which the RS information and check symbols are represented.The process includes separate transformation steps for symbol-by-symbol conversion for a first RS code to ultimately a second conventional RS code capable of being corrected by a conventional RS decoder, followed by a reverse sequence of the inverse of the first set of steps to arrive at codewords having corrected information symbols, at which time check symbols of the RS code may be discarded.
Description

ORIGIN OF INVENTION
The invention described herein was made in the performance of work under a NASA contract, and is subject to the provisions of Public Law 96-517 (35 USC 202) in which the contractor has elected not to retain title.
TECHNICAL FIELD
This invention relates to error-correcting codes, and more particularly to mappings between two distinct (N,K) Reed-Solomon (RS) codes over GF(2.sup.J).
BACKGROUND ART
An RS codeword is composed of N J-bit symbols of which K represents information and the remaining N-K symbols represent check symbols. Each check symbol is a linear combination of a distant subset of information symbols. RS codes have the following parameters:
______________________________________J number of bits comprising each RS symbolN = 2.sup.J - 1 number of symbols per RS codewordE symbol correction capability per RS codeword2E number of checks symbolsK = N - 2E number of symbols representing informationI the depth of symbol interleaving______________________________________
Parameters J, E and I are independent. Each of the 2E check symbols (computed by an RS encoder) is a linear combination of a distinct subset of the K symbols representing information. Hence (N,K) RS codes are linear. Furthermore, every cyclic permutation of the symbols of an RS codeword results in a codeword.
The class of cyclic codes is a proper subset of the class of linear codes. Cyclic codes have a well defined mathematical structure. Encoders and decoders of cyclic codes are implementable by means of feedback shift registers (FSRs). However, RS codes are nonbinary and each stage must be capable of assuming each of the 2.sup.J state-values corresponding to representations of J-bit symbols. Consequently, solid-state random-access memories (RAMs) are commonly used to serve as nonbinary FSR stages in RS encoders and decoders.
Every pair of distinct codewords belonging to a (N,K) RS code differs in at least 2E+1 corresponding symbols. The code thus has a minimum Hamming distance of 2E+1 and is E symbol error-correcting. A symbol is in error if one or more bits comprising the symbol are in error. A received word with any combination of E or fewer symbols in error will be correctly decoded. Whereas a received word containing more than E erroneous symbols will be incorrectly decoded with a probability of less than 1 chance in E factorial (i.e., 1/E!). Such a received word will be declared to be uncorrectable during the decoding process with probability 1-(1/E!).
Erroneous symbols (of a received word) confined to a region of E or fewer contiguous symbols in bit serial form are correctable. In terms of bits, every single burst-error (contained within a received word) of length J(E-1)+1 bits or less affects at most E symbols and thus is correctable.
A concatenated (NI,KI) RS code resulting from symbol interleaving to a depth of I is comprised of KI consecutive information symbols over which 2EI check symbols are computed and appended such that every I.sup.th symbol, starting with symbol 1,2, . . . or I, belongs to the same (N,K) RS codeword. If a received word of a (NI,KI) code contains any single burst-error of length J(EI-1)+1 bits, the number of erroneous symbols belonging to the same N-symbol word will not exceed E. Upon symbol deinterleaving, each of the I, N-symbol words will be correctly decoded. Thus symbol interleaving to a depth of I increases the length (in bits) of correctable burst-errors by over I-fold.
It is the burst-error correction capability of RS codes that is exploited in concatenated coding where a convolution (probabilistic) code is the inner code and an RS (algebraic) code serves as the outer code. A large number of bit-errors within a burst results in a relatively few number of symbol errors. Convolutional codes outperform algebraic codes over a Gaussian channel. Burst-errors are encountered in a low signal-to-noise ratio environment. Also, in such an environment, a Viterbi decoder (of a convolutional code) can lose bit or symbol synchronization. This results in the generation of bursts by the Viterbi decoder. Until synchronization is re-established, burst-error protection is provided by the outer RS code. Expectation of burst-lengths among other factors (such as information rate K/N, a measure of efficiency, and transfer frame length in packet telemetry) influence the choice of magnitudes of parameters E and I. The effect of an infinite symbol interleaving depth can be achieved with a small value of I.
Mathematical Characterization of RS Symbols
A codeword of a (N,K) RS code is represented by a vector of N symbols (i.e., components)
C.sub.N-1 C.sub.N-2. . . C.sub.2E C.sub.2E-1. . . C.sub.0 ( 1)
where C.sub.i is taken from a finite field 2.sup.J elements. The finite field is known as a Galois Field of order 2.sup.J or simply GF(2.sup.J). Each element in GF(2.sup.J) is a distinct root of
x.sup.2.spsp.J -x=x(x.sup.2.spsp.J.sbsp.-1 -1)=0 (2)
The element O satisfies x=0 and each of the nonzero elements satisfies
x.sup.2.spsp.J.sbsp.-1 -1=0 (3)
The nonzero roots of unity in Equation (3) form a "multiplicative group" which is cyclic and of order N=2.sup.J -1. The "multiplicative" order of a root, .alpha., of Equation (3) is the least positive integer m for which
.alpha..sup.m =1 where 2.sup.J -1.tbd.0 mod m (4)
Note that m.vertline.2.sup.J -1 where u.vertline.v denotes u divides v. A root of maximum order (i.e., for which m=2.sup.J -1) is termed "primitive" and is a "generator" of the cyclic multiplicative group in GF(2.sup.J).
An irreducible (i.e., unfactorable) polynomial over a finite field is analogous to a prime integer. A fundamental property of Galois fields is that every irreducible polynomial F(x) of degree r over GF(2) where r.vertline.J (excluding x the only irreducible polynomial over GF(2) without a nonzero constant term) is a factor of
x.sup.2.spsp.J.sbsp.-1 -1
Though F(x) is unfactorable over the binary field (i.e., GF(2)), it contains r distinct roots in GF(2.sup.J). GF(2.sup.J) is a finite field extension of GF(2), whereas GF(2) is a proper subfield of GF(2.sup.J). GF(2.sup.s) is a proper subfield of GF(2.sup.J) if and only if s.vertline.J and s<J.
EXAMPLE 1
Given the irreducible polynomial of degree r=J=4
F(x)=x.sup.4 +x.sup.3 +1 over GF(2)
Let .alpha., among the 15 nonzero elements in GF(2.sup.4), denote a root of F(x). Then
F(x)=.alpha..sup.4 +.alpha..sup.3 +1=0 and .alpha..sup.4 =.alpha..sup.3 +1
where "+" denotes "sum modulo 2" (i.e., the Exclusive-OR operation). Repeated multiplicative operations on .alpha. gives
.alpha., .alpha..sup.2, .alpha..sup.3, .alpha..sup.4 +.alpha..sup.3 +1, .alpha..sup.5 =.alpha..sup.4 +.alpha.=.alpha..sup.3 +.alpha.+1, . . . and .alpha..sup.15 =1=.alpha..sup.0
Thus .alpha., a root of F(x), is primitive and F(x) is a primitive polynomial over GF(2). The elements of GF(2.sup.4) are expressible as powers of .alpha., each of which is equal to one of 16 distinct polynomials in .alpha. of degree less than 4 over GF(2) as follows:
.alpha..sup.i =b.sub.3 .alpha..sup.3 +b.sub.2 .alpha..sup.2 +b.sub.1 .alpha.+b.sub.0 where b.sub.j .epsilon. GF(2)
The element O is the constant zero polynomial denoted by
.alpha.*=0..alpha..sup.3 +0..alpha..sup.2 +0..alpha.+0
The elements of GF(2.sup.4) generated by .alpha. with .alpha.* adjoined appear in Table I.
TABLE I______________________________________GF(2.sup.4) Generated by .alpha., a Root of F(x) =x.sup.4 + x.sup.3 + 1 over GF(2), with .alpha.*Adjoined.i of .alpha..sup.i b.sub.3 b.sub.2 b.sub.1 b.sub.0______________________________________* 0 0 0 00 0 0 0 11 0 0 1 02 0 1 0 03 1 0 0 04 1 0 0 15 1 0 1 16 1 1 1 17 0 1 1 18 1 1 1 09 0 1 0 110 1 0 1 011 1 1 0 112 0 0 1 113 0 1 1 014 1 1 0 0______________________________________
The binary operation of "addition" is termwise sum modulo 2 (or equivalently, vector addition over GF[2]).
.alpha..sup.5 +.alpha..sup.13 =[1011]+[0111]=[1101]=.alpha..sup.11
The binary operation of "multiplication" is polynomial multiplication subject to the rules of modulo 2 arithmetic.
(b.sub.3 .alpha..sup.3 +b.sub.2 .alpha..sup.2 +b.sub.1 .alpha.+b.sub.0) (d.sub.3 .alpha..sup.3 +d.sub.2 .alpha..sup.2 +d.sub.1 .alpha.+d.sub.0),
with the result reduced modulo .alpha..sup.4 +.alpha..sup.3 +1. Since each element is expressible as a power of .alpha., "multiplication" is simplified with
(.alpha..sup.i) (.alpha..sup.j)=.alpha..sup.i+j mod 15
The logarithm to the base .alpha. for each field element appears in Table I. Thus
(.alpha..sup.14) (.alpha..sup.6)=.alpha..sup.5 =[1011]
Note that a more descriptive but less convenient representation of the O element is .alpha..sup.-.infin..
.alpha.*.alpha..sup.j =.alpha.* and .alpha.*+.alpha..sup.j =.alpha..sup.j for all j
Clearly commutativity holds for all field elements under both binary operations (a property of fields).
Consider the operation .sigma. which squares each of the roots of ##EQU1## any polynomial of degree r over GF(2). Solomon W. Golomb, "Theory of Transformation Groups of Polynomials over GF(2) with Applications to Linear Shift Register Sequences," American Elsevier Publishing Company, Inc., 1968, pp. 87-109. Since ##EQU2## The substitution t.sup.2 =x is appropriately employed in proving that f(x) over GF(2) is invariant under the root-squaring operation .sigma.. The operation .sigma. on f(x) which leaves f(x) unchanged is termed an automorphism. An operation on a root of f(x) is an automorphism if and only if it is an integer power of .sigma., the root-squaring operation. If, in particular, f(x) of degree r is irreducible over GF(2), then f(x) has the following r distinct automorphisms:
1, .alpha., .alpha..sup.2, . . . , .alpha..sup.r-1
with respect to GF(2.sup.r). Consequently, f(x) has r distinct roots, namely,
.alpha., .alpha..sup.2, .alpha..sup.2.spsp.2, . . . , .alpha..sup.2.spsp.r-1
Since .sigma..sup.r maps .alpha. into .alpha..sup.2.spsp.r and .alpha..sup.2.spsp.r =.alpha. (from .alpha..sup.2.spsp.r.sbsp.-1 =1), .sigma..sup.r is the identity operation.
Consider the element .beta. among the 2.sup.r -1 nonzero elements in GF(2.sup.r). If .beta. has order m, then .beta..sup.j has order m/(m,j), where (m,j) denotes the Greatest Common Divisor (gcd) of m and j. Clearly, m.vertline.(2.sup.r -1) and (m/(m,j)).vertline.(2.sup.r -1). Recall that a primitive polynomial of degree r has .alpha., a primitive root of unity, as a root. Each of the r roots has order 2.sup.r -1 and is thus primitive since (2.sup.r -1,2.sup.i)=1 for all i.
The set of integers
{i}={1, 2, 2.sup.2, . . . , 2.sup.r-1 }
taken from the multiplicative group of integers modulo 2.sup.r -1 form a subgroup. The corresponding set
{.alpha..sup.i }={.alpha., .alpha..sup.2, .alpha..sup.2.spsp.2, . . . , .alpha..sup.2.spsp.r-1 }
are the r roots of a primitive r.sup.th degree polynomial over GF(2). The "generalized cosets"
{v, 2v, 2.sup.2 v, . . . , (2.sup.r-1)v}
are nonoverlapping sets which together with the subgroup {i}, the special coset where v=1, comprise the multiplicative group of integers modulo 2.sup.r -1. A one-to-one correspondence exists between the elements of the group and the 2.sup.r -1 roots of unity contained in GF(2.sup.r). If (2.sup.r -1, v)=1, then {iv} is a coset as defined in group theory. The elements of such a coset correspond to r (2.sup.r -1).sup.st primitive roots whose minimal polynomial is an r.sup.th degree primitive polynomial over GF(2). The polynomial of least degree that contains a given set of distinct roots (corresponding to a coset) is irreducible and termed a minimal polynomial.
The number of positive integers no greater than n (a positive integer) that are relatively prime to n is the number-theoretic function .phi.(n) known as Euler's phi function. Two integers n and i are termed relatively prime if (n, i)=1. Given .alpha., a primitive root of unity in GF(2.sup.r), then .alpha..sup.j is primitive if and only if (2.sup.r -1, j)=1. There are a total of .phi.(2.sup.r -1) primitive roots falling into (.phi.(2.sup.r -1))/r groupings corresponding to cosets. The r roots in each grouping are roots of a distinct primitive polynomial and thus there are (.phi.(2.sup.r -1))/r primitive polynomials of degree r over GF(2).
An "improper coset" results for values of v where (2.sup.r -1).noteq.1. If the coset contains r distinct elements, the elements correspond to r (2.sup.r -1).sup.st nonprimitive roots of unity whose minimal polynomial is an irreducible nonprimitive r.sup.th degree polynomial over GF(2). Whereas the elements of a coset containing s<r distinct elements (where s necessarily divides r) correspond to s (2.sup.s -1).sup.st roots of unity whose minimal polynomial is an irreducible polynomial of degree s over GF(2).
Complete factorization of x.sup.2.spsp.4.sup.-1 for r = J = 4 appears in Table II.
