The present invention relates to data coding in a communications channel, and more particularly to data coding that eliminates unwanted bit patterns in a communications channel.
Magnetic storage systems such as disk drives include a magnetic medium or platter with a magnetic coating that is divided into data tracks. The data tracks are divided into data sectors that store fixed-size data blocks. A read/write head typically includes a write circuit and a write element such as an inductor that selectively generates positive and negative magnetic fields that are stored by the magnetic medium. The stored positive and negative fields represent binary ones and zeros. The read/write head includes an element such as a magneto-resistive element that senses the stored magnetic field to read data from the magnetic medium. A spindle motor rotates the platter and an actuator arm positions the read/write head relative to the magnetic medium.
Magnetic storage systems typically code user data using Run Length Limited (RLL) code. RLL coding eliminates sequences in the user data that may degrade the performance of timing circuits of the magnetic storage system. For example, an RLL code enforces constraints on the number of consecutive ones and/or zeros that are permitted in the data. The efficiency of the RLL code is typically measured in terms of a code rate. For every m bits of user data, an encoded word with n bits is written to the storage media. RLL codes are used to eliminate unwanted bit patterns in the original data and typically do not have error correction capability.
Referring now to
A scrambled output of XOR gate 14 is input to a run length limited (RLL) ENC 18. RLL ENC 18 encodes bit strings to prevent unwanted data patterns that violate the constraint and outputs a bit stream to a read channel (R/C). Typically, RLL ENC 18 converts a block of NRLL bits into (NRLL+1) bits to avoid the unwanted data patterns.
Referring to
A communications channel includes a buffer that receives symbols of user data including a plurality of M-bit symbols. A seed selector receives the M-bit symbols of the user data, selectively removes symbols of the user data from a seed set, and selects a scrambling seed from symbols remaining in the seed set. A scrambling device that communicates with the seed selector and the data buffer generates scrambled user data using the user data and the selected scrambling seed. A Hamming weight coding device determines a Hamming weight of symbols of the scrambled user data and selectively codes the symbols depending upon the determined Hamming weight.
A write path in a communications channel according to the present invention includes an encoder that receives a scrambled user data symbol sequence. The encoder compares the user data to a seed set and selects a token from unused symbols in the seed set. The encoder passes pairs of adjacent symbols of the scrambled user data sequence unchanged or, utilizing the selected token, outputs a pair of symbols having an improved Hamming weight.
A write path in a communications channel according to the present invention includes an encoder that receives a scrambled user data symbol sequence. The encoder compares the user data to a seed set and selects a first token and a second token from unused symbols in the seed set. The encoder also passes pairs of adjacent user symbols of the user data sequence unchanged or, utilizing either the first token or the second token dependent upon the adjacent user symbols, encodes an output having an equal number of bits as a pair of adjacent user symbols, depending upon a total Hamming weight of the pairs of adjacent user symbols.
Further areas of applicability of the present invention will become apparent from the detailed description provided hereinafter. It should be understood that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention.
The present invention will become more fully understood from the detailed description and the accompanying drawings, wherein:
The following description of the preferred embodiment(s) is merely exemplary in nature and is in no way intended to limit the invention, its application, or uses. For purposes of clarity, the same reference numbers will be used in the drawings to identify similar elements.
Hamming weight refers to the number of non-zero symbols in a symbol sequence. For binary signaling, Hamming weight refers to the number of “1” bits in the binary sequence. Low Hamming weight sequences (sequences with many zeros) adversely affect synchronization times and timing loops. Likewise, high Hamming weights cause similar problems. Therefore, there have been attempts to improve the Hamming weight of scrambled sequences. However, a trade-off between efficiency and effectiveness usually must be made.
