BACKGROUND OF THE INVENTION
The invention relates to data coding, and particularly to data coding for achieving bit and byte synchronization using a single data field.
Bit synchronization refers to the synchronization of a clock for receiving or reading incoming data with the data being received or read. Normally, bit synchronization is achieved when a field of, say, 1s (ones), is written as the data is stored (or transmitted) in a partial-response, maximum-likelihood sequence (“PRML”) channel, and it is sampled using an acquisition loop. In a PRML channel, byte synchronization refers to a field with a data pattern in the data that marks the first bit of a symbol. For byte synchronization, this field is followed by a pattern that, when recognized, determines the start of data. Thus, data can be sampled and the information retrieved in the usual form.
As pointed out in U.S. Pat. No. 6,089,749, the conventional byte synchronization approach has the disadvantage of a long synchronization pattern, with a significant possibility of synchronization failure. The '749 patent proposes a byte synchronization scheme using a byte synchronization pattern between 16 and 18 bits in length.
Our purpose is to unify both the bit synchronization and byte synchronization fields into a single field and achieve bit and byte synchronization simultaneously using the single field (“bit-byte synchronization”). The idea is that the new field is short, allowing for significant savings in magnetic disk real estate. Alternatively, the new field can be used in a hybrid way. In order to combat events like thermal asperity (TA) that wipes out a whole synchronization field, a dual synchronization architecture has been proposed: the bit-byte synchronization field is repeated twice, so if the first bit-byte synchronization field is wiped out, then the system relies on the second one to achieve synchronization. One of the problems associated with TA is loss of both bit and byte synchronization. For that reason, it would be useful to have a synchronization field that recovers bit and byte synchronization simultaneously. Such a capability is disclosed in the following specification.
SUMMARY OF THE INVENTION
This invention combines bit and byte synchronization into a single data field u. A data string x has pre-pended to it a short string of 1s (ones), followed by u to yield a string y= . . . 1111, u, x. The string y is normally precoded by convolving it with 1/(1⊕D2), where the symbol ⊕ denotes modulo 2 addition and the operator D denotes a delay of one, D2 a delay of 2, etc. Thus, for a string x0,x1,x2,x3 . . . then (1⊕D2)(x0,x1,x2,x3 . . . ) denotes the string:
- x0,x1,x0⊕x2,x1⊕x3,x2⊕x4 . . .
The operation 1/(1⊕D2) denotes the inverse of 1⊕D2. PRML-sampling of y starts at an initial phase, and vectors are obtained from that string by sampling at pre-selected phases following the initial sampling point. The vectors of y are compared with vectors corresponding to PRML samples of an initial set of bits in u obtained at predetermined phases. The pair of y, u vectors exhibiting the minimum Euclidian distance yields a sampling correction value by which the initial sampling phase is corrected and a new initial sampling point preceding x is determined. Here, bit and byte synchronization have been achieved and sampling of x proceeds at the corrected phase, from the new initial sampling point.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1A is a partially schematic diagram of a magnetic disk with tracks and sectors in which data is stored. FIG. 1B is a diagram showing a prior art format of data stored on the disk with separate fields for bit and byte synchronization patterns.
FIG. 2 is a diagram showing data stored on the disk with a single field for a bit-byte synchronization pattern.
FIG. 3 is a block diagram of a data transmission system in which the method of the invention is executed.
FIG. 4 is a flow diagram illustrating a first embodiment of the method of the invention.
FIG. 5 is a flow diagram illustrating a second embodiment of the method of the invention.
FIG. 6 is a flow diagram illustrating a third embodiment of the method of the invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Refer to FIGS. 1A and 1B in which a storage disk 100 has data stored on at least one surface 110 in a plurality of tracks (one of which is indicated by 112), each of which is divided into a plurality of sectors (one of which is indicated by 114). Previously, data sectors stored as shown in FIG. 1A had the format illustrated in FIG. 1B. In FIG. 1B, a data sector 120 has a data section 121 with data and a header section 122 with separate fields 123 and 124. The field 123 holds a bit synchronization pattern and the data field 124 holds a byte synchronization pattern. The invention is represented by the data string format of FIG. 2 where a data sector 130 has a data section 131 with data and a header section 132 with a single field 133 holding a single synchronization pattern for bit-byte synchronization.
