Reed-Solomon multiplication method

Information

  • Patent Grant
  • 6378105
  • Patent Number
    6,378,105
  • Date Filed
    Monday, May 24, 1999
    26 years ago
  • Date Issued
    Tuesday, April 23, 2002
    23 years ago
Abstract
A method for computing Reed-Solomon error control checkbytes in reduced time and with reduced gate count. Two syndromes, s0 and s1, are computed for a sequence of data elements, using a selected primitive a that satisfies a selected primitive polynomial relation p(α)=0. Each of two checkbytes, c0 and c1, is expressed as a linear combination of the syndromes s0 and s1, where each coefficient of each linear combination is expressed as a single power of the primitive α, which is stored at the checkbyte generator for multiple use. This approach reduces gate count and associated time delay in formation of the usual Reed-Solomon multiplier coefficients.
Description




FIELD OF THE INVENTION




This application is related to a patent application, “MODIFIED REED-SOLOMON MULTIPLICATION”, U.S. Ser. No. 09,317,489, filed on the day this application is being filed. This invention relates to use of error control techniques to detect and correct errors in a digital signal, and to efficient use of Reed-Solomon error detection and correction.




BACKGROUND OF THE INVENTION




Approaches for error control encoding for computer communications have been proposed and used for more than 40 years. Error control is of increasing concern as the speed of digital signal transmission increases by factors of ten each decade. Several error control schemes, such as those developed by Reed-Solomon (RS) and by Bose-Chaudhuri-Hocquenhem (BCH), allow correction of “burst” errors of several consecutive bytes and are of special interest in computer communications. These error control schemes are powerful and allow detection and correction of isolated bit errors and burst errors involving several consecutive erroneous bits or bytes. However, the encoding and decoding procedures are often long and complex, which limits digital signal throughput at the transmitting end and/or at the receiving end where these error control methods are used. A Reed-Solomon error control procedure typically requires matrix multiplication, or its equivalent, of large row and/or column matrices as part of the syndrome processing. These multiplications require a relatively large gate count in an HDL (hardware description language) formulation and add substantially to the time required for such processing.




What is needed is an approach for reducing the gate count for pairwise multiplication in a Reed-Solomon error control procedure and for decreasing the time required to form and to sum these pairwise products. Preferably, the system should work with any reasonable coding block dimensions and with any primitive polynomial used for Reed-Solomon encoding.




SUMMARY OF THE INVENTION




These needs are met by the invention, which provides a method and system for reducing the number of gates required and for decreasing the time required to form sums of products of pairs of elements, by using a parallel process to calculate the checkbyte(s) in an ECC processing phase for digital signals. The coefficients needed to form the sums of products are built into and provided within the syndrome generator and checkbyte generator modules so that these coefficients need not be computed each time.











BRIEF DESCRIPTION OF THE DRAWINGS





FIG. 1

illustrates data flow within an ECC module.





FIG. 2

illustrates generation, storage and use of the syndrome components to form checkbyte components according to the invention.





FIG. 3

(prior art) shows conventional apparatus for implementing certain sums and products.





FIGS. 4

,


5


and


6


show apparatus for implementing Reed-Solomon multiplier action according to the invention.





FIG. 7

is a flow chart illustrating practice according to the invention.











DESCRIPTION OF BEST MODE OF THE INVENTION





FIG. 1

illustrates apparatus that can be used to form and apply two multipliers that are used in Reed-Solomon error control for certain digital signals, such as the ECC phase of error control. Syndrome coefficients, s


0


and s


1


, are received by a multiplexer


25


, which selectively interleaves the s


0


and s


1


signals and passes the interleaved stream on one or more lines


27


to a Reed-Solomon multiplier module


29


that also receives three known eight-bit multiplier coefficients


8


′hf


4


,


8


′hf


5


and


8


′hf


7


from a lookup table or generator


31


. The MUX


29


forms eight-bit Reed-Solomon error control XOR sums:






c


0


=


8


′hf


4


·s


0





8


′hf


7


·s


1


;  (1)








c


1


=


8


′hf


5


·s


0





8


′hf


7


·s


1


.  (2)






The MUX


29


issues the error control sums c


0


and c


1


on a line


33


that is received and processed by a checkbyte error examination module


35


and is issued on an output line


37


. Optionally, the error control sums c


0


and c


1


are also fed to a second group of temporary registers


39


that feed these sums back to the MUX


29


. Formation of the sums c


0


and c


1


requires use of many logic gates and consumes several gate cycles in time, because of the sequential processing required.




The gate count and the cumulative processing time can be reduced in the formation of the product sums c


0


and c


1


, according to the invention.

FIG. 2

illustrates apparatus suitable for generating (in


25


), storing (in


15


and


17


) and using (in


29


) syndrome components that are, in turn, used to form the checkbyte components used in Reed-Solomon error control, using an array of eight-bit variables, x[


7


:


0


]={x[k]|k=0, 1, . . . , 7}={x[


7


], x[


6


],x[


5


],x[


4


],x[


3


],x[


2


],x[


1


],x[


0


]} and y[


7


:


0


]={y[k]|k=0, 1, . . . , 7}. The eight-bit variables x[


7


:


0


] involve powers α


n


(n=0, 1, . . . , 7) of an eight-bit primitive α, that satisfies a selected primitive polynomial relation






p(α)=0.  (3)






For example, the primitive polynomial relation may be selected to be






p(α)=α


8





4





3





2


+1=0,  (4)






in which event the “0” element, the “1” element and several powers of α become






0={0,0,0,0,0,0,0,0},








α


0





255


={0,0,0,0,0,0,0,1}=1,








α={


0


,


0


,


0


,


0


,


0


,


0


,


1


,


0


}, α


2


={0,0,0,0,0,1,0,0},








α


3


={0,0,0,0,1,0,0,0},








α


4


={0,0,0,1,0,0,0,0}, α


5


={0,0,1,0,0,0,0,0},








α


6


={0,1,0,0,0,0,0,0},








α


7


={1,0,0,0,0,0,0,0}, α


8


={0,0,0,1,1,1,0,1}=α


4





3





2


+1,








α


9


={0,0,1,1,1,0,1,0}=α·α


8





5





4





3


+α, α


230


={1,1,1,1,0,1,0,0},








α


231


={1,1,1,1,0,1,0,1},








α


232


={1,1,1,1,0,1,1,1},  (5)






where particular powers α


n


(n=230, 231, 232) will be needed in the following development. The remaining powers an (10≦n≦254) are generated using the particular primitive polynomial relation (4). Change of the choice of primitive polynomial will cause a corresponding change in definition of most of the powers of α.




The following arrays