TABLE II______________________________________Irreducible Factors of x.sup.2.spsp.4.sup.-1 - 1 for r = J = 4 overGF(2). order ofCosets Roots Polynomial Roots______________________________________0 .alpha..sup.0 x + 1 11 2 4 .alpha., .alpha..sup.2, .alpha..sup.4, .alpha..sup.8 x.sup.4 + x.sup.3 + 1 153 6 12 .alpha..sup.3, .alpha..sup.6, .alpha..sup.12, .alpha..sup.9 x.sup.4 + x.sup.3 + x.sup.2 + x + 1 55 10 .alpha..sup.5, .alpha..sup.10, x.sup.2 + x + 1 37 14 13 11 .alpha..sup.7, .alpha..sup.14, .alpha..sup.13, .alpha..sup.11 x.sup.4 + x + 1 15______________________________________
A degree 4 primitive polynomial is required to derive Tables I and II. Every irreducible polynomial over GF(2) of degree r.ltoreq.16 can be determined from Tables in Appendix C of W. W. Peterson and Error-Correcting Codes, MIT Press, Cambridge, Mass., 1961. There are two primitive polynomials over GF(2) (which may be verified by the enumeration given by the number-theoretic function involving Euler's phi function). As shown in Table II, these are
F.sub.B (x)=x.sup.4 +x.sup.3 +1 and F.sub.G (x)=x.sup.4 +x+1
The nonzero elements in Table I were generated by .alpha., a root of F.sub.B (x), and used in determining the irreducible polynomial factors in Table II. Irreducibility is a necessary but not sufficient condition for a polynomial over GF(2) to be primitive. Note that the roots of F.sub.G (x) are reciprocals of the respective roots of F.sub.B (x). That is
.alpha..sup.-1 =.alpha..sup.15-1 =.alpha..sup.14,
.alpha..sup.-2 =.alpha..sup.13,
.alpha..sup.-4 =.alpha..sup.11, and
.alpha..sup.-8 =.alpha..sup.7,
and F.sub.B (x) and F.sub.G (x) are reciprocal polynomials over GF(2) where
x.sup.4 F.sub.B (1/x)=F.sub.G (x)
The reciprocal of a primitive polynomial is a primitive polynomial.
The (nonprimitive) irreducible polynomial with roots .alpha..sup.3, .alpha..sup.6, .alpha..sup.12 and .alpha..sup.9 is determined by using entries in Table I and appropriate field operations to expand
(x-.alpha..sup.3) (x-.alpha..sup.6) (x-.alpha..sup.12) (x-.alpha..sup.9)
or by determining the b.sub.i 's .epsilon. GF(2) which satisfy
.alpha..sup.12 +b.sub.3 .alpha..sup.9 +b.sub.2 .alpha..sup.6 +b.sub.1 .alpha..sup.3 +1=0
The coefficients are linearly dependent vectors (i.e., polynomial coefficient strings). The latter method is easily programmable for computing the minimal polynomial (primitive or irreducible but nonprimitive) of degree r over GF(2) containing any given set of r distinct roots.
The elements .alpha.* , .alpha..sup.0, .alpha..sup.5 and .alpha..sup.10 are roots of
x.sup.4 -x=x(x.sup.3 -1)=x(x+1) (x.sup.2 +x+1) over GF(2)
and members of the subfield GF(2.sup.2)<GF(2.sup.4). Whereas the elements .alpha.* and .alpha..sup.0 are roots of
x.sup.2 -x=x(x+1) over GF(2)
and members of the subfield GF(2)<GF(2.sup.2)<GF(2.sup.4).
In Table I, GF(2.sup.4) is defined by the primitive polynomial
F.sub.B (x)=x.sup.4 +x.sup.3 +1 (5)
The 15 nonzero elements can also be generated by .beta., a root of the primitive polynomial
F.sub.G (x)=x.sup.4 +x+1 (6)
and by adjoining .beta.* another field of order 2.sup.4 results. All finite fields of the same order, however, are isomorphic. Two fields with different representations are said to be isomorphic if there is a one-to-one onto mapping between the two which preserves the operations of addition and multiplication. The one-to-one mapping of the field elements defined by F.sub.B (x) in Equation (5) onto the field elements defined by F.sub.G (x) in Equation (6) appears in Table III below.
TABLE III______________________________________A One-to-One Mapping of Elements of GF(2.sup.4)Defined by F.sub.B (x) = x.sup.4 + x.sup.3 + 1 Onto Elementsof GF(2.sup.4) Defined by F.sub.G (x) = x.sup.4 + x + 1i of 7i mod 15a.sup.i b.sub.3 b.sub.2 b.sub.1 b.sub.0 of .beta..sup.7i c.sub.3 c.sub.2 c.sub.1 c.sub.0______________________________________* 0 0 0 0 * 0 0 0 00 0 0 0 1 .revreaction. 0 0 0 0 11 0 0 1 0 .fwdarw. 7 1 0 1 12 0 1 0 0 .fwdarw. 14 1 0 0 13 1 0 0 0 .fwdarw. 6 1 1 0 04 1 0 0 1 13 1 1 0 15 1 0 1 1 5 0 1 1 06 1 1 1 1 12 1 1 1 17 0 1 1 1 4 0 0 1 18 1 1 1 0 11 1 1 1 09 0 1 0 1 .rarw. 3 1 0 0 010 1 0 1 0 10 0 1 1 111 1 1 0 1 .rarw. 2 0 1 0 012 0 0 1 1 9 1 0 1 013 0 1 1 0 .rarw. 1 0 0 1 014 1 1 0 0 8 0 1 0 1______________________________________
The mappings .alpha..sup.i .fwdarw..beta..sup.7i and .beta..sup.7i .fwdarw..alpha..sup.i can be done by table look-up. They can also be realized by linear transformations. Consider the nonsingular matrix ##EQU3## Refer to Table III. Each row vector is defined by F.sub.G (x) (having .beta. as a root) and corresponds to a distinct unit vector defined by F.sub.B (x) (having .alpha. as a root). The four unit vectors are a natural basis for elements [b.sub.3 b.sub.2 b.sub.1 b.sub.0 ], coefficient strings of polynomials in .alpha.. Thus
[b.sub.3 b.sub.2 b.sub.1 b.sub.0 ]M.sub..alpha..beta. =[c.sub.3 c.sub.2 c.sub.1 c.sub.0 ]
is a linear transformation that maps .alpha..sup.i .fwdarw..beta..sup.7i. Similarly ##EQU4## is a linear transformation that maps .beta..sup.7i .fwdarw..alpha..sup.i. Clearly, M.sub..alpha..beta..sup.-1 =M.sub..beta..alpha..
The roots .alpha. and .beta..sup.7 both have minimal polynomial
x.sup.4 +x.sup.3 +1
and .alpha..sup.i .revreaction..beta..sup.7i is one isomorphism between the two representations of GF(2.sup.4). Note that corresponding elements have the same multiplicative order. (Another isomorphism is .alpha..sup.7i .revreaction..beta..sup.i where .alpha..sup.7 and .beta. both have minimal polynomial x.sup.4 +x+1). Example 2 illustrates preservation of field operations.
EXAMPLE 2
Refer to entries in Table II.
__________________________________________________________________________ 1 0 0 1 - .alpha..sup.4 .revreaction. .beta..sup.13 = 1 1 0 1 + 0 1 0 1 = .alpha..sup.9 .revreaction. .beta..sup.3 = 1 0 0 0 = 1 1 0 0 = .alpha..sup.14 .revreaction. .beta..sup.8 = 0 1 0 1and .alpha..sup.10 = 1 0 1 0 .revreaction. 0 1 1 1 = .beta..sup.10 .times. .alpha..sup.8 = 1 1 1 0 .revreaction. 1 1 1 0 = .beta..sup.11 = .alpha..sup.3 = 1 0 0 0 .revreaction. 1 1 0 0 = .beta..sup.6__________________________________________________________________________
Berlekemp's Representation of RS Symbols Using the Concept of a Trace
Consider the field elements
.alpha..sup.i =b.sub.3 .alpha..sup.3 +b.sub.2 .alpha..sup.2 +b.sub.1 .alpha.+b.sub.0 for i=*, 0, . . . , 14 (7)
in GF(2.sub.4) defined by F.sub.B (x) in Equation (5). See Tables II and III. The trace of element .alpha. is defined as ##EQU5## The trace of roots of unity corresponding to members of the same coset in Table II are identical. For example, ##EQU6##
In general the trace Tr is a function on GF(p.sup.r) over GF(p) where p is a prime. Of particular interest is GF(2.sup.r) over GF(2) where Tr is defined by ##EQU7##
The trace has the following properties:
(1) Tr(.gamma.) .epsilon. GF(2)
(2) Tr(.gamma.+.delta.)=Tr(.gamma.)+Tr(.delta.)
(3) Tr(c.gamma.)=cTr(.gamma.) where .epsilon. GF(2)
(4) Tr(1)=r mod 2
Property (1) follows from ##EQU8## which implies that Tr(.gamma.) .epsilon. GF(2). Proofs of properties (1), (2) and (3) for traces of elements in GF(p.sup.r) appear in M. Perlman and J. Lee, Reed-Solomon Encoders Conventional vs Berlekamp's Architecture," JPL Publication 82-71, Dec. 1, 1982. Property (4) follows directly from the definition of a trace. From properties (2) and (3), the trace of .alpha..sup.i is a linear combination of a fixed set of coefficients of powers of .alpha. as shown in the following example:
EXAMPLE 3
From equation (7) where .alpha..sup.i 's defined by F.sub.B (x)=x.sup.4 +x.sup.3 +1 appear in Table III and in this example ##EQU9## Since (as previously shown)
Tr(.alpha..sup.3)=Tr(.alpha..sup.2)=Tr(.alpha.)=1
and Tr(.alpha..sup.0)=Tr(1)=0
Tr(.alpha..sup.i)=b.sub.3 +b.sub.2 +b.sub.1
The trace of each of the 16 elements are tabulated as follows:
______________________________________i of a.sup.i b.sup.3 b.sup.2 b.sup.i b.sup.O Tr(a.sup.i)______________________________________* 0 0 0 0 00 0 0 0 1 01 0 0 1 0 12 0 1 0 0 13 1 0 0 0 14 1 0 0 1 15 1 0 1 1 06 1 1 1 1 17 0 1 1 1 08 1 1 1 0 19 0 1 0 1 110 1 0 1 0 011 1 1 0 1 012 0 0 1 1 113 0 1 1 0 014 1 1 0 0 0______________________________________
The elements b.sub.3 b.sub.2 b.sub.1 b.sub.0 (representing .alpha..sup.i 's in equation (7)) of GF(2.sup.4) in Example 3 form a 4-dimensional vector space. Any set of linearly independent vectors which spans the vector space is a basis. The natural basis (previously discussed in connection with Table III.) is comprised of unit vectors .alpha..sup.3 [1 0 0 0], .alpha..sup.2 [0 1 0 0], .alpha.[0 0 1 0] and 1 [0 0 0 1].
Berlekamp's Dual Basis
Berlekamp, motivated to significantly reduce the hardware complexity of spaceborne RS encoders [Perlman, et al., supra, and E. R. Berlekamp, "Bit-Serial Reed-Solomon Encoders," IEEE Transactions on Information Theory, Vol. IT 28, No. 6, pp. 869-874, November 1982] introduced parameter .lambda. which results in another representation of RS symbols. The parameter .lambda. is a field element where
1, .lambda., .lambda..sup.2, . . . , .lambda..sup.r-1
is a basis in GF(2.sup.r). Any field element that is not a member of subfield will form such a basis. If .lambda.=.alpha., a generator of the field, a natural basis results. Berlekamp's choice of .lambda. and other independent parameters, such as the primitive polynomial known as the field generator polynomial, governing the representation of 8-bit RS symbols of a (255, 223) RS code was based solely on encoder hardware considerations detailed in Perlman, et al., supra. For a given basis
{1, .lambda., .lambda..sup.2, . . . , .lambda..sup.r-1 }={.lambda..sup.k }
in GF(2.sup.r), its dual basis {l.sub.j }, also called a complementary or a trace-orthogonal basis, is determined. Each RS symbol corresponds to a unique representation in the dual basis
{l.sub.0,l.sub.1, . . . ,l.sub.r-1 }={l.sub.j }
EXAMPLE 4
Consider the 16 field elements in Example 3. Members of subfields GF(2) and GF(2.sup.2) are
.alpha.*, .alpha..sup.0 and .alpha.*, .alpha..sup.0, .alpha..sup.5,.alpha..sup.10
respectively. Let .lambda.=.alpha..sup.6 (one of 12 elements that is not a member of a subfield). Then
{1, .lambda., .lambda..sup.2, .alpha..sup.3 }={1, .alpha..sup.6, .alpha..sup.12, .alpha..sup.9 }
is a basis in GF(2.sup.4). Each field element has the following correspondence
.alpha..sup.i .revreaction.v.sub.0 l.sub.0 +v.sub.1 l.sub.1 +v.sub.2 l.sub.2 +v.sub.3 l.sub.3
where
v.sub.k =Tr(.lambda..sup.k .alpha..sup.i)=Tr(.alpha..sup.6k+i)
The entries in column v.sub.0 (coefficients of l.sub.0) of Table IV below are
v.sub.0 =Tr(.alpha..sup.i)
as determined in Example 3. Whereas entries in column v.sub.1 (coefficients of l.sub.1) are
v.sub.1 =Tr(.alpha..sup.6+i)
which is column v.sub.0 (excluding Tr(.alpha.*)) cyclically shifted upwards six places. The remaining columns are similarly formed.
TABLE IV______________________________________Elements in GF(2.sup.4) Represented in Basis{l.sub.0, l.sub.1, l.sub.2, l.sub.3 }i of a.sup.i b.sub.3 b.sub.2 b.sub.1 b.sub.0 Tr(.alpha..sup.i) v.sub.0 v.sub.1 v.sub.2 v.sub.3______________________________________* 0 0 0 0 0 0 0 0 00 0 0 0 1 0 0 1 1 11 0 0 1 0 1 1 0 0 12 0 1 0 0 1 1 1 0 03 1 0 0 0 1 1 1 0 04 1 0 0 1 1 1 0 1 05 1 0 1 1 0 0 0 1 16 1 1 1 1 1 1 1 1 17 0 1 1 1 0 0 0 1 0 l.sub.28 1 1 1 0 1 1 0 0 0 l.sub.09 0 1 0 1 1 1 0 1 110 1 0 1 0 0 0 1 0 0 l.sub.111 1 1 0 1 0 0 1 1 012 0 0 1 1 1 1 1 1 013 0 1 1 0 0 0 1 0 114 1 1 0 0 0 0 0 0 1 l.sub.3______________________________________
The dual basis of
{.lambda..sup.k }={1,.lambda., .lambda..sup.2, .lambda..sup.3 } where .lambda.=.alpha..sup.6 ( 8)
as determined in Table IV is
{l.sub.j }={l.sub.0, l.sub.1, l.sub.2,l.sub.3 }={.alpha..sup.8, .alpha..sup.10, .alpha..sup.7, .alpha..sup.14 } (9)
The elements .lambda..sup.k l.sub.j .epsilon. GF(2.sup.4) and Tr(.lambda..sup.k l.sub.j) .epsilon. GF(2) appear, respectively, in the following "multiplication" tables where .lambda..sup.k and l.sub.j are arguments. ##EQU10## For the basis .lambda..sup.k in (8) and its dual {l.sub.j } in Equation (9) ##EQU11## as shown in the foregoing multiplication tables. Given any element .alpha..sup.i in GF(2.sup.4). Its components in {l.sub.j } are readily computed as follows: ##EQU12## from property (3) of a trace and Equation (10).