In the discussion that follows, a 20-bit bit-byte synchronization pattern is set forth to illustrate certain principles. However, it will be clear to those skilled in the art that the ideas and algorithms to be presented can be adapted to a bit-byte synchronization pattern of any size.
The bit-byte synchronization pattern is preceded by a sufficient number of is such that sampling starts before the pattern is encountered. The exemplary 20-bit bit-byte synchronization pattern is:
u=(10110111111011011111) (1)
The string . . . 1111, u, x is transmitted, where x is the data. Sampling of the string starts at any moment prior to u. The idea is that once u is read, both byte synchronization and very close bit-synchronization have been achieved.
The method of bit-byte synchronization proceeds as follows. Consider the string y=. . . 1111, u, x, with u and x as described above. The first step is to precode y by convolving it with 1/(1⊕D2), where ⊕ denotes modulo-2 addition. This precoded string is then sampled at an initial unknown point f using PRML. In a noiseless environment, when the first 16 bits of u, are sampled, i.e., (1011011111101101), at phases 0, 0.125, 0.25, 0.375, 0.5, 0.625, 0.75 and 0.875 respectively using PRML, the following 8 vectors are obtained (notice that precoding makes the samples of u0 below coincide in absolute value with the first 16 bits of u):
Consider m=min{d(ui, uj), 0≦i≦j≦7}, where d(ui, uj) denotes the Euclidean distance between ui and uj. The 16-bit vector (1011011111101101) was chosen in such a way that it maximizes m. Of course other choices are possible, but this vector is the one that gives the best results with the algorithms for bit-byte synchronization to be described next. However, this is only a preferred embodiment and several others are obvious to those skilled in the art.
FIG. 3 illustrates a data transmission system in which the invention may be practiced. In this regard, a data transmission system is one that communicates encoded data between two entities. The data transmission system may be, for example, a broadcast or guided wire telecommunication system. Preferably, the system is a component of a disk drive in which data is prepared for storage, stored on one or more magnetic disks, retrieved from disk storage, and processed for use. The system includes a PRML encoder 300 that receives and encodes a stream of data to produce a data stream x. The data stream is formatted by a formatter 302 into a string y, where y=1111, u, x. The string y is pre-coded by a pre-coder 304, which produces a pre-coded string (1/(1⊕D D2))·y. The pre-coded string passes through a noisy channel 306 (such as by being written to and read from one or more data storage disks) whence it is received by a sampler 308, which produces PRML samples of the now noisy pre-coded string, with sampling starting at some arbitrary point and producing a string of samples at points f, f+1, f+2, . . . before the start of u. A synchronizer 310 receives the samples and uses pre-determined samples uj of u to determine bit/byte synchronization. When synchronization is found, the synchronizer adjusts the sampling points and indicates that synchronization is achieved to the sampler 308 and a PRML detector 320. The sampler adjusts and resets sampling, and the PRML detector applies PRML decoding to the adjusted sampled data to produce an estimate of the data stream x. The data stream x may then be decoded.
The synchronizer operates by implementing one of the following algorithms.
Algorithm 2.1 Assume the string . . . 1111, u, x, where u is defined in (1) and x is random data. This string is precoded by convolution with 1/(1⊕D2) and PRML sampling of the precoded string starts at points f, f+1, f+2, . . . before the start of u, where the initial sampling point f is random and unknown. The sampled signal will be possibly subject to noise. Denote this sampled and possibly noisy signal by v0, v1, v2, . . . . Then, the algorithm proceeds as follows:
- Set i←0.
- BACK:
- For each 0≦j≦7, let vi, =(vi, vi+1, . . . , vi+15) and di,j=d(vi, uj;).
- If di,j≦2 then go to NEXT, else
- Set i←i+1 and go to BACK.
- NEXT:
- Let mi=min{di,j, 0≦j≦7}, and mi+=min{d+lj, 0<j<7}.
- If mi>mi+1, then set if i←1 and go to BA CK.
- Let jo be such that mi=di,jo.
- Reset the phase as f←f−(j0/8).
- Start sampling the data at sampling points f+i+20, f+i+21, f+i+22 . . . to obtain a sampled sequence w=w0, w1, w2, . . . .
Apply maximum likelihood decoding to w to obtain an estimate of x.
An example of Algorithm 2.1 is as follows.