Referring to
A delayed output of data buffer 32 is also output to XOR device 34 when the scrambling sequence is found. The delay of data buffer 32 is sufficient to allow the scrambling sequence to be generated by the data dependent scrambler 33. An output of XOR device 34 and overhead bits that are output by scrambler 33 are input to an ECC ENC 36, which appends any scrambler overhead bits to the scrambled user data. ECC ENC 36 generates ECC and/or CRC bits based on the scrambled user data and/or the overhead bits.
In some configurations of the present invention, a 10-bit symbol user data sequence D={DN−1, DN−2, . . . , D0} of size N is scrambled. For example, when the block of user data includes 4096 bits, there are 410 symbols. A scrambling seed A is found that is different from any symbols in data sequence D={DN−1,DN−2, . . . , D0). Finding such a seed is always possible if N<210. More generally, if the number of bits in a symbol is M, it is always possible to find such a seed if N<2M, simply because not all of the 2M different possible symbols can be included in a data sequence of fewer than 2M symbols. Because scrambling seed A is different from each symbol in the data sequence, it will differ from each symbol in the data sequence in at least one bit position. A scrambling sequence is then formed by repeating symbol A for N times. A bit-wise XOR of scrambling sequence {A, A, . . . , A} with data sequence D={DN−1, DN−2, . . . , D0} is performed to obtain a scrambled sequence C={CN−1, CN−2, . . . , C0}.
Referring again to
The above method produces a scrambled sequence C in which every ten bit symbol Ci, (i=N−1, . . . , 0} is non-zero, every ten bit symbol Ci, (i=N−1, . . . , 0) has a minimum Hamming weight of one, and the scrambled sequence C has a minimum Hamming weight of 10%. Each ten bit symbol Ci is non-zero because scrambling seed A is different from each symbol Di in the data sequence by at least one bit. When A is XORed with any Di, the result will have a “1” in any bit position in which A differs from Di, and there is at least one such bit position in every Di. Thus, every ten bit symbol Ci has a Hamming weight of at least one, which is 10% of the bits in each Ci. Because no symbol in the entire sequence C has a Hamming weight less than the minimum 10%, the scrambled sequence has a minimum Hamming weight of 10%. The procedure for generating scrambled sequence C can readily be generalized for any symbol size M, provided that N<2M. The resulting scrambled sequence will have a minimum Hamming weight of 1/M.
For a ten bit symbol size, i.e., M=10, there are 210 possible binary symbols. These symbols form a seed set S. Given a data sequence D={DN−1, DN−2, . . . , D0} with N<210, a scrambling seed A can be produced from S by designating every Di in S as a “used symbol,” and picking an unused symbol in S as the scrambling seed A. This procedure works for any symbol length M, provided that N<2M.
Because each symbol in the scrambled sequence has a Hamming weight of at least 1, the worst case run of zeros occurs when a symbol with Hamming weight 1 having the “1” at the beginning of the symbol is adjacent a symbol with Hamming weight 1 having the “1” at the end of the symbol. The worst case run of zeros thus cannot be greater than two less than twice the number of bits in a symbol, or 18 (for 10-bit symbols). In some applications, including at least some storage systems, it is required that the scrambled sequence also not contain long runs of ones. This requirement can be met by disallowing the all-ones symbol from appearing in scrambled sequence C. The scrambling seed search is thus modified as follows, with the requirement 2N<2M, where M is 10 for ten-bit symbols. For every Di, designate Di and
Designating both Di and
The above steps are suitable for producing a scrambled sequence C where every 10-bit symbol Ci, (i=N−1, . . . ,0) is non-zero, where every 10-bit symbol Ci has a minimum Hamming weight of 1, and the scrambled sequence C has a minimum Hamming weight of 10%. The scrambler overhead is M bits in this example.
Referring now to
To improve the worst case Hamming weights to 15% in some configurations, a token is selected and used to indicate H-coding 206 for low weight two-symbol code groups. This token is unique when the data gets to H-code decoder 216 even though bit interleaving in P-code encoder 208 may generate symbols equal to the token, there is no ambiguity because P-code decoder 214 processes data in read path 202 prior to H-code decoder 216. In some configurations in which the all-zero symbol and the all-one symbol are used as indicators in the P-code, neither of these two symbols is used as the token.