Every basis in GF(2.sup.r) has a dual basis. Furthermore, a one-to-one correspondence ##EQU13## exists from which Equation (11) follows with the appropriate change in the range of indices in Equations (10) and (11). The trace is used in modeling bit-serial multiplication in hardware of a fixed element expressed as a power of .alpha. (an RS symbol representing a coefficient of a generator polynomial g(x), subsequently discussed) and any RS symbol expressed in basis {l.sub.j }. The resulting product is represented in basis {l.sub.j }.
It is important to note that the one-to-one mapping(s) in Table IV of Example 4
v.sub.0 l.sub.0 +v.sub.1 l.sub.1 +v.sub.2 l.sub.2 +v.sub.3 l.sub.3 .fwdarw..alpha..sup.i and .alpha..sup.i .fwdarw.v.sub.0 l.sub.0 +v.sub.1 l.sub.1 +v.sub.2 l.sub.2 +v.sub.3 l.sub.3
can be achieved by either table look-up or by the following respective linear transformations: ##EQU14## The one-to-one onto mapping is an isomorphism where the operation of "addition" is preserved. Note that "multiplication" in basis {l.sub.j } has not been defined.
In the section above on Mathematical Characterization of RS Symbols, the two primitive polynomials over GF(2.sup.4)
F.sub.B (x)=x.sup.4 +x.sup.3 +1 and F.sub.G (x)=x.sup.4 +x+1
were discussed in connection with establishing representations for RS symbols. In RS coding terminology these are referred to as field generator polynomials. The subscript B in F.sub.B (x) denotes the field generator polynomial with RS-symbol representation associated with Berlekamp encoder architecture. The subscript G in F.sub.G (x) denotes the field generator polynomial with RS-symbol representation taken from GF(2.sup.4) defined by F.sub.G (x). The associated encoder architecture is of the pre-Berlekamp or "conventional" type.
The Generator Polynomial and Structure of a Reed-Solomon Code with Conventional Type Architecture
The 2.sup.J -1 (J-bit) symbols of the (N,K) RS codeword in (1) are GF(2.sup.J) coefficients of the codeword polynomial
c(x)=c.sub.N-1 x.sup.N-1 +C.sub.N-2 x.sup.N-2 +. . . +C.sub.2E x.sup.2E +C.sub.2E-1 x.sup.2E-1 +. . . +C.sub.0 ( 12)
RS codes are cyclic and are completely characterized by a generator polynomial ##EQU15## Recall the cyclic property of RS codes introduced in the first section on RS code parameters and properties where every cyclic permutation of the symbols of a codeword results in a codeword. Also codewords of cyclic codes (a subset of linear codes) are mathematically described as codeword polynomials where every codeword polynomial C(x) expressed in Equation (12)) over GF(2.sup.J) contains g(x) in Equation (13) as a factor. The generator polynomial (of an E symbol error-correcting RS code) g(x) of degree 2E, equal to number of symbols serving as check symbols, contains 2E consecutive nonzero powers of a primitive element .beta. in GF(2.sup.J) as roots. There is no restriction on which primitive element among .phi.(2.sup.J -1) is chosen. Furthermore, though it has been well known that the 2E consecutive powers of a primitive element .beta..sup.s could be
(.beta..sup.s), (.beta..sup.s).sup.2, . . . , (.beta..sup.s).sup.2E
where (s, 2.sup.J -1)=1. The value s=1 has invariably been used in practical applications. Berlekamp was the first to exploit the use of s>1 and more importantly 2E roots with a range of powers of j from b to b+2E-1 in (.beta..sup.s).sup.j in simplifying encoder hardware.
RS codes are a class of maximum distance separable (MDS) codes where the minimum Hamming distance
D.sub.min =N-K+1=2E+1
is the maximum possible for a linear code over any field. "Separable" (in MDS) and "systematic" are synonymous terms for codes whose information symbols occupy leading adjacent positions and are followed by check symbols.
The Hamming weight of an RS codeword is the number nonzero symbols. The Hamming weight distribution of MDS (hence RS) codes is completely deterministic. Error probabilities can be computed from the Hamming weight distribution.
Encoding is the process of computing 2E check symbols over distinct subsets of K information symbols such that the N=K+2E symbols are coefficients of C(x) in (12) and g(x) is a factor of C(x).
Given the information polynomial
I(x)=C.sub.n-1 x.sup.K-1 +C.sub.n-2 x.sup.k-2 +. . . +C.sub.2E ( 14)
check symbols are computed as follows: ##EQU16## From Equation (15)
x.sup.2E I(x).tbd.r(x)mod g(x) C(x)=x.sup.2E I(x)+r(x).tbd.0 mod g(x) (17)
The polynomials x.sup.2E I(x) and r(x) in Equation (16) are nonoverlapping and when "added" (where -r(x).tbd.r(x)) yield C(x) in (12). The generator polynomial g(x) is a factor of every (N,K) RS codeword polynomial C(x) as shown in (17).
A functional logic diagram of a conventional (N,K) RS encoder is given in FIG. 1. Assume the register (a cascade of 2E J-bit storage elements 1 through n of a RAM) of the FSR is initially cleared. With switches SW A and SW B in the up position, J-bit information symbols representing coefficients of I(x) are serially entered. An RS symbol is one argument for each of the multipliers M.sub.0, M.sub.1, . . . M.sub.2E-1, and the other argument is G.sub.0, G.sub.1, . . . G.sub.2E-1, respectively, where G.sub.i is the coefficient of x.sup.i of the codes generator polynomial. Symbol C.sub.N-1 is entered first. After the entry of C.sub.2E, the last information symbol, the check symbols (which represent coefficients of r(x)), reside in the register where C.sub.i is stored in the register stage labeled x.sup.i. At this time, switches SW A and SW B are placed in the down position. The output of each multiplier is a bit-serial input to the respective modulo-two adders A.sub.1 through A.sub.2E-1. Adder A.sub.in is in the circuit only during the information input mode for reducing the input symbol, and the output of stage, x.sup.2E-1, are bit serially added during the information mode. See Equations (14) through (17).
The check symbols starting with C.sub.2E-1 are then delivered to the channel (appended to the information symbols) while the register is cleared in preparation for the next sequence of K information symbols. Multiplication of I(x) by x.sup.2E is achieved by inputting the information symbols into the feedback path of the FSR in FIG. 1. The FSR divides x.sup.2E I(x) by g(x) and reduces the result modulo g(x). The fixed multipliers
G.sub.2E-1, G.sub.2E-2, . . . , G.sub.1, G.sub.0 .epsilon. GF(2.sup.J) (18)
in the respective interstage feedback paths of the FSR are coefficients of g(x) in Equation (13) (excluding G.sub.2E =1). Note that
g(x)=x.sup.2E +G.sub.2E-1 x.sup.2E-1 +G.sub.2E-2 x.sup.2E-2 +. . . +G.sub.1 x+G.sub.0
(and each scalar multiple of g(x)) is an RS codeword polynomial of lowest degree. A K information (J-bit) symbol sequence of K-1 0's (00 . . . 0) followed by the nonzero information symbol 1 (00 . . . 01) when encoded yields
C(x)=Ox.sup.N-1 +Ox.sup.N-2 +. . . +Ox.sup.2E+1 +x.sup.2E +G.sub.2E-1 x.sup.2E-1 +. . . +G.sub.1 x+G.sub.0 =x.sup.2E +G.sub.2E-1 x.sup.2E-1 +. . . +G.sub.1 x+G.sub.0
since
x.sup.2E .tbd.G.sub.2E-1 x.sup.2E-1 +. . . +G.sub.1 x+G.sub.0 mod g(x)
For each distinct multiplier in Equation (18), a ROM is addressed by the binary representation of a symbol appearing on the feedback path. Stored at the addressed location is the log (in binary) of the product of the symbol and the fixed multiplier reduced modulo 2.sup.J -1. An antilog table stored in a ROM (which may be part of the same ROM storing logs) is subsequently accessed to deliver the binary form of the product.
EXAMPLE 5
Given J=4 and E=3, the parameters of a (15,9) RS code employing "conventional" encoder architecture shown in FIG. 1. The log.sub..beta. and binary representations of the RS symbols (i.e., field elements in GF(2.sup.4)) defined by the field generator polynomial
F.sub.G (x)=x.sup.4 +x+1
appear in the following table:
______________________________________i of .beta..sup.i c.sub.3 c.sub.2 c.sub.1 c.sub.0______________________________________* 0 0 0 00 0 0 0 11 0 0 1 02 0 1 0 03 1 0 0 04 0 0 1 15 0 1 1 06 1 1 0 07 1 0 1 18 0 1 0 19 1 0 1 010 0 1 1 111 1 1 1 012 1 1 1 113 1 1 0 114 1 0 0 1______________________________________
Let the degree 6 (i.e., 2E) generator polynomial be ##EQU17## From (19), the fixed multipliers in the respective feedback paths of FIG. 1 (where G.sub.2E-1 =G.sub.5) are
{G.sub.5, G.sub.4, G.sub.3, G.sub.2, G.sub.1, G.sub.0 }={.beta..sup.10, .beta..sup.14, .beta..sup.4, .beta..sup.6, .beta..sup.9, .beta..sup.6 }
Since there are five distinct multipliers, five sets of ROM's are needed for "multiplication".
In Example 5, the field generator polynomial F.sub.G (x) and the code generator polynomial g.sub.1 (x) in Equation (19) completely characterize a (15,9) RS code which is 3 symbol error-correcting where D.sub.min =2E+1=7. The 16 4-bit symbols appear in the table in Example 5 with their corresponding log.sub..beta. representations (i.e., i of .beta..sup.i).
EXAMPLE 6
Consider the following (15,9) RS codewords with symbols expressed in log.sub..beta. form (i.e., i of .beta..sup.i) as given in the table in Example 5. The code's generator polynomial is g.sub.1 (x) in Equation (19).
__________________________________________________________________________Codeword C.sub.14 C.sub.13 C.sub.12 C.sub.11 C.sub.10 C.sub.9 C.sub.8 C.sub.7 C.sub.6 C.sub.5 C.sub.4 C.sub.3 C.sub.2 C.sub.1 C.sub.0C.sup.0 * * * * * * * * * * * * * * *C.sup.1 * * * * * * * * 0 10 14 4 6 9 6C.sup.2 * * * * * * 0 10 14 4 6 9 6 * *C.sup.3 * * * * * * 0 10 3 2 8 14 * 9 6C.sup.4 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10__________________________________________________________________________
C.sup.1 (x)=g.sub.1 (x), a codeword polynomial of least degree. C.sup.0 (x) is the codeword polynomial whose coefficient string C.sup.O is * * . . . * (where .beta.*=0000). Since RS codes are linear or group codes, C.sup.0 (of an appropriate length) is a codeword of every (N,K) RS code over GF(p.sup.r). Furthermore, every sequence of N identical symbols such as C.sup.4 is an RS codeword. Codeword C.sup.2 is a cyclic permutation (two places to the left) of C.sup.1. Thus
c.sup.2 (x)=x.sup.2 c.sup.1 (x)=x.sup.2 g.sub.1 (x)
(where powers of x are necessarily reduced modulo 15). Codeword C.sup.3 is a linear combination of C.sup.1 and C.sup.2 and
c.sup.3 (x)=(x.sup.2 +1)g.sub.1 (x).
Clearly
g.sub.1 (x).vertline.C.sup.0 (x)
and dividing C.sup.4 (x) by g.sub.1 (x) leads to the Euclidean form
c.sup.4 (x)=(.beta..sup.10 x.sup.8 +x.sup.7 +.beta..sup.9 x.sup.6 +.beta..sup.2 x.sup.5 +.beta..sup.6 x.sup.4 +.beta..sup.8 x.sup.3 +.beta..sup.6 x.sup.2 +.beta..sup.3 x+.beta..sup.4)g.sub.1 (x)
The Hamming distance between distinct pairs of codewords are listed in the following table.
______________________________________Codewords Hamming Distance______________________________________C.sup.0, C.sup.1 7C.sup.0, C.sup.2 7C.sup.0, C.sup.3 8C.sup.0, C.sup.3 15C.sup.1, C.sup.2 8C.sup.1, C.sup.3 7C.sup.1, C.sup.4 14C.sup.2, C.sup.3 7C.sup.2, C.sup.4 14C.sup.3, C.sup.4 14______________________________________
Refer to FIG. 1 and the (15,9) RS code discussed in Examples 5 and 6. The six register stages x.sup.5, x.sup.4, x.sup.3, x.sup.2, x, 1 are initially cleared. Successive states of the six stages when encoding the following sequence of information symbols
______________________________________{C.sub.14, C.sub.13, . . . , C.sub.9, C.sub.8, C.sub.7, C.sub.6 } = {*,*, . . . , *, 0, 10, 3} arej of c.sub.j Symbol x.sup.5 x.sup.4 x.sup.3 x.sup.2 x 1______________________________________14 * * * * * * *13 * * * * * * *. . . . . . . .. . . . . . . .. . . . . . . .9 * * * * * * *8 0 10 14 4 6 9 67 10 14 4 6 9 6 *6 3 2 8 14 * 9 6 .uparw. C.sub.5______________________________________
The states of the register stages in a given row reflects the entry of the corresponding information symbol. When entering an information symbol, it is "added" by Adder A.sup.in to the content of stage x.sup.5 (i.e., x.sup.2E-1) as it is shifting out (to the left in FIG. 1) and the resulting symbol is simultaneously "multiplied" by each feedback coefficient. This string of symbols is (vector) "added" to the (left) shifted contents of the register. It is this result that corresponds to the states of the register after entering an information symbol. The following events occur when entering the last information symbol C.sub.6 in deriving C.sup.3 given on page 28. ##STR1## As shown in FIG. 1 "addition" of symbols is done bit-serially during shifting. Whereas each of the five different "multiplications" requires a log and antilog table stored in a ROM as previously discussed. The remainder upon dividing x.sup.6 (x.sup.8 +.beta..sup.10 x.sup.7 +.beta..sup.3 x.sup.6) by g.sub.1 (x) in (19) verifies the (hardware) encoding result. ##STR2## The quotient
0*0 .revreaction.x.sup.2 +1 and g.sub.1 (x)
are factors of C.sup.3 (x).
The Generator Polynomial and Structure of a Reed-Solomon Code with Berlekamp Architecture
The generator polynomial g(x) used in Berlekamp (N,K) RS encoder architecture is a self-reciprocal polynomial of degree 2E over GF(2.sup.J). As in the design of conventional (N,K) RS encoder architecture GF(2.sup.J) is defined by a field generator polynomial of degree J over GF(2). The generator polynomial ##EQU18## where .alpha. and .gamma.=.alpha..sup.s are primitive elements in GF(2.sup.J). (A positive integer value of s is chosen whereby (s, 2.sup.J -1)=1)). In contrast with g(x) in Equation (13) associated with conventional architecture .gamma. is any primitive element and j ranges from b to b+2E-1. The number of multiplications per symbol shift is approximately halved by selecting a g(x) with E pairs of reciprocal roots.