Example 2.1
Assume the string
- . . . 1111, u, x=( . . . 11111011011111101101111111011 . . . )
where u is defined in (1). Precoding this string yields
- 1/(1⊕D2)( . . . 1111,u,x)=( . . . 11001001001100100100110011100 . . . )
Next, assume that sampling starts at point 0.35 (which is unknown) and the following samples are obtained:
- −0.05 −0.2 −1.34 −0.29 1.1 −0.77 −0.35 1.11 −0.76 −0.42 1.39 0.33 −1.39 −0.28 1.1 −0.77 −0.36 1.12 −0.76 −0.43 1.39 0.33 −1.39 −0.3 1.3 0.63 −0.34 −1.23 −0.6 . . .
By adding white gaussian noise with a variance of 0.06 to the samples above, for instance, the following samples may be obtained:
- −0.09 −0.12 −1.37 −0.22 1.12 −0.75 −0.38 1.07 −0.74 −0.46 1.31 0.35 −1.3 −0.29 1.02 −0.86 −0.38 1.21 −0.69 −0.47 1.37 0.27 −1.37 −0.31 1.25 0.7 −0.25 −1.33 −0.57 . . . =v0v1 . . . v28
By applying at each step the algorithm, notice that for each 0≦j≦7 and vi=(vi, vi+1, . . . vi+l5), di,j=d(vi, uj) gives:
|
|
idi,0di,1di,2di,3di,4di,5di,6di,7
|
|
09.4412.7816.5720.8325.1829.2733.136.33
117.1313.039.566.955.44.915.617.36
247.9447.0844.5541.2836.9731.8126.2321.01
316.2421.6726.9632.2436.8540.543.1644.81
44.862.030.40.11.153.57.1111.62
|
It can be seen that the minimum is achieved at d4,3. Therefore, the phase will be corrected in ⅜=0.375. Since the original (unknown) sampling point was 0.35, this sampling point is reset as 0.35−0.375=−0.025. Since i=4, sampling starts at points
- f+i+20,f+i+21,f+i+22 . . . =23.975 ,24.975 , 25.975.
Notice that for perfect bit-byte synchronization, it would be necessary to sample at points 24, 25, 26.
The bit-byte synchronization method described in Algorithm 2.1 provides useful results. However, even in a noiseless situation, an error of 0.06 (or 6%) is common. Although such an error is not catastrophic, the noise can easily make synchronization even more difficult. One way to make the sampling more precise is by increasing the number of comparison vectors ui. In the preferred embodiment described above these vectors are obtained by sampling at skips of 0.125. Smaller sample intervals may be taken. Of course doing so would increase the complexity of the system.
FIG. 4 illustrates a method 400 according to Algorithm 2.1. The method is represented by a flow diagram with the understanding that it would be embodied either as a processor program comprising a series or sequence of commands executed by the synchronizer 310 of FIG. 3. Preferably, the method 400 operates on a string . . . 1111, u, x, and is preceded by pre- coding the string as discussed above, which produces the pre-coded data string y. The method begins in step 410 by sampling the string to obtain the sample vectors v0, v1, v2, . . . at the sampling points f, f+1, f+2, . . . before the start of u. An iteration counter i is initialized in step 412. Then, in step 414 the Euclidian distance di,j is taken between a current sample vector vi and each of eight sample vectors of u. According to the test in step 416, if the Euclidian distance di,j is greater than 2, the method increments i by one and loops back through 414; otherwise, the method goes to step 420. In step 420, a first minimum Euclidian distance mi is the minimum di,j calculated with vi, and a second minimum Euclidian distance mi+1 is the minimum di+1,j calculated with vi+1. The minimum mi is searched for in decision 421 by comparing the current mi with mi+1 and, if necessary, incrementing i and looping through steps 420, 421 and 422 until the minimum mi is found. The minimum value of mi is used in step 423 to calculate a value (j0/8) with which to adjust the sampling points. With the adjustment, a sampled sequence w is obtained in step 424 from which an estimate of the data string x is derived by maximum likelihood decoding.
Another alternative is to perform an interpolation process. One way to do this is to take, instead of the smallest sampled value, a number of smallest ones (for example, the three smallest ones) and interpolate between them. This process will be described in the next algorithm.
Algorithm 2.2 Assume the string . . . 1111, u, x, where u was defined in (1) and x is random data. This string is precoded by convolution with 1/(1⊕D2). Then, PRML sampling of the precoded string starts at points f, f+1, f+2 . . . before the start of u, where the initial sampling point f is random and unknown. The sampled signal will possibly be subject to noise. Denote this sampled and possibly noisy signal by v0, vi, v2, . . . . Then, proceed as follows:
- Set
- i←0.