Referring now to
In step 304, each Di in D and
In step 306, one of the available seeds in S is selected to be the seed of the scrambling sequence, which is designated here as seed a. In step 308, another valid seed, b, which is not a one's complement of the true seed a, is selected. Because at least two seeds in S other than a remain, it is always possible to select a remaining seed b that is not a one's complement of a. The scrambled data sequence C={CN−1, CN−2, . . . , C0} is generated by XOR the data sequence D={DN−1, DN−2, . . . , D0} with the scrambling sequence {a, a, . . . , a}.
In step 310, the symbol a⊕b is determined, where the typographic symbol ⊕ denotes the XOR operator, and the symbols so determined is stored as the token. Because of the manner in which it is selected, the token has a Hamming weight of at least one and is not the all-one symbol. Both a and b shall be protected by ECC meaning that the CRC/ECC redundancy symbols should be generated based on a and b and the processed user data.
Starting at the first two symbols Ci−1, Ci−2 in step 312, where i=N−1, the Hamming weight of the two-symbol group of 10-bit symbols is determined. If the Hamming weight is at least three (15%) in step 314, H-code encoder 206 passes its input data unmodified to P-code encoder 208 in step 316. Otherwise, it is necessarily the case that both symbols of the two symbol group have Hamming weight one. In this case, an 18-bit string is generated in step 318 utilizing the 10-bits of the stored token in combination with two four-bit indications of the positions of the ones in each of the two data symbols. For example, an ordered concatenation of the token and the two four-bit indications can be used. And the two four-bit indications can be made nonzero by numbering the position of the bit “1” in a weight-1 symbol from 1 to 10.
The combination of the token and the two four-bit representations is only 18 bits, which is less than the original total of 20 bits occupied by the two original two-symbol group of 10-bit symbols. Therefore, in step 320, the remaining two bits are set to one or zero in a consistent manner, thereby filling up all 20 bits. In step 320, if the entire data sequence C is exhausted, the procedure is complete, until another data sequence is provided. Otherwise, in step 322, the next two data symbols are repeated and processed, starting in step 312.
As a result, at very small computational and component cost, the worst case Hamming weight is 15% in these configurations of the present invention, because at least three of the 20 bits are “1”s. More particularly, any two-symbol group having a Hamming weight greater than 15% is passed through unchanged, and any group having a lower weight is coded to have at least three “1”s: a token having a Hamming weight not less than 1 and two four-bit indications each having a Hamming weight at least 1.
The mapping of 10-bit symbols of Hamming weight 1 into four bits each is explained by the following example. A symbol such as 0010000000 has only one “1” bit in it. A four-bit code is sufficient to represent the bit position of the “1” bit, because there are only ten bit positions (more particularly, there are fewer than 2J=16 bit positions, where J=4 is the length of the bit-position mapping code). Any consistent mapping can be used to indicate the bit position provided that the four-bit indication is not all-zero. For example, a simple binary representation of the bit position can be used, counting the bit position consistently either from the left (thus mapping into 0011) or from the right (thus mapping into 1000).
Skilled artisans will understand that the configuration described above can be modified to work with different M (the number of bits in the symbols), J (the length of the bit-position mapping code), and/or K (the number of symbols in a group, which in the case of the above example, is 2). Not all of these modifications will result in minimum Hamming weights of exactly 15%.
Some configurations of the present invention utilize an alternate and presently preferred H-code that is shown in
Referring now to
H-code encoder 16 encodes as follows: The Hamming weight of a two-symbol group is determined in step 410. If the total Hamming weight is at least four at 412, the data is passed unchanged to P-code encoder 208 at 414. The resulting two-symbol group has a Hamming weight of at least 20%, i.e., at least four bits out of 20 are “1”s.