Reciprocal root pairs in Equation (20) are
.gamma..sup.b+i .gamma..sup.(b+2E-1)-i =1=.gamma..sup.N for 0.ltoreq.i<E (21)
and
2b+2E-1=N=2.sup.J -1b=2.sup.J-1 -E (22)
from which b and b+2E-1 are determined given J (bits per symbol) and E (symbol error-correction capability)
EXAMPLE 7
Given J=4 and E=3, parameters of a (15,9) RS code employing Berlekamp encoder architecture shown in FIG. 2. The log.sub..alpha. and binary representations of the RS symbols in GF(2.sup.4) defined by the field generator polynomial
F.sub.B (x)=x.sup.4 +x.sup.3 +1
are given in TABLE I. A degree 6 generator polynomial is derived for .gamma.=.alpha..sup.4 in Equation (20). From Equations (21) and (22) ##EQU19## Note that the coefficient string of g.sub.2 (x) in (23) is palindromic since
x.sup.6 g.sub.2 (1/x)=g.sub.2 (x)
is a self-reciprocal polynomial over GF(2.sup.4). Thus ##EQU20## represent the fixed multipliers. A multiplier G.sub.i =.alpha..sup.0 =1 corresponds to a wire (in either conventional or Berlekamp encoder hardware) and does not incur a cost. In Berlekamp architecture G.sub.O =(G.sub.2E) necessarily equals .alpha..sup.0 =1 and there are at most E distinct nonzero fixed multipliers excluding .alpha..sup.0. Whereas in conventional architecture there are at most 2E distinct nonzero fixed multipliers.
The number of distinct possible self-reciprocal generator polynomials g(x) of degree 2E is .phi.(2.sup.J -1)/2 for any J and E where (2.sup.J -1)-2E.gtoreq.3. For each .gamma.(.alpha..sup.s in Equation (20)) its reciprocal .gamma..sup.-1 (i.e., .alpha..sup.-s =.alpha..sup.N-s) yields the same g(x). In this example there are .phi.(15)=8 distinct choices in selecting .gamma. resulting in four distinct possible self-reciprocal generator polynomials g.sub.2 (x).
As is the case for conventional (encoder) architecture, coefficients of the generator polynomial associated with Berlekamp architecture are represented as
.alpha..sup.i =b.sub.r-1 .alpha..sup.r-1 +b.sub.r-2 .alpha..sup.r-2 +. . . +b.sub.0 where b.sub.j .epsilon. GF (2)
in GF(2.sup.r). See Table I and Example 7 for r=4. However, unlike the case for conventional architecture, information symbols and check symbols are represented in basis {l.sub.j } the dual basis of {.lambda..sup.k } discussed above in the section on Berlekamp's Representation of RS Symbols Using the Concept of Trace and Berlekamp's Dual Basis. ##EQU21## for a selected element .lambda. in GF(2.sup.r) where .lambda. is not a member of a subfield.
Referring to FIG. 2, a linear binary matrix 10 (i.e., an array of Exclusive-OR gates) with J inputs and E+2 outputs is used to perform the multiplication of a J-bit RS symbol (in the feedback path) stored in a z register 12 with each of the coefficients
G.sub.0 =(G.sub.2E), G.sub.1 =G.sub.2E-1, . . . , G.sub.E-1 =G.sub.E+1, G.sub.E
of g.sub.2 (x). The components of z (an RS symbol represented in {l.sub.j }) are
z.sub.0, z.sub.1, . . . z.sub.j-1
Note that substituting z.sub.i for v.sub.i gives ##EQU22## where .alpha..sup.i is the corresponding representation of the RS symbol (i.e., field element) z. Thus, as in Equation (11), z.sub.k in {l.sub.j } is computed by ##EQU23## At a given time interval the representation of a field element z in basis {l.sub.j } is entered and stored in register z. The respective outputs of the linear binary matrix are ##EQU24## These outputs represent
z.sub.0.sup.(0), z.sub.0.sup.(1), . . . , z.sub.0.sup.(E) ( 25)
the first component (bit) in basis {l.sub.j } of each of the products
zG.sub.0, zG.sub.1, , . . . , zG.sub.E ( 26)
respectively. Condensed symbolism associated with expressions of the form appearing in Equations (24), (25) and (26) proposed by Berlekamp appear in Perlman and Lee, supra. The condensed symbolism is introduced here in an attempt to complete the description of the operation of the linear binary matrix.
{z.sub.0.sup.(l) } for 0.ltoreq.l.ltoreq.E
is the equivalent of Equation (25). Whereas {zG.sub.1 } is a condensed representation of Equation (26).
T.sub.l (z)=Tr(zG.sub.l)
denotes J successive sets of E simultaneous outputs (bit per output) in computing {zG.sub.l } in basis {l.sub.j }. Since zG.sub.l is representable in basis {l.sub.j } the dual basis of {.lambda..sup.k } ##EQU25## At (time interval) k=0, the simultaneous outputs {T.sub.l } in Equation (24) are {z.sub.0 .sup.(l) } (in Equation (25)), the first component (bit) of each of the products {zG.sub.l } in Equation (26). At k=1, the stored symbol z (in FIG. 2) is replaced by .lambda.z where .lambda.z is derived from z (as will be shown). The simultaneous outputs {T.sub.l } are {z.sub.1.sup.(l) }, the second component (bit) of each of the products {zG.sub.l }. Similarly at k=2, .lambda.z is replaced by .lambda.(.lambda.z) and {T.sub.l } yields the third component of {G.sub.l } and so on.
The form of the {T.sub.l } functions follows from Equation (27) and is ##EQU26## For every z, the output T.sub.l for a given l is the sum modulo 2 (Exclusive-OR) of those components z.sub.j 's in the dual basis for which
Tr(l.sub.j G.sub.l)=1
The output Tr(.lambda..sup.J z) in FIG. 2 which is fed back to the z register is used in deriving .lambda.z. The field element z may be represented as .alpha..sup.i or in basis {l.sub.j } in vector form as
z=Tr(z), Tr(.lambda.z), . . . , Tr(.lambda..sup.J-1 z)
where
Tr(.lambda..sup.k z)=Tr(.lambda..sup.k .alpha..sup.i)=z.sub.k
and
z=Tr(.lambda.z), Tr(.lambda..sup.2 z), . . . , Tr(.lambda..sup.J z)
By shifting the bits stored in the z register in FIG. 2 upward one position and feeding back the output (of the linear binary matrix) Tr(.lambda..sup.J z), .lambda.z is derived from z. This corresponds to
Z.sub.i .rarw.z.sub.i+1 for 0.ltoreq.i<J z.sub.J-1 .rarw.z.sub.J =Tr(.lambda..sup.J z)
EXAMPLE 8
The design of the linear binary matrix for the (15,9) RS code introduced in Example 7 is the subject of this example. One argument for each {T.sub.l } function is the set of distinct unit vectors in {l.sub.j }
{l.sub.0, l.sub.1, l.sub.2, l.sub.3 }={.alpha..sup.8, .alpha..sup.10, .alpha..sup.7, .alpha..sup.14 }
expressed as .alpha..sup.i. See Table IV where components z.sub.i are substituted for coefficients v.sub.i. The other argument is a distinct coefficient
{G.sub.0, G.sub.1, G.sub.2, G.sub.3 }={.alpha..sup.0, .alpha..sup.4, .alpha..sup.2, .alpha..sup.11 }
of the self-reciprocal generator polynomial g.sub.2 (x) in Equation (23).
The following table yields the desired {T.sub.l } linear functions of the z.sub.i components.
______________________________________j 0 1 2 3l.sub.j G.sub.0 .alpha..sup.8 .alpha..sup.10 .alpha..sup.7 .alpha..sup.14Tr(l.sub.j G.sub.0) 1 0 0 0 T.sub.0 = z.sub.0l.sub.j G.sub.1 .alpha..sup.12 .alpha..sup.14 .alpha..sup.11 .alpha..sup.3Tr(l.sub.j G.sub.1) 1 0 0 1 T.sub.1 = z.sub.0 + z.sub.3l.sub.j G.sub.2 .alpha..sup.10 .alpha..sup.12 .alpha..sup.9 .alpha.Tr(l.sub.j G.sub.2) 0 1 1 1 T.sub.2 = z.sub.1 + z.sub.2 + z.sub.3l.sub.j G.sub.3 .alpha..sup.4 .alpha..sup.6 .alpha..sup.3 .alpha..sup.10Tr(l.sub.j G.sub.3) 1 1 1 0 T.sub.3 = z.sub.0 + z.sub.1______________________________________ + z.sub.2
The output of the linear binary matrix Tr(.lambda..sup.J .alpha..sup.i) (where J=4 and .lambda.=.alpha..sup.6), which is fed back when computing .lambda.z, is derived from Table IV as follows:
______________________________________z.sub.0 z.sub.1 z.sub.2 z.sub.3 .alpha..sup.i .lambda..sup.4 .alpha..sup.i = .alpha..sup.9+i Tr(.lambda..sup.4 .alpha..sup.i)______________________________________1 0 0 0 .alpha..sup.8 .alpha..sup.2 10 1 0 0 .alpha..sup.10 .alpha..sup.4 10 0 1 0 .alpha..sup.7 .alpha. 10 0 0 1 .alpha..sup.14 .alpha..sup.8 1______________________________________Thus, Tr(.lambda..sup.4 .alpha..sup.i) = z.sub.0 + z.sub.1 + z.sub.2 +z.sub.3 (= z.sub.4)______________________________________
This completes the logical description of the linear binary array for the (15,9) RS code presented in Example 7. An implementation is given in FIG. 3 in the form of a functional logic diagram. By (Exclusive-OR) gate sharing, the total of number of gates is reduced to 5.
Berlekamp architecture eliminates all firmware required by conventional architecture for multiplying a field element (RS Symbol) by a set of fixed field elements (corresponding to coefficients of the generator polynomial). The firmware is replaced by the linear binary array 10 whose complexity is governed by the selected field generator polynomial, the basis {.lambda..sup.k } whose dual basis is {l.sub.j }, and the self-reciprocal generator polynomial. For a given E (symbol error-correction capability) these selections are totally independent. Following is the total number of ways these parameters can be chosen for a J (bits per symbol) of 4 and 8.
______________________________________ CombinedNo. of Ways of Selecting IndependentJ F.sub.B (x) g.sub.2 (x) .lambda. Selections______________________________________4 2 4 12 968 16 64 240 245, 760______________________________________
In GF(2.sup.8), the subfield GF(2.sup.4) of 16 elements contains GF(2.sup.2) which contains GF(2). Thus .lambda. can be selected from 240 elements in GF(2.sup.8) each of which is not a member of GF(2.sup.4). For a given F.sub.B (x) and g.sub.2 (x) Berlekamp used a computer search to obtain a complexity profile of the linear binary array for a (255,223) RS code. This enabled him to select a region where .lambda., F.sub.G (x) and g.sub.2 (x) led to a linear binary array of minimal complexity.
In FIG. 2, a y register 14 is essentially an extension of register section 2E-1 and serves as a staging register. After the products {zG.sub.l } have been determined, register z is reloaded with the contents of y the next symbol to be fed back. Until all information symbols have been entered and simultaneously delivered to the channel, the y input is the bit-by-bit Exclusive-OR of the bits comprising the information symbol being entered and the bits of the symbol exiting register section S.sub.2E-j. After the last information symbol has been entered, the mode is changed by a mode switch MSW from information to check, and the 2E check symbols are delivered bit-serially to the channel. Register sections S.sub.0, S.sub.1, . . . , S.sub.2E-1 reside in RAM's. The linear binary array 10 allows simultaneous bit-serial multiplication and addition sum modulo 2 with corresponding components of bit shifted symbols in each register section. It effectively realizes bit-serial multiplication of an arbitrary RS symbol with a set of fixed multipliers. The register stages S.sub.0, S.sub.1, . . . S.sub.2E-1 play the same role as corresponding register stages in FIG. 1. Similarly, addersA.sub.1, . . . , A.sub.2E-1 and A.sub.in play a similar role as adders in FIG. 1.
EXAMPLE 9
______________________________________ z .lambda.z .lambda..sup.2 z .lambda..sup.3 z______________________________________z.sub.0 0 0 0 1z.sub.1 0 0 1 1z.sub.2 0 1 1 0z.sub.3 1 1 0 0______________________________________
Columns (left to right) are successive contents of the z register after first nonzero information symbol is entered.
__________________________________________________________________________C.sub.14 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 .alpha.*C.sub.13 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 .alpha.*. . . . . .. . . . . .. . . . . .C.sub.6 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 1 .alpha..sup.14C.sub.5 1 1 1 1 1 0 1 1 0 1 .alpha..sup.3C.sub.4 1 1 0 1 0 0 1 0 0 1 .alpha.C.sub.3 0 0 1 0 1 0 0 1 0 0 .alpha..sup.10C.sub.2 1 1 0 1 0 0 1 0 0 1 .alpha.C.sub.1 1 1 1 1 1 0 1 1 0 1 .alpha..sup.3C.sub.0 0 0 0 0 0 0 0 0 0 1 .alpha..sup.14 .uparw. .uparw. .uparw. .uparw. T.sub.0 (z) T.sub.1 (z) T.sub.2 (z) T.sub.3 (z)__________________________________________________________________________
The foregoing tables are associated with the encoding of the information symbol sequence
______________________________________C.sub.14 C.sub.13 . . . C.sub.60 0 . . . 1 Info. Symb. in Basis {l.sub.j } Expressed in______________________________________ Hex.