- BACK: For each 0≦j≦7, let vi, =(vi, vi+1, . . . , vi+15) and di,j=d(vi, uj).
- If di,j≦2 then go to NEXT, else,
- Set i←i+1 and go to BACK.
- NEXT: Consider the vector of distances of length 16:
Now, consider l, 0≦l≦13 such that d1, d1+1, d1+2, are the smallest values in d (without loss of generality, it may be assumed that these three values are consecutive, although this assumption is not necessary to the operation of the algorithm). Consider the vector of length 16:
- Make f←f−(r−1).
- Start sampling the data at sampling points f+i+20, f+i+21, f+i+22 . . . to obtain a sampled sequence w=w0, w1, w2, . . .
Apply maximum likelihood decoding to w to obtain an estimate of x.
Example 2.2
As an example of Algorithm 2.2, similarly to Example 2.1, assume a string:
- . . . 1111, u, x=( . . . 11111011011111101101111101010 . . . ),
where u was defined in (1). Precoding this string, we obtain
Next, assuming that sampling of the precoded string starts at the unknown initial point 1.97, the following samples are obtained:
- −0.97 −0.05 0.96 0.06 −1.03 0.96 0.06−1.03 0.94 1.04 −0.95 −1.05 0.96 0.06 −1.03 0.96 0.06 −1.03 0.94 1.04 −0.95 −1.03 −0.04 0.98 0.06 −1.01 −0.04 0.98 0.04 . . .
By adding white gaussian noise with a variance of 0.06 to the samples above, for instance, the following samples may be obtained:
- −0.96 −1.01 0.98 0.2 −0.96 1.02 −0.04 −0.92 0.86 0.94 −0.87 −1.1 0.92 0.04 −1.09 0.87 0.01 −1.09 0.99 0.96 −0.96 −0.99 0.02 0.94 0.12 −1.03 −0.12 1.01 0.08 . . . =v0 v1 . . .
- . . .
By applying at each step the algorithm, notice that for each 0≦j≦7 and vi=(vi, vi+1, . . . , vi+15), di,j=d(vi, uj) gives:
|
|
idi,0di,1di,2di,3di,4di,5di,6di,7
|
|
040.4436.5731.7526.8221.7616.812.318.86
132.2336.8140.2242.9744.3744.3343.0140.85
20.141.133.366.7911.1116.1121.6127.17
329.9824.7619.22149.245.212.190.5
|
Notice that, according to Algorithm 2.2, di,j≦2 is achieved at i=2, so
Manifestly, 1=7, thus, (al, al+, al+2)=(0.875, 1, 1.125) and (dl, dl+1, dl+2)=(0.5, 0.14,1.13). This gives,
Since the initial (unknown) sampling point was 1.97 and i=2, according to Algorithm 2.2,f is reset to f←f−(r−1)=1.97−(0.99 −1)=1.98 and sampling starts at points
- f+i+20, f+i+21, f+i+22 . . . =23.98, 24.98, 25.98, . . . .
Again, notice that for perfect bit-byte synchronization, one would need to sample at points 24, 25, 26, . . .
FIG. 5 illustrates a method 530 according to Algorithm 2.2. The method is represented by a flow diagram with the understanding that it would be embodied either as a processor program comprising a series or sequence of commands executed by the synchronizer 310 of FIG. 2. Preferably, the method 530 operates on a string . . .1111, u, x, and is preceded by pre-coding the string as discussed above, which produces the pre-coded data string y. The method begins in step 410 by sampling the string to obtain the sample vectors v0, v1, v2, . . . at the sampling points f, f+1, f+2, . . . before the start of u. An iteration counter i is initialized in step 412. Then, in step 414 the Euclidian distance dij is taken between a current sample vector vi and each of eight sample vectors of u. According to the test in step 416, if the Euclidian distance di,j is greater than 2, the method increments i by one and loops back through 414; otherwise, the method goes to step 531. In step 531, a vector d of sixteen Euclidian distances is calculated with vi and uj and the three smallest values of d are selected in step 532. The sixteen unit vector a is accessed in step 533 and the elements of a at the same vector locations as the three smallest values of d are combined with the three smallest values of d in step 534 to obtain a value r representing interpolation among the three smallest values of d. The value of r is used to adjust the initial sampling point f in step 535. With the adjustment, a sampled sequence w is obtained in step 536 from which an estimate of the data string x is derived by maximum likelihood decoding.