If the Hamming weight of the two symbols is either (1,1) or (1,2) in step 416, then in step 418, H-code encoder 16 inserts Token-1 in a consistent manner, for example, on the left. The first four bits of the second symbol are set to indicate the position of the 1 in the weight one symbol, for example, using a positional mapping such as that described above. Any mapping can be used, but the 4-bit all zero pattern is excluded. A six bit pattern is found by determining which of the 6-bit patterns of weight 2 or more corresponds to the second data symbol. For example, a look-up table can be used to make this determination. The six-bit pattern is concatenated or otherwise included with Token-1 and the four bits indicating the position of the 1 in the weight one symbol so that a string of 20 bits is created. These 20 bits have at least two “1” bits from inclusion of the 6-bit pattern, at least one “1” bit from the token, and at least one “1” bit from the 4-bit code representing the bit position in the weight one symbol. The resulting 20 bits include at least 4 “1”s, so the Hamming weight is at least 20%. It will be appreciated that the presence of Token-1 at a specific position within the 20-bit pattern identifies this case to the decoder.
Because zero-weight symbols are not used, the only remaining possibility is that the Hamming weight of the two symbols is (2,1). In step 420, Token-2 is inserted on the left. The first four bits of the second symbol are used to indicate the position of the 1 in the weight one symbol, and the second symbol is converted to a six bit symbol. It will be recognized that the resulting 20 bits can be identified by a decoder from the presence of Token-2 at a specific position within the 20-bit pattern instead of Token-1, or some other pattern of bits. It will also be recognized that the minimum Hamming weight in this case is also 20% for reasons quite similar to the case above in which the two symbols have Hamming weight (1,2).
If the data sequence is exhausted in step 422, the procedure is done, and can be restarted when new data is available. Otherwise, the next to data symbols are selected in step 424 and the procedure loops back to step 410.
Application specific integrated circuits, dedicated circuits, software and a processor, discrete circuits, and/or any other suitable manner can be used to implement configurations described herein. Thus, items referred to as “devices” in the examples described above can be, but are not necessarily discrete components.
It will thus be appreciated that methods and apparatus of the present invention provide increased Hamming code weights for communications channels, and/or provide coded symbol sequences on such channels without excessively long strings of “1”s and/or “0”s. Moreover, computational overhead is very small and simple buffers can be used, as no more than four consecutive symbols are needed in any iteration or step that takes place in configurations of the present invention. In some configurations, only two consecutive symbols are needed.
Those skilled in the art can now appreciate from the foregoing description that the broad teachings of the present invention can be implemented in a variety of forms. Therefore, while this invention has been described in connection with particular examples thereof, the true scope of the invention should not be so limited since other modifications will become apparent to the skilled practitioner upon a study of the drawings, the specification and the following claims.
This application claims the benefit of U.S. Provisional Application No. 60/430,904, filed on Dec. 4, 2002, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5898394 | Kobayashi et al. | Apr 1999 | A |
6177890 | Keirn et al. | Jan 2001 | B1 |
6185717 | Fukunaga et al. | Feb 2001 | B1 |
6351538 | Uz | Feb 2002 | B1 |
6360347 | Walters, Jr. | Mar 2002 | B1 |
6384747 | Reed et al. | May 2002 | B1 |
6449111 | Kool et al. | Sep 2002 | B1 |
6738935 | Kimmitt | May 2004 | B1 |
6792566 | Chen et al. | Sep 2004 | B2 |
6897792 | Feng | May 2005 | B1 |
6986094 | Grimsrud | Jan 2006 | B2 |
7006016 | Feng | Feb 2006 | B1 |
7023881 | Bendak et al. | Apr 2006 | B1 |
20010007578 | Ran et al. | Jul 2001 | A1 |
20020122469 | Doetsch et al. | Sep 2002 | A1 |
20030066014 | Van Dijk et al. | Apr 2003 | A1 |
Number | Date | Country | |
---|---|---|---|
60430904 | Dec 2002 | US |