The encoder in FIG. 2 (where J=4 and E=3) is initially cleared and in the information mode. The last symbol C.sub.6 to enter the encoder is the only nonzero symbol among nine information symbols. Previous all zero (0 0 0 0) symbols have no affect on the initial zero states of the registers y and z and the register sections S.sub.5, S.sub.4, . . . , S.sub.0. Symbol C.sub.6 is entered and stored (via the y register) in the z register. (Since register section S.sub.5 contains 0 0 0 0 upon entering C.sub.6, the bit-by-bit Exclusive-OR of the two symbols leaves C.sub.6 unchanged). The contents of the z register after C.sub.6 is entered is shown in the first of the foregoing tables under column heading z, where
z.sub.0 =z.sub.1 =z.sub.2 =0 and z.sub.3 =1
The following {T.sub.l } functions derived in Example 8 ##EQU27## are the first set of outputs (with the current components of the z register as arguments). These are ##EQU28## the first respective components of check symbols C.sub.0, C.sub.1, . . . , C.sub.5 in the second table of this example. As previously discussed the {T.sub.l } outputs in (29) occur simultaneously. The last (bit) entry in the column identified as
T.sub.0 (z)=Tr(zG.sub.0)
is the first component of check symbol C.sub.O. After computing the first components of T.sub.l (z)=Tr(zG.sub.l) in (28) for j=0, the contents of the z register is shifted upward one (bit) position with z.sub.3 replaced by ##EQU29## The new contents of the z register appears in the first table of this example under the column heading .lambda.z. The second components of T.sub.l (z)=Tr(zG.sub.l) in (28) for j=1 are similarly computed and tabulated in the lower table. The second component of check symbol C.sub.O when first computed (along with the second components of all the other check symbols) is the last bit in the column identified as
T.sub.1 (z)=Tr(.lambda.zG.sub.0)
Encoding continues until all four components of each check symbol have been computed in basis {l.sub.j } as shown in the lower table. The information symbols and check symbols of the (15,9) RS codeword are in basis {l.sub.j }. Their corresponding .alpha..sup.i representation appears in the rightmost column of the second table in accordance with TABLE IV. Consider the following representations of the resulting codeword.
__________________________________________________________________________C.sub.15 C.sub.14 . . . C.sub.7 C.sub.6 C.sub.5 C.sub.4 C.sub.3 C.sub.2 C.sub.1 C.sub.0 Representation0 0 . . . 0 1 D 9 4 9 D 1 Basis {l.sub.j } in Hex.alpha.* .alpha.* . . . .alpha.* .alpha..sup.14 .alpha..sup.3 .alpha. .alpha..sup.10 .alpha. .alpha..sup.3 .alpha..sup.14 {.alpha..sup.i }__________________________________________________________________________
The representation in powers of .alpha. corresponds to the polynomial
P(x)=.alpha..sup.14 x.sup.6 +.alpha..sup.3 x.sup.5 +.alpha.x.sup.4 +.alpha..sup.10 x.sup.3 +.alpha.x.sup.2 +.alpha..sup.3 x+.alpha..sup.14
Comparing P(x) with the code's generator polynomial
g.sub.2 (x)=x.sup.6 +.alpha..sup.4 x.sup.5 +.alpha..sup.2 x.sup.4 +.alpha..sup.11 x.sup.3 +.alpha..sup.2 x.sup.2 +.alpha..sup.4 x+1
reveals that P(x) is a scalar multiple of g.sub.2 (x)--i.e.,
P(x)=.alpha..sup.14 [g.sub.2 (x)]=C(x)
a codeword polynomial.
STATEMENT OF THE INVENTION
Mappings between codewords of two distinct (N,K) Reed-Solomon codes over GF(2.sup.J) having selected two independent parameters: J, specifying the number of bits per symbol; and E.sub.1, the symbol error correction capability of the code, is provided. The independent parameters J and E yield the following: N=2.sup.J -1, total number of symbols per codeword; 2E, the number of symbols assigned a role of check symbols; and K=N-2E, the number of code symbols representing information, all within a codeword of an (N,K) RS code over GF(2.sup.J). Having selected those parameters for encoding, the implementation of a decoder is governed by: 2.sup.J field elements defined by a degree J primitive polynomial over GF(2) denoted by F(x); a code generator polynomial of degree 2E containing 2E consecutive roots of a primitive element defined by F(x); and, in a Berlekamp RS code, the basis in which the RS information and check symbols are represented.
The process for transforming words R.sub.B in a conventional code for decoding the words R.sub.G having possible errors to codewords C.sub.G free of error is accomplished in a sequence of transformations leading to decoding R.sub.G to C.sub.G, and inverse transformations of those same transformations in a reverse sequence leading to converting the codewords C.sub.G to codewords C.sub.B, thus decoding the Berlekamp codewords R.sub.G. Thus, the corrected codewords C.sub.G are reverse transformed symbol-by-symbol back into codewords C.sub.B in the Berlekamp code. The uncorrected words in the Berlekamp code and the conventional code are here denoted by the letter R with subscripts B and G, respectively, because they are with possible error. Until corrected, they are not denoted codewords by the letter C with first the subscript G and later in the process the subscript B. The codewords C.sub.G are not information, because in the process of transformation from R.sub.B to R.sub.G for decoding (i.e., correcting errors) they have undergone permutation. To retrieve the information, the codewords C.sub.G must be transformed back into codewords C.sub.B by inverse transformation in a reverse order of process steps.





BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates a conventional (N,K) RS encoder.
FIG. 2 illustrates an (N,K) RS endecoder utilizing Berlekamp's architecture.
FIG. 3 is a logic diagram of a linear binary matrix for a (15,9) RS Berlekamp encoder.
FIGS. 4a through 4d illustrate a flow chart of a sequence of transformations and their respective inverses in reverse order, in accordance with the present invention.





DETAILED DESCRIPTION OF THE INVENTION
The Mathematical Equivalence of (N,K) Reed-Solomon Codes
Before proceeding with a detailed description of the invention, the transformational equivalence of Berlekamp and conventional RS codes for (N,K)=(15,9) will be described as one example of an (N,K) RS code GF(w.sup.4). Then a succession of transformations will be described that, in accordance with the present invention, map any given codeword of a (255,223) RS Berlekamp code B to a codeword of a (255,223) RS code. (Conventional code G). This allows the use of one ground decoder (associated with code G) which is conservatively an order of magnitude more complex than its associated encoder to serve as a decoder for the two distinct (255,223) RS codes. The succession of transformations that map a received word (which may be erroneous) originating from code B to one of code G (with the number of erroneous symbols unchanged) is completed before decoding. After decoding where symbol errors, if any, have been corrected, the entire codeword (now a member of code G) is subjected to the inverse of each of the above transformations in reverse order to recover the received codeword in Code B in order to recover the codeword originating from code B (corrected if originally erroneous). A received word originating from code G is decoded directly. B in code B denotes Berlekamp's representations associated with Berlekamp encoder architecture. Whereas G in code G denotes representations associated with pre-Berlekamp or "conventional" architecture.
The mathematical description of two (15,9) RS codes are summarized as follows: ##EQU30## Each (of the 9) 4-bit information symbols of any (15,9) RS code is independently selected among 16 possible symbols in GF(2.sup.4) defined by the code's field generator polynomial. Each (of the 6) check symbol is a linear combination of a distinct subset of information symbols and thus are defined by the information symbols and, therefore, dependent. Thus the size of a (15,9) RS codeword dictionary is
(2.sup.4).sup.9 =2.sup.36 .apprxeq.6.87.times.10.sup.10 codewords
There is a one-to-one correspondence between the codewords of two different (N,K) RS codes.
Given the information symbol sequence represented in hexadecimal
______________________________________i of C.sub.i 14 13 12 11 10 9 8 7 6{l.sub.j } in Hex 7 0 0 0 0 0 0 0 0______________________________________
encoding the information symbol sequence using an encoder with Berlekamp architecture results in the Code B codeword
__________________________________________________________________________i of C.sub.i 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0{l.sub.j } in Hex 7 0 0 0 0 0 0 0 0 7 A C 6 C A__________________________________________________________________________
where each 4-bit symbol is a basis {l.sub.j } symbol expressed in Hexadecimal.
The first transformation to be applied to a Code B codeword is the mapping of each symbol from its basis {l.sub.j } representation to its corresponding
.alpha..sup.i =b.sub.3 .alpha..sup.3 +b.sub.2 .alpha..sup.2 +b.sub.1 .alpha..sup.1 +b.sub.0 .alpha..sup.0
representation as given in TABLE IV. The log.sub..alpha. of .alpha..sup.i (i.e., i) is (and has been) used to represent the binary symbol b.sub.3 b.sub.2 b.sub.1 b.sub.0 where appropriate.
EXAMPLE 10
Consider the Code B codeword
__________________________________________________________________________k of Ck 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0{l.sub.j } in Hex 7 0 0 0 0 0 0 0 0 7 A C 6 C A__________________________________________________________________________
By table look-up or the linear transformation discussed above under the heading "Berlekamp's Representation of RS Symbols Using the Concept of a Trace," the basis {l.sub.j } symbols are transformed to their respective .alpha..sup.i representations to yield the Code B.1 codeword
__________________________________________________________________________k of Ck 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0{l.sub.j } in Hex 7 0 0 0 0 0 0 0 0 7 A C 6 C Ai of .alpha..sup.i 0 * * * * * * * * 0 4 2 11 2 4__________________________________________________________________________
Note that Code B.1 is a (15,9) RS code with the following mathematical description: ##EQU31## Code B.1 has the same field and code generator polynomial (which is self-reciprocal) as Code B. The encoder associated with Code B.1 is of the "conventional" type, a codeword denoted C.sub.B.1 (x) in the following equation.
C.sub.B.1 (x)=x.sup.14 +x.sup.5 +.alpha..sup.4 x.sup.4 +.alpha..sup.2 x.sup.3 +.alpha..sup.11 x.sup.2 +.alpha..sup.2 x+.alpha..sup.4 (30)
is from Example 10 a codeword polynomial belonging to Code B.1 which contains g.sub.2.1 (x)=g.sub.2 (x) as a factor. The symbol-by-symbol transformation from the basis {l.sub.j } representation in binary to its corresponding .alpha..sup.i representation in binary (i.e., .alpha.basis} is ##EQU32## is the linear transformation matrix. For example
[1 1 1 0]T.sub.l.alpha. =[0 0 1 1]=.alpha..sup.12
as may be verified in TABLE IV.
The second transformation in the sequence is related to the translation of the powers of the roots in g.sub.2.1 (x) (=g.sub.2 (x)) which was first derived in R. L. Miller and L. J. Deutsch, "Conceptual Design for a Universal Reed-Solomon Decder," IEEE Transactions on Communications," Vol. Com-29, No. 11, pp. 1721-1722, November 1981, for the general case. Given ##EQU33## where .gamma.=.alpha..sup.4. Changing the argument from x to .gamma..sup.4 x yields ##EQU34## where (.gamma..sup.4).sup.6 =.gamma..sup.24.tbd.9 mod 15 and .gamma..sup.4 =.alpha..
The generator polynomial g.sub.2.2 (x) derived from g.sub.2.1 (x) defines the (15,9) RS Code B.2.
Given C.sub.B.1 (x) a Code B.1 codeword polynomial. Thus
g.sub.2.1 (x).vertline.C.sub.B.1 (x) and C.sub.B.1 (x)=u(x)g.sub.2.1 (x) over GF(2.sup.4)
defined by F.sub.B.1 (x) (=F.sub.B (x)). Then
.gamma..sup.-9 C.sub.B.1 (.alpha.x)=u(.alpha.x)[.gamma..sup.-9 g.sub.2.1 (.alpha.x)]=u(.alpha.x)g.sub.2.2 (x)
and
C.sub.B.1 (.alpha.x)=.gamma..sup.9 u(.alpha.x)g.sub.2.2 (x)
since g.sub.2.2 (x).vertline.C.sub.B.1 (.alpha.x), C.sub.B.1 (.alpha.x) is a Code B.2 codeword polynomial.
Code B.2 is a (15,9) RS code with the following mathematical description: ##EQU35## The encoder associated with Code B.2 is of the "conventional" type. The generator polynomial g.sub.2.2 (x) provides a test for any codeword polynomial C.sub.B.2 (x) derived from the transformation C.sub.B.1 (.alpha.x). Dividing C.sub.B.2 (x) by g.sub.2.2 (x) in (31) over GF(2.sup.4) defined by F.sub.B.2(x) =(F.sub.B (x)) results in a zero remainder.
EXAMPLE 11
From Example 10 and Equation (30) ##EQU36## It may be verified that
C.sub.B.2 (x)=(.alpha..sup.14 x.sup.8 +.alpha..sup.2 x.sup.7 +.alpha..sup.7 x.sup.6 +.alpha..sup.4 x.sup.5 +.alpha..sup.4 x.sup.4 +.alpha..sup.3 x.sup.3 +.alpha.x.sup.2 +.alpha..sup.2 x+.alpha..sup.10)g.sub.2.2 (x)
over GF(2.sup.4) defined by F.sub.B.2 (x) (=F.sub.B (x)). The generator polynomial g.sub.2.2 (x) appears in (31).
The outcomes of successive transformations, thus far, on codeword (symbols) C.sub.B in Example 10 are:
__________________________________________________________________________k of Ck 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0__________________________________________________________________________C.sub.B 7 0 0 0 0 0 0 0 0 7 A C 6 C AC.sub.B.1 0 * * * * * * * * 0 4 2 11 2 4C.sub.B.2 14 * * * * * * * * 5 8 5 13 3 4__________________________________________________________________________
The binary symbols of C.sub.B are in basis {l.sub.j } represented in hexadecimal. Whereas the binary symbols in C.sub.B.1 and C.sub.B.2 are represented by i of .alpha..sup.i in the same GF(2.sup.4) where F.sub.B (.alpha.)=0.
The transformation related to the translation of the powers of the roots involves a change in the magnitude of s.sub.k in .alpha..sup.SK of a coefficient of x.sup.k (when .alpha..sup.SK and k are nonzero) which is dependent upon the magnitude of k. An all zeros coefficient (.alpha.*) and C.sub.O the constant term of a codeword polynomial are unaffected. Given the fixed vector
14, 13, . . . , 1, 0
representing the powers of x of any (15,9) codeword polynomial and
s.sub.14, s.sub.13, . . . , s.sub.1, s.sub.0
the log.sub..alpha. of respective coefficients of codeword polynomial C.sub.B.1 (x). Then the log.sub..alpha. of the coefficient of x.sup.k of C.sub.B.2 (x) (i.e., C.sub.B.1 (.alpha.x)) is
k+s.sub.k mod 15 and for s.sub.k =*, k+*=*
The description of the succession of transformations for the one-to-one mapping of C.sub.B (x) to C.sub.G (x) continues. A change in the primitive element .alpha. is required in ##EQU37## in preparation for the one-to-one mapping of RS symbols (i.e., field elements) in GF(2.sup.4) defined by F.sub.B (x) in (5) to RS symbols in GF(2.sup.4) defined by F.sub.G (x) in (6). See Table III.
An element .alpha..sup.y is sought whereby
(.alpha..sup.y).sup.4 =.alpha..sup.13 or 4y.tbd.13 mod 15 (32)
From number theory, for integers b, c and n
by.tbd.c mod n
has solution(s) in y if and only if (b,n).vertline.c and the number of distinct solutions is (b,n). Since (4,15)=1 there is a unique solution for y in (32), namely, y=7. Clearly (7,15)=1 and .alpha..sup.7 is primitive.