The next algorithm introduces a modification that makes it slightly more efficient than Algorithm 2.2.
Algorithm 2.3 Assume the string . . . 1111, u, x, where u was defined in (1) and x is random data. This string is precoded by convolution with 1/(1⊕D2) and PRML sampling of the precoded string starts at points f, f+1, f+2, . . . before the start of u, where the initial sampling point f is random and unknown. The sampled signal will be possibly subject to noise. Denote this sampled and possibly noisy signal by v0, v1, v2, . . . Then, proceed as follows:
- Set
- i←0
- BACK: For each 0≦j≦7, let vi=(vi, vi+1, . . . , vi+15) and di,j=d(vi, uj).
- If di,j≦2, then go to NEXT, else,
- Set if i←i+1 and go to BACK.
- NEXT: Consider the vector of distances of length 16
Consider 1, 0≦l≦13 such that dl+1 is the smallest value in d and, without loss of generality, dl, dl+1, and dl+2 are the three smallest values in d. Consider the vector of length 16:
If dl+2≦2dl or dl≦2dl+2, let
Make f←f−(r−1).
Start sampling the data at sampling points f+i+20, f+i+21, f+i+22 . . . to obtain a sampled sequence w=w0, w1, w2, . . . Apply maximum likelihood decoding to w to obtain an estimate of x.
Example 2.3
This example describes the same situation as Example 2.2, where 1=7, (al, al+1, al+2)=(0.875, 1, 1.125) and (dl, dl+1, dl+2)=(0.5, 0.14,1.13). Notice that dl+2=1.3>2(0.5)=2dl. Thus, according to Algorithm 2.3:
Since the initial (unknown) sampling point was 1.97 and i=2, according to Algorithm 2.3, f is reset according to f←f−(r−1)=1.97−(0.97−1)=2 and sampling starts at points
- f+i+20, f+i+21, f+i+22 . . . =24,25,26, . . . .
Thus, perfect bit-byte synchronization occurs in this case.
FIG. 6 illustrates a method 650 according to Algorithm 2.3. The method is represented by a flow diagram with the understanding that it would be embodied either as a processor program comprising a series or sequence of commands executed by the synchronizer of FIG. 152. Preferably, the method 650 operates on a string . . . 1111, u, x, and is preceded by pre-coding the string as discussed above, which produces the pre-coded data string y. The method begins in step 410 by sampling the string to obtain the sample vectors v0, v1, v2, . . . at the sampling points f, f+1, f+2, . . . before the start of u. An iteration counter i is initialized in step 412. Then, in step 414 the Euclidian distance di,j is taken between a current sample vector vi and each of eight sample vectors of u. According to the test in step 416, if the Euclidian distance di,j is greater than 2, the method increments i by one and loops back through 414; otherwise, the method goes to step 531. In step 531, a vector d of sixteen Euclidian distances is calculated with vi and uj and the three smallest values of d are selected in step 532. The sixteen unit vector a is accessed in step 533 and the elements of a at the same vector locations as the three smallest values of d are obtained. In decision 651, the first and third of the three smallest values of d are compared. If the variance between the two values exceeds a threshold, r is calculated in step 534 by interpolation among the three smallest values of d as in FIG. 3C. Otherwise, r is calculated in step 652 by interpolation between only the two smallest values of d. The value of r is used to adjust the initial sampling point f in step 653. With the adjustment, a sampled sequence w is obtained in step 654 from which an estimate of the data string x is derived by maximum likelihood decoding.
Representative simulation results obtained using Algorithms 2.1, 2.2 and 2.3 are tabulated below. In all cases, white Gaussian noise with a variance of 0.06 was added. A number of tests were run for each algorithm and for each case to measure how far away the results were from perfect bit-synchronization (byte synchronization was correct in all cases). For instance, in Example 2.1 this number is 0.025, in Example 2.2 it is 0.02 and in Example 2.3 it is is 0. The average of all these numbers, the standard deviation, the worst case and the percentage of cases above 0.05 are shown in the following table.
|
|
Average
VarianceNumberbitPercentage
Algor-ofofSynchStandardWorstabove
ithmAWGNTestsErrorDeviationCase0.05
|
|
2.10.064370180.030.020.1 15%
2.20.061001900.0150.010.060.006%
2.30.062553550.010.0080.060.001%
|