Recall that .alpha. is a primitive root of F.sub.B (x) and that .alpha..sup.4 among the candidates of primitive elements
.alpha.(or .alpha..sup.14), .alpha..sup.2 (or .alpha..sup.13), .alpha..sup.4 (or .alpha..sup.11), .alpha..sup.7 (or .alpha..sup.8)
was selected in deriving one of 4 distinct self-reciprocal generator polynomials, namely, g.sub.2 (x) in (23). The choice is one factor affecting the complexity of the linear binary array in FIG. 2. Since i of the .alpha..sup.i candidates is necessarily relatively prime to 15 (i.e., (i,n)=1), a unique solution exists for the congruence in (32) where each i is substituted for 4. The foregoing arguments are applicable in formulating a transformation between any two distinct (N,K) RS codes involving a change in the primitive element. N-K consecutive powers of the changed primitive element are roots of transformed codewords. The correspondence
.alpha..sup.13 .fwdarw.(.beta..sup.7).sup.13 =.beta..sup.91.tbd.1 mod 15 =.beta. (33)
as shown in TABLE III is used in a subsequent third transformation which yields g.sub.1 (x).
The next transformation is a one-to-one mapping of codewords in Code B.2 onto codewords in Code B.3. The generator polynomial of Code B.3 is ##EQU38## Codeword polynomials C.sub.B.3 (x) must contain all the roots of g.sub.2.3 (x) in order to contain g.sub.2.3 (x) as a factor. Thus
C.sub.B.3 (.alpha..sup.13j)=C.sub.B.3 [(.alpha..sup.7).sup.4j ]=0 for j=1, 2, . . . , 6 (35)
and C.sub.B.3 (x) is derived from C.sub.B.2 (x) by a permutation of the (symbol) coefficients of C.sub.B.2 (x). The permutation of the symbols of the latter is
C.sub.[B.2]k .fwdarw.C.sub.[B.2]13k =C.sub.[B.3]k for k=0, 1, . . . , 14 (36)
where 13 k is reduced modulo 15. The permutation accounts for the substitution of .alpha..sup.7 for .alpha. (resulting in a change in primitive element) to obtain g.sub.2.3 (x) in Equation (34). Note that 13 (of 13 k in Equation (36) is the multiplicative inverse of 7 modulo 15.
Since (13,15)=1, 13 k modulo 15 is a permutation on the complete residue class k (0 1 . . . 14) modulo 15 as follows:
__________________________________________________________________________14 13 12 11 10 9 8 7 6 3 2 1 0 = k of C.sub.k 2 4 6 8 10 12 14 1 7 9 11 13 0 = 13k mod 15__________________________________________________________________________
EXAMPLE 12
Given codeword C.sub.B.2 from Example 11. The permutation C.sub.[B.2]13k yields codeword C.sub.B.3.
__________________________________________________________________________k of C.sub.k 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0__________________________________________________________________________C.sub.B.2 14 * * * * * * * * 5 8 5 13 3 4C.sub.B.3 * 3 * 13 * 5 * 8 * 5 * * 14 * 4__________________________________________________________________________
Consider the coefficient C.sub.1 =.alpha..sup.3 of x in codeword polynomial C.sub.B.2 (x). Due to the permutation, it becomes the coefficient C.sub.13 =.alpha..sup.3 of x.sup.13 in codeword polynomial C.sub.B.3 (x). From Equation (34)
.alpha..sup.13j =(.alpha..sup.7).sup.4j must be a root of C.sub.B.3 (x) for j=1, 2, . . . , 6
Evaluating the term .alpha..sup.3 x.sup.13 in C.sub.B.3 (x) for
x=.alpha..sup.13 =(.alpha..sup.7).sup.4 gives .alpha..sup.3 [(.alpha..sup.7).sup.4 ].sup.13 =.alpha..sup.3 .alpha..sup.4 =.alpha..sup.7
It will now be shown that the permutation preserves the evaluation of the foregoing term in C.sub.B.2 (x) for the root (.alpha..sup.7).sup.4. From (31a)
.alpha..sup.4j must be a root of C.sub.B.2 (x) for j=1, 2, . . . , 6
Evaluating the term .alpha..sup.3 x in C.sub.B.2 (x) for
x=.alpha..sup.4 gives .alpha..sup.3 .alpha..sup.4 =.alpha..sup.7
as asserted.
Consider the coefficient C.sub.3 =.alpha..sup.5 of x.sup.3 in C.sub.B.2 (x). The evaluation of the term .alpha..sup.5 x.sup.3 in C.sub.B.2 (x) for the root (.alpha..sup.4).sup.6 is
.alpha..sup.5 [(.alpha..sup.4).sup.6 ].sup.3 =.alpha..sup.5 [.alpha..sup.12 ]=.alpha..sup.2
The coefficient C.sub.3 =.alpha..sup.5 of x.sup.3 in C.sub.B.2 (x) becomes by permutation the coefficient C.sub.3.times.13 mod 15 (=C.sub.9) of x.sup.3.times.13 (=x.sup.9) in C.sub.B.3 (x). The evaluation of the term .alpha..sup.5 x.sup.3.times.13 in C.sub.B.3 (x) for the root [(.alpha..sup.7).sup.4)].sup.6 is
.alpha..sup.5 ([(.alpha..sup.7).sup.4 ].sup.6).sup.3.times.13 =.alpha..sup.5 [(.alpha..sup.4).sup.6 ].sup.3 =.alpha..sup.5 [.alpha..sup.12 ]=.alpha..sup.2
It may be further shown that
C.sub.B.3 [(.alpha..sup.7).sup.4j ]=C.sub.B.2 (.alpha..sup.4j)=0 for j=1, 2, . . . , 6
where
C.sub.13k mod 15 of C.sub.B.3 (x) equals C.sub.k of C.sub.B.2 (x) for k=0, 1, . . . , 14
The outcomes of successive transformations, thus far, on codeword (symbols) C.sub.B in Example 10 are:
__________________________________________________________________________k of C.sub.k 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0__________________________________________________________________________C.sub.B 7 0 0 0 0 0 0 0 0 7 A C 6 C AC.sub.B.1 0 * * * * * * * * 0 4 2 11 2 4C.sub.B.2 14 * * * * * * * * 5 8 5 13 3 4C.sub.B.3 * 3 * 13 * 5 * 8 * 5 * * 14 * 4__________________________________________________________________________
It may be verified that
C.sub.B.3 (x)=(.alpha..sup.3 x.sup.7 +.alpha..sup.13 x.sup.6 +.alpha..sup.12 x.sup.5 +.alpha..sup.14 x.sup.4 +.alpha..sup.13 x.sup.3 +.alpha..sup.13 x.sup.2 +.alpha..sup.10 x+.alpha.)g.sub.2.3 (x)
over GF(2.sup.4) defined by F.sub.B.3 (x) (=F.sub.B (x)). The generator polynomial g.sub.2.3 (x) is given in Equation (34). C.sub.B.3 in addition to C.sub.B.1 and C.sub.B.2 is associated with an encoder of the "conventional" type.
The fourth transformation is the one-to-one mapping of symbols in GF(2.sup.4) defined by F.sub.B (x) onto symbols in GF(2.sup.4) defined by F.sub.G (x). The mapping
.alpha..sup.i .fwdarw..beta..sup.7i
where
F.sub.B (.alpha.)=0 and F.sub.G (.beta.)=0
is discussed above under the heading "Mathematical Characterization of RS Symbols" and appears in TABLE III. By mapping the RS symbols comprising a codeword in Code B.3 the corresponding codeword in Code G is obtained.
The generator polynomials g.sub.2.3 (x) of C.sub.B.3 in (34) and g.sub.1 (x) of C.sub.G in Equation (19) reflect the foregoing mapping. ##EQU39##
As first introduced in (32) and (33) where the primitive element change was developed in preparation for the last transformation involving field element conversion
.alpha..sup.13j .fwdarw.(.beta..sup.7).sup.13j =.beta.hu 91j.tbd.j mod 15=.beta..sup.j
The mapping of coefficients .alpha..sup.i of x.sup.j to .beta..sup.7i of x.sup.j confirms the expanded form of g.sub.1 (x). ##EQU40## Note that g.sub.2.3 (x) and g.sub.1 (x) are codeword polynomials of C.sub.B.3 (x) and C.sub.G (x), respectively. The transformation (field element conversion) is applicable to every codeword polynomial in C.sub.B.3 (x). As discussed in the section on "Mathematical Characterization of RS Symbols," the mapping .alpha..sup.i .fwdarw..beta..sup.7 is realizable by table look-up or by employing the linear transformation matrix ##EQU41##
EXAMPLE 13
Mapping the RS symbols of C.sub.B.3 in this example in GF(2.sup.4) defined by F.sub.B (x) onto symbols in GF(2.sup.4) defined by F.sub.G (x) results in codeword C.sub.G. Codeword C.sub.G is the outcome of the fourth and last transformation in the following tabulation of successive transformations for mapping codeword C.sub.B in Example 10 to C.sub.G.
__________________________________________________________________________k of C.sub.k 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0__________________________________________________________________________C.sub.B 7 0 0 0 0 0 0 0 0 7 A C 6 C AC.sub.B.1 0 * * * * * * * * 0 4 2 11 2 4C.sub.B.2 14 * * * * * * * * 5 8 5 13 3 4C.sub.B.3 * 3 * 13 * 5 * 8 * 5 * * 14 * 4C.sub.G * 6 * 1 * 5 * 11 * 5 * * 8 * 13__________________________________________________________________________
The codeword polynomial C.sub.G (x) contains g.sub.1 (x) as a factor.
C.sub.G (x)=(.beta..sup.6 x.sup.7 +.beta.x.sup.6 +.beta..sup.9 x.sup.5 +.beta..sup.8 x.sup.4 +.beta.x.sup.3 +.beta..sup.2 +.beta..sup.10 x+.beta..sup.7)g.sub.1 (x)
over GF(2.sup.4) defined by F.sub.G (x).
The following are two examples of the results of a succession of transformations which map a given codeword in C.sub.B onto one in C.sub.G. These represent typical test cases for testing the overall transformation because of the known structure of C.sub.B or C.sub.G.
__________________________________________________________________________k of C.sub.k 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0__________________________________________________________________________C.sub.B D D D D D D D D D D D D D D DC.sub.B.1 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3C.sub.B.2 2 1 0 14 13 12 11 10 9 8 7 6 5 4 3C.sub.B.3 11 4 12 5 13 6 14 7 0 8 1 9 2 10 3C.sub.G 2 13 9 5 1 12 8 4 0 11 7 3 14 10 6__________________________________________________________________________
The 15 symbols of C.sub.G above (expressed as i of .beta..sup.i) are distinct.
__________________________________________________________________________k of C.sub.k 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0__________________________________________________________________________C.sub.B A A D 0 0 0 0 3 9 3 0 0 0 0 DC.sub.B.1 4 4 3 * * * * 5 1 5 * * * * 3C.sub.B.2 3 2 0 * * * * 12 7 10 * * * * 3C.sub.B.3 * * * * * * * * 0 10 2 7 3 12 3C.sub.G * * * * * * * * 0 10 14 4 6 9 6__________________________________________________________________________
The codeword polynomial C.sub.G (x) with coefficients C.sub.G above is g.sub.1 (x), a codeword polynomial (of lowest degree).
Given two codewords in any (N,K) RS code. Every linear combination of the codewords is a codeword. For each of the four transformations discussed in connection with (15,9) RS codes, the transformation of the linear combination of two codewords is equal to the "sum" of the transformations on the two codewords. This is illustrated for the overall transformation of codewords C.sub.B in Code B.1 to codewords C.sub.G with intermediate results omitted.
EXAMPLE 14
Codeword C.sub.B.sup.3 (below) is a linear combination of codewords C.sub.B.sup.1 and C.sub.B.sup.2. Codewords C.sub.G.sup.3, C.sub.G.sup.1 and C.sub.G.sup.2 are the result of four successive transformations on C.sub.B.sup.3, C.sub.B.sup.1 and C.sub.B.sup.2 respectively.
__________________________________________________________________________k of Ck 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0__________________________________________________________________________C.sub.B.sup.1 7 0 0 0 0 0 0 0 0 7 A C 6 C AC.sub.B.sup.2 0 7 0 0 0 0 0 0 0 A F 5 B 9 4C.sub.B.sup.3 7 7 0 0 0 0 0 0 0 D 5 9 5 EC.sub.G.sup.1 * 6 * 1 * 5 * 11 * 5 * * 8 * 13C.sub.G.sup.2 * 14 * 2 * 7 * 10 * 3 1 * * * 10C.sub.G.sup.3 * 8 * 5 * 13 * 14 * 11 1 * 8 * 9__________________________________________________________________________
Refer to Example 5 where RS symbols in GF(2.sup.4) defined by F.sub.G (x) are tabulated to verify that the symbol-by-symbol "addition" of C.sub.G.sup.1 and C.sub.G.sup.2 gives C.sub.G.sup.3.
A received word R.sub.B which may contain erroneous symbols may be viewed as a symbol-by-symbol "sum" of C.sub.B with a symbol error pattern or sequence.
R.sub.k =C.sub.k +E.sub.k for k=0, 1, . . . , 14
where R.sub.k =C.sub.k if and only if E.sub.k is an all O's symbol.
Note that E.sub.k is not to be confused with E, an integer which denotes the maximum number of erroneous RS symbols that are correctable. If the number of erroneous symbols is within the error correction capability R.sub.G will be corrected by the decoder designed for Code G. Clearly R.sub.G is the result of four successive transformations on the linear combination corresponding symbols comprising C.sub.B and a symbol error sequence. The decoder determines the transformed error sequence and "subtracts" it from R.sub.G to determine C.sub.G. The inverses of the successive transformations (which were applied to R.sub.B to determine R.sub.G) are successively applied to C.sub.G in reverse order to recover C.sub.B. Clearly R.sub.B (x), intermediate word polynomials and R.sub.G (x) will not be divisible by their respective generator polynomials.
The inverses of transformations in order of their application on codewords C.sub.G are summarized as follows:
1). Field element conversion inverse.
.beta..sup.7i .fwdarw..alpha..sup.i or (.beta..sup.7).sup.13i =.beta..sup.i .fwdarw..alpha..sup.13i
Coefficients of codeword polynomials C.sub.G (x) in GF(2.sup.4) defined by F.sub.G (x) are mapped into corresponding coefficients of codeword polynomials C.sub.B.3 (x) in GF(2.sup.4) defined by F.sub.B (x). See TABLE III. This is achieved by table look-up or employing the linear transformation matrix (as discussed in the section on "Mathematical Characterization of RS Symbols.") ##EQU42## and M.sub..beta..alpha. is the inverse of M.sub..alpha..beta. associated with field element conversion.
2). Permutation Inverse
A primitive element change from .alpha..sup.13 (resulting from field element conversion inverse .beta..fwdarw..alpha..sup.13) to .alpha..sup.4 is required. The solution to
(.alpha..sup.w).sup.13 =.alpha..sup.4 or 13w.tbd.4 mod 15
is w=13 the inverse of y=7 in Equation (32). The respective generator polynomials for Codes G, B.3, B.2, B.1 and B are fixed. In the reverse applications of inverse transformations, codeword polynomials C.sub.B.2 (x) must contain all the roots of g.sub.2.2 (x) in order to contain g.sub.2.2 (x) as a factor. Thus
C.sub.B.2 (.alpha..sup.4j)=C.sub.B.2 [(.alpha..sup.13).sup.13j ]=0 for j=1, 2, . . . , 6
and C.sub.B.2 (x) is derived from C.sub.B.3 (x) by the following permutation of the coefficients of C.sub.B.3 (x).
C.sub.[B.3]k .fwdarw.C.sub.[B.3]7k =C.sub.[B.2]k for k=0, 1, . . . , 14
where 7 k is reduced modulo 15. The foregoing arguments follow those that resulted in expressions (34), (35) and (36). The permutation 13 k in (36) subsequently followed by its inverse
k.fwdarw.13k.fwdarw.13(7)k mod 15=k
returns the symbols of C.sub.B.2 (i.e., symbols of R.sub.B.2 corrected) to their original position.
3). Translation of the Powers of Roots (of g.sub.2.2 (x)) Inverse
Of interest is the effect of the inverse translation of the powers of roots of g.sub.2.2 (x). Given ##EQU43## and C.sub.B.2 (.alpha..sup.14 x) is a Code B.1 codeword polynomial. 4). Conversion from {.alpha..sup.i } Basis to {l.sub.j } Basis
See TABLE IV. This can be done by table look-up or by using the linear transformation matrix ##EQU44## T.sub..alpha.l is the inverse of ##EQU45##
EXAMPLE 15
R.sub.B is a received word originating from Code B with erroneous symbols. Successive transformations are applied to obtain R.sub.G. R.sub.G is decoded whereby erroneous symbols are corrected to determine C.sub.G a valid codeword in Code G. Successive inverse transformations are then applied to C.sub.G to recover C.sub.B, the codeword in Code B most likely to have been sent.
Symbols R.sub.14, R.sub.5 and R.sub.2 in word R.sub.B are in error. Since three erroneous symbols are within the symbol error-correcting capability (i.e., 2E=15-9 and E=3), they are corrected when R.sub.G is decoded into C.sub.G. Italicized entries in the following table are symbol changes resulting from the decoding process.
__________________________________________________________________________k of C.sub.k 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0__________________________________________________________________________R.sub.B D 3 F 6 9 D 2 E 5 7 2 C 9 2 FR.sub.B.1 3 5 6 11 1 3 7 12 13 0 7 2 1 7 6R.sub.B.2 2 3 3 7 11 12 0 4 4 5 11 5 3 8 6R.sub.B.3 0 8 12 3 11 5 7 11 3 5 3 4 2 4 6R.sub.G 0 11 9 6 2 5 4 2 6 5 6 13 14 13 12C.sub.G 0 11 9 2 2 5 4 2 6 13 6 13 6 13 12C.sub.B.3 0 8 12 11 11 5 7 11 3 4 3 4 3 4 6C.sub.B.2 3 3 3 7 11 12 0 4 4 4 11 5 11 8 6C.sub.B.1 4 5 6 11 1 3 7 12 13 14 7 2 9 7 6C.sub.B A 3 F 6 9 D 2 E 5 1 2 C B 2 F__________________________________________________________________________
The Transformational Equivalence of Berlekamp and Conventional RS Codes for (N,K)=(255,223)
A hardware ground decoder has been designed and built and is operating to decode a (255,223) RS code. The code is associated with a conventional encoder aboard the in-flight interplanetary Galileo and Voyager spacecraft. All future interplanetary space probes, starting with Mars Observer, that utilize RS encoding must use the Berlekamp representation detailed in "Telemetry Channel Coding" Recommendation, CCSDS 101.0-B-2 Blue Book, Consultive Committee for Space Data Systems, January 1987. A succession of transformations and their inverses have been developed, programmed and incorporated into the system hardware. Words originating from Code B are mapped (by means of successive transformations) onto words in Code G, and decoded for symbol error correction. If the number of erroneous symbols are within the error correction capability of the code, the decoded word is a codeword in Code G. It is then mapped (by means of successive inverse transformations applied in reverse order) onto the codeword in Code B most likely to have been transmitted. The parameters of the codes are J=8 and E=16.
FIGS. 4a, b, c and d illustrate a flow chart of the process for transforming words R.sub.B with possible errors in a Berlekamp code to words R.sub.G in a conventional code for decoding the words R.sub.G having possible errors to codewords C.sub.G free of error. That is accomplished in blocks 100, 110, 120, 130, 140 and 150 in FIGS. 4a and b. The corrected codewords C.sub.G are then reverse transformed symbol-by-symbol back into codewords C.sub.B in the Berlekamp code. The uncorrected words in the Berlekamp code and the conventional code are here denoted by the letter R with subscripts B and G, respectively, because they are with possible error. Until corrected in block 150, FIG. 4b, they are not denoted codewords by the letter C with first the subscript G and later in the process the subscript B. The codewords C.sub.G are not information, because in the process of transformation from R.sub.B to R.sub.G for decoding (i.e., correcting errors) they have undergone permutation. To retrieve the information, the codewords C.sub.G must be transformed back into codewords C.sub.B by inverse transformation in a reverse order of process steps, as will be illustrated by the following examples.
A mathematical description of each of the (255,223) RS codes is presented as follows: ##EQU46## Elements in GF(2.sup.8) defined by F.sub.B (x) in Equation (37) represented in basis {.alpha..sup.i } and basis {l.sub.j } appear in TABLE V.
TABLE V______________________________________Elements of GF(2.sup.8) Defined by F.sub.B (x) = x.sup.8 +x.sup.7 + x.sup.2 + x + 1 in Basis {.alpha..sup.i } and Basis {l.sub.j}.i of .alpha..sup.i i of b.sub.i Tr(.alpha..sup.i) j of v.sub.j______________________________________ 76543210 01234567* 00000000 0 000000000 00000001 0 011110111 00000010 1 101011112 00000100 1 100110013 00001000 1 111110104 00010000 1 100001105 00100000 1 111011006 01000000 1 111011117 10000000 1 100011018 10000111 1 110000009 10001001 0 0000110010 10010101 1 1110100111 10101101 0 0111100112 11011101 1 1111110013 00111101 0 0111001014 01111010 1 1101000015 11110100 1 1001000116 01101111 1 1011010017 11011110 0 0010100018 00111011 0 0100010019 01110110 1 1011001120 11101100 1 1110110121 01011111 1 1101111022 10111110 0 0010101123 11111011 0 0010011024 01110001 1 1111111025 11100010 0 0010000126 01000011 0 0011101127 10000110 1 1011101128 10001011 1 1010001129 10010001 0 0111000030 10100101 1 1000001131 11001101 0 0111101032 00011101 1 1001111033 00111010 0 0011111134 01110100 0 0001110035 11101000 0 0111010036 01010111 0 0010010037 10101110 1 1010110138 11011011 1 1100101039 00110001 0 0001000140 01100010 1 1010110041 11000100 1 1111101142 00001111 1 1011011143 00011110 0 0100101044 00111100 0 0000100145 01111000 0 0111111146 11110000 0 00001000(l.sub.4)47 01100111 0 0100111048 11001110 1 1010111049 00011011 1 1010100050 00110110 0 0101110051 01101100 0 0110000052 11011000 0 0001111053 00110111 0 0010011154 01101110 1 1100111155 11011100 1 1000011156 00111111 1 1101110157 01111110 0 0100100158 11111100 0 0110101159 01111111 0 0011001060 11111110 1 1100010061 01111011 1 1010101162 11110110 0 0011111063 01101011 0 0010110164 11010110 1 1101001065 00101011 1 1100001066 01010110 0 0101111167 10101100 0 00000010(l.sub.6)68 11011111 0 0101001169 00111001 1 1110101170 01110010 0 0010101071 11100100 0 0001011172 01001111 0 0101100073 10011110 1 1100011174 10111011 1 1100100175 11110001 0 0111001176 01100101 1 1110000177 11001010 0 0011011178 00010011 0 0101001079 00100110 1 1101101080 01001100 1 1000110081 10011000 1 1111000182 10110111 1 1010101083 11101001 0 0000111184 01010101 1 1000101185 10101010 0 0011010086 11010011 0 0011000087 00100001 1 1001011188 01000010 0 01000000(l.sub.1)89 10000100 0 0001010090 10001111 0 0011101091 10011001 1 1000101092 10110101 0 0000010193 11101101 1 1001011094 01011101 0 0111000195 10111010 1 1011001096 11110011 1 1101110097 01100001 0 0111100098 11000010 1 1100110199 00000011 1 11010100100 00000110 0 00110110101 00001100 0 01100011102 00011000 0 01111100103 00110000 0 01101010104 01100000 0 00000011105 11000000 0 01100010106 00000111 0 01001101107 00001110 1 11001100108 00011100 1 11100101109 00111000 1 10010000110 01110000 1 10000101111 11100000 1 10001110112 01000111 1 10100010113 10001110 0 01000001114 10011011 0 00100101115 10110001 1 10011100116 11100101 0 01101100117 01001101 1 11110111118 1011010 0 01011110119 10110011 0 00110011120 11100001 1 11110101121 01000101 0 00001101122 10001010 1 11011000123 10010011 1 11011111124 10100001 0 00011010125 11000101 1 10000000(l.sub.0)126 00001101 0 00011000127 00011010 1 11010011128 00110100 1 11110011129 01101000 1 11111001130 11010000 1 11100100131 00100111 1 10100001132 01001110 0 00100011133 10011100 0 01101000134 10111111 0 01010000135 11111001 1 10001001136 01110101 0 01100111137 11101010 1 11011011138 01010011 1 10111101139 10100110 0 01010111140 11001011 0 01001100141 00010001 1 11111101142 00100010 0 01000011143 01000100 0 01110110144 10001000 0 01110111145 10010111 0 01000110146 10101001 1 11100000147 11010101 0 00000110148 00101101 1 11110100149 01011010 0 00111100150 10110100 0 01111110151 11101111 0 00111001152 01011001 1 11101000153 10110010 0 01001000154 11100011 0 01011010155 01000001 1 10010100156 10000010 0 00100010157 10000011 0 01011001158 10000001 1 11110110159 10000101 0 01101111160 10001101 1 10010101161 10011101 0 00010011162 10111101 1 11111111163 11111101 0 00010000(l.sub.3)164 01111101 1 10011101165 11111010 0 01011101166 01110011 0 01010001167 11100110 1 10111000168 01001011 1 11000001169 10010110 0 00111101170 10101011 0 01001111171 11010001 1 10011111172 00100101 0 00001110173 01001010 1 10111010174 10010100 1 10010010175 10101111 1 11010110176 11011001 0 01100101177 00110101 1 10001000178 01101010 0 01010110179 11010100 0 01111101180 00101111 0 01011011181 01011110 1 10100101182 10111100 1 10000100183 iiiiiiii 1 10111111184 01111001 0 00000100(l.sub.5)185 11110010 1 10100111186 01100011 1 11010111187 11000110 0 01010100188 00001011 0 00101110189 00010110 1 10110000190 00101100 1 10001111191 01011000 1 10010011192 10110000 1 11100111193 11100111 1 11000011194 01001001 0 01101110195 10010010 1 10100100196 10100011 1 10110101197 11000001 0 00011001198 00000101 1 11100010199 00001010 0 01010101200 00010100 0 00011111201 00101000 0 00010110202 01010000 0 01101001203 10100000 0 01100001204 11000111 0 00101111205 00001001 I 10000001206 00010010 0 00101001207 00100100 0 01110101208 01001000 0 00010101209 10010000 0 00001011210 10100111 0 00101100211 11001001 1 11100011212 00010101 0 01010100213 00101010 1 10111001214 01010100 1 11110000215 10101000 1 10011011216 11010111 1 10101001217 00101001 0 01101101218 01010010 1 11000110219 10100100 1 11111000220 11001111 1 11010101221 00011001 0 00000111222 00110010 1 11000101223 01100100 1 10011010224 11001000 1 10011000225 00010111 1 11001011226 00101110 0 00100000(l.sub.2)227 01011100 0 00001010228 10111000 0 000111012.about.9 11110111 0 01000101230 01101001 1 10000010231 11010010 0 01001011232 00100011 0 00111000233 01000110 1 11011001234 10001100 1 11101110235 10011111 1 10111100236 10111001 0 01100110237 11110101 1 11101010238 01101101 0 00011011239 11011010 1 10110001240 00110011 1 10111110241 01100110 0 00110101242 11001100 0 00000001(l.sub.7)243 00011111 0 00110001244 00111110 1 10100110245 01111100 1 11100110246 11111000 1 11110010247 01110111 1 11001000248 11101110 0 01000010249 01011011 0 01000111250 10110110 1 11010001251 11101011 1 10100000252 01010001 0 00010010253 10100010 1 11001110254 11000011 1 10110110______________________________________
The coefficients (G.sub.32, G.sub.31, . . . , G.sub.0) of g.sub.2 (x) in Equation (38), the self-reciprocal generator polynomial over GF(2.sup.8) of Code B are
__________________________________________________________________________G.sub.32 .fwdarw. 0 249 59 66 4 43 126 251 97 30 3 213 50 66 170 5 24 5 170 66 50 213 3 30 97 251 126 43 4 66 59 249 0 .rarw. G.sub.0__________________________________________________________________________
expressed as i of .alpha..sup.i in TABLE V. Note that are 15 distinct nonzero entries and
G.sub.i =G.sub.32-i and G.sub.3 =G.sub.29 =G.sub.13 =G.sub.19 =66 (i.e., .alpha..sup.66)
(The {T.sub.l } linear functions of z.sub.i components for designing the linear binary matrix in FIG. 2 can be found in Ref. [3]).
2. Code G
F.sub.G (x)=x.sup.8 +x.sup.4 +x.sup.3 +x.sup.2 +1 defines GF(2.sup.8)
where .beta..sup.8 =.beta..sup.4 +.beta..sup.3 +.beta..sup.2 +1 ##EQU47## Elements in GF(2.sup.8) defined by F.sub.G (x) in (41) are given in TABLE VI. The coefficients (G.sub.32, G.sub.31, . . . , G.sub.0) of g.sub.1 (x) in (41), the generator polynomial over GF(2.sup.8) of Code G are
__________________________________________________________________________G.sub.32 .fwdarw. 0 11 8 109 194 254 173 11 75 218 148 149 44 0 137 104 43 137 203 99 176 59 91 194 84 53 248 107 80 28 215 251 18 .rarw. G.sub.0__________________________________________________________________________
expressed as i of .beta..sup.i in TABLE VI. Note that there 28 distinct nonzero entries corresponding to 28 different multipliers.
Transformations between Berlekamp and Galileo (Voyager) (255,223) RS codes are summarized as follows:
1). Conversion from {l.sub.j } Basis and {.alpha..sup.i } Basis (Block 110) and its Inverse (Block 190).
Refer to TABLE V. Symbol-by-symbol conversion may be provided by table look-up. Also post-multiplication on the 8-bit binary vector representation of a symbol by the linear transformation matrix T.sub.l.alpha. realizes the conversion. The transformation matrix and its inverse is derived from TABLE V.
TABLE VI______________________________________Elements in GF(2.sup.8) Defined byF.sub.G (x) = x.sup.8 + x.sup.4 + x.sup.3 + x.sup.2 + 1. i of .beta..sup.i i of c.sub.i______________________________________ 76543210 * 00000000 0 00000001 1 00000010 2 00000100 3 00001000 4 00010000 5 00100000 6 01000000 7 10000000 8 00011101 9 00111010 10 01110100 11 11101000 12 11001101 13 10000111 14 00010011 15 00100110 16 01001100 17 10011000 18 00101101 19 01011010 20 10110100 21 01110101 22 11101010 23 11001001 24 10001111 25 00000011 26 00000110 27 00001100 28 00011000 29 00110000 30 01100000 31 11000000 32 10011101 33 00100111 34 01001110 35 10011100 36 00100101 37 01001010 38 10010100 39 00110101 40 01101010 41 11010100 42 10110101 43 01110111 44 11101110 45 11000001 46 10011111 47 00100011 48 01000110 49 10001100 50 00000101 51 00001010 52 00010100 53 00101000 54 01010000 55 10100000 56 01011101 57 10111010 58 01101001 59 11010010 60 10111001 61 01101111 62 11011110 63 10100001 64 01011111 65 10111110 66 01100001 67 11000010 68 10011001 69 00101111 70 01011110 71 10111100 72 01100101 73 11001010 74 10001001 75 00001111 76 00011110 77 00111100 78 01111000 79 11110000 80 11111101 81 11100111 82 11010011 83 10111011 84 01101011 85 11010110 86 10110001 87 01111111 88 11111110 89 11100001 90 11011111 91 10100011 92 01011011 93 10110110 94 01110001 95 11100010 96 11011001 97 10101111 98 01000011 99 10000110 100 00010001 101 00100010 102 01000100 103 10001000 104 00001101 105 00011010 106 00110100 107 01101000 108 11010000 109 10111101 110 01100111 111 11001110 112 10000001 113 00011111 114 00111110 115 01111100 116 11111000 117 11101101 118 11000111 119 10010011 120 00111011 121 01110110 122 11101100 123 11000101 124 10010111 125 00110011 126 01100110 127 11001100 128 10000101 129 00010111 130 00101110 131 01011100 132 10111000 133 01101101 134 11011010 135 10101001 136 01001111 137 10011110 138 00100001 139 01000010 140 10000100 141 00010101 142 00101010 143 01010100 144 10101000 145 01001101 146 10011010 147 00101001 148 01010010 149 10100100 150 01010101 151 10101010 152 01001001 153 10010010 154 00111001 155 01110010 156 11100100 157 11010101 158 10110111 159 01110011 160 11100110 161 11010001 162 10111111 163 01100011 164 11000110 165 10010001 166 00111111 167 01111110 168 11111100 169 11100101 170 11010111 171 10110011 172 01111011 173 11110110 174 11110001 175 11111111 176 11100011 177 11011011 178 10101011 179 01001011 180 10010110 181 00110001 182 01100010 183 11000100 184 10010101 185 00110111 186 01101110 187 11011100 188 10100101 189 01010111 190 10101110 191 01000001 192 10000010 193 00011001 194 00110010 195 01100100 196 11001000 197 10001101 198 00000111 199 00001110 200 00011100 201 00111000 202 01110000 203 11100000 204 11011101 205 10100111 206 01010011 207 10100110 208 01010001 209 10100010 210 01011001 211 10110010 212 01111001 213 11110010 214 11111001 215 11101111 216 11000011 217 10011011 218 00101011 219 01010110 220 10101100 221 01000101 222 10001010 223 00001001 224 00010010 225 00100100 226 01001000 227 10010000 228 00111101 229 01111010 230 11110100 231 11110101 232 11110111 233 11110011 234 11111011 235 11101011 236 11001011 237 10001011 238 00001011 239 00010110 240 00101100 241 01011000 242 10110000 243 01111101 244 11111010 245 11101001 246 11001111 247 10000011 248 00011011 249 00110110 250 01101100 251 11011000 252 10101101 253 01000111 254 10001110______________________________________ ##EQU48##
Table look-up can provide the inverse transformation or ##EQU49## 2). Translation of Powers of Roots in g.sub.2.1 (x) (Block 120) and its Inverse (Block 180).
The degree 32 generator polynomial g.sub.2.1 (x)=g.sub.2 (x) as given in (38). Translating j running from 112 to 143 in the product summation form to run from 1 to 32 requires a change in the argument x. See Ref. [12] and the discussion in Section 5.A. (dealing with (15,9) RS codes) leading to Example 11 and subsequent expressions involving the effect of the inverse translation. Omitting the step-by-step derivation of g.sub.2.2 (x) from g.sub.2.1 (x) and codeword polynomial C.sub.B.2 (x) from C.sub.B.1 (x) the results over GF(2.sup.8) defined by F.sub.B (x) are ##EQU50## The coefficients (G.sub.32, G.sub.31, . . . , G.sub.0) of g.sub.2.2 (x) in (42), the generator polynomial over GF(2.sup.8) of Code B.2 are T2 -G.sub.32 .fwdarw.? 0 48 167 228 220 58 195 119 19 63 3 ? - 42 188 3 161 50 123 158 122 72 110 72 - 171 252 118 71 0 226 241 102 149 138 198 .rarw. G.sub.0? -
expressed as i of .alpha..sup.i in TABLE V.
Following are the results associated with the inverse translation: ##EQU51## 3). Permutation (Block 130) and its Inverse (Block 170) which Accounts for a Primitive Element Change
In preparation for converting field elements defined by F.sub.B (x) to those defined by F.sub.G (x) an isomorphism between the two representations of GF(2.sup.8) must be established. See Section 2. and Ref. [2]. It may be verified from TABLES V and VI that the one-to-one mapping
.alpha..sup.i .revreaction..beta..sup.-43i =.beta..sup.212i
is an isomorphism. The elements .alpha. and .beta..sup.212 have the same minimal polynomial, namely, F.sub.B (x). Also
.alpha..sup.83 .fwdarw.(.beta..sup.212).sup.83 =.beta. since 212.times.83.tbd.1 mod 255
A primitive element change in (42) from .alpha..sup.11 to .alpha..sup.83 is needed prior to field element conversion. The unique solution to
(.alpha..sup.y).sup.11 =.alpha..sup.83 or 11y.tbd.83 mod 255
is
y=193
and the inverse of y is 37 (i.e., 193.times.37.tbd.1). The primitive element change in (42) corresponds to g.sub.2.2 (x) becoming ##EQU52## In order for C.sub.B.3 (x) to contain g.sub.2.3 (x) as a factor, the coefficients of C.sub.B.3 (x) is a permutation of the coefficients of C.sub.B.2 (x). That is
C.sub.[B.2]k .fwdarw.C.sub.[B.2]37k =C.sub.[B.3]k for k=0, 1, . . . , 254 (47)
Since 37 (the inverse of 193) has no common factor with 255 (=3.times.5.times.17) the permutation in (47) is guaranteed (i.e., no two coefficients will map to the same position).
Similarly the inverse permutation is associated with the change of primitive element from
.alpha..sup.83 to (.alpha..sup.37).sup.83 =.alpha..sup.11
The coefficients of C.sub.B.2 (x) is the following permutation of the coefficients of C.sub.B.2 (x)
C.sub.[B.3]k .fwdarw.C.sub.[B.3]193k =C.sub.[B.2]k for k=0, 1, . . . , 254 (48)
The coefficients (G.sub.32, G.sub.31, . . . , G.sub.0) of g.sub.2.3 (x) in (46), the generator polynomial over GF(2.sup.8) of Code B.3 are
__________________________________________________________________________G.sub.32 .fwdarw. 0 148 154 122 37 172 79 148 105 244 44 127 82 0 151 217 254 151 19 57 73 52 158 37 87 64 184 211 10 29 250 178 219 .rarw. G.sub.0__________________________________________________________________________
expressed as i of .alpha..sup.i in TABLE V.
4). Field Element Conversion (Block 140) and its Inverse (Block 160).
Coefficients of codeword polynomials C.sub.B.3 (x) (including g.sub.2.3 (x), a codeword polynomial of minimum degree) in GF(2.sup.8) defined by F.sub.B (x) are mapped into corresponding coefficients of codeword polynomials C.sub.G (x). The one-to-one mapping
.alpha..sup.i .fwdarw..beta..sup.212i
is achievable by table look-up. The conversion can also be done by the linear matrix equation ##EQU53##
The inverse field element transformation is the symbol-by-symbol mapping from GF(2.sup.8) defined by F.sub.G (x) to GF(2.sup.8) defined by F.sub.B (x) the symbols to be mapped are decoded word symbols emanating from the ground decoder. The one-to-one mapping is
.beta..sup.212i .fwdarw..alpha..sup.i or (.beta..sup.212i).sup.83 .fwdarw.(.alpha..sup.i).sup.83 =.beta..sup.i .fwdarw..alpha..sup.83i
Mapping can be done by table look-up or by means of the linear matrix equation ##EQU54## It should be again noted that because of the linearity of the RS codes and the transformations the symbols of a word originating from Code B are
R.sub.k =C.sub.k +E.sub.k for k=0, 1, . . . , 254
and R.sub.k is a linear sum is transformed until the word R.sub.G is obtained. Upon decoding R.sub.G, C.sub.G is obtained if the number of erroneous symbols is within the error correction capability of the (255,223) RS code. See Example 15. Symbols in error remain in error after successive forward transformations even if the number of erroneous symbols exceed the error correction capability of the RS code.
Although specific examples have been given of the transformation of the (Berlekamp) code, C.sub.B, to a specific conventional code, C.sub.G, it should be appreciated that the invention is useful in transforming any (N,K) RS code over GF(2.sup.J) to another (N,K) RS code over GF(2.sup.J). This RS coding for error protection has wide applications in communication channels (from here to there) and storage devices (from now until then), for example, magnetic disc or tape, optical disc, and solid-stage memories.
Claims
  • 1. A process for realizing mappings between codewords of two distinct (N,K) Reed-Solomon codes over GF(2.sup.J) having selected two independent parameters: J, specifying the number of bits per symbol; and E, the symbol error correction capability of the code, wherein said independent parameters J and E yield the following: N=2.sup.J -1, total number of symbols per codeword; 2E, the number of symbols assigned a role of check symbols; and K=N-2E, the number of code symbols representing information, all within a codeword of an (N,K) RS code over GF(2.sup.J), and having selected said parameters for encoding, the implementation of a decoder are governed by: 2.sup.J field elements defined by a degree J primitive polynomial over GF(2) denoted by F(x); a code generator polynomial of degree 2E containing 2E consecutive roots of a primitive element defined by F(x); and, in a Berlekamp RS code, the basis in which the RS information and check symbols are represented, said process comprising the sequential steps of:
  • first, symbol-by-symbol conversion due to root power translation of words R.sub.B.1 of a first RS code B to words R.sub.B.2,
  • second, permutation of symbols of words R.sub.B.2 to yield words R.sub.B.3,
  • third, symbol-by-symbol conversion of words R.sub.B.3 to words R.sub.G of a second RS code G,
  • fourth, decoding words R.sub.G by correcting erroneous symbols in words R.sub.G using check symbols of each of said words R.sub.G for the information symbols in each word R.sub.G to obtain corrected words C.sub.G, and
  • fifth, transformation of said corrected words C.sub.G back to said code B by the inverse of said third, second and first steps in that reverse sequence to convert codewords C.sub.G to codeword C.sub.B.3, to permute codewords C.sub.B.3 to yield codewords C.sub.B.2, and symbol-by-symbol conversion due to root power translation to convert codewords C.sub.B.2 to codewords C.sub.B.1.
  • 2. A process as defined in claim 1 wherein said words R.sub.B.1 of said first code B are defined by a function F(x) wherein said RS symbols are represented in another representation using a parameter .lambda. for a field element where 1, .lambda., .lambda..sup.2, . . . , .lambda..sup.r-1 is a basis in GF(2.sup.r), and said process includes an initial step of converting symbol-to-symbol words C.sub.B of a first basis to said words R.sub.B of a second basis and a final step of said reverse sequence of steps for symbol-to-symbol conversion from said second basis to said first basis of representation using said parameter .lambda..
US Referenced Citations (4)
Number Name Date Kind
3988677 Fletcher et al. Oct 1976
4782490 Tenengoltz Nov 1988
4843607 Tong Jun 1989
4907233 Deutsch et al. Mar 1990
Non-Patent Literature Citations (6)
Entry
Solomon W. Golomb, "Theory of Transformation Groups of Polynomials over GF(2) with Applications to Linear Shift Register Sequences," American Elsevier Publishing Company, Inc., 1968, pp. 87-109.
Wesley Peterson, "Error-Correcting Codes," The M.I.T. Press and John Wiley & Sons, Inc., publishers, 1961, pp. 251-254.
M. Perlman and J. Lee, "Reed-Solomon Encoders--Conventional vs Berlekamp's Architecture," JPL Publication 82-71, Dec. 1, 1982.
E. R. Berlekamp, "Bit-Serial Reed-Solomon Encoders," IEEE Transactions on Information Theory, vol. IT 28, No. 6, pp. 869-874, Nov. 1982.
R. Miller and L. Deutsch, "Conceptual Design for a Universal Reed-Solomon Decoder," IEEE Transactions on Communications, vol. Com-29, No. 11, pp. 1721-1722, Nov. 1981.
"Telemetry Channel Coding," Recommendation for Space Data System Standards, CCSDS 101.0-B-2, Blue Book, Consultative Committee for Space Data Systems, Jan. 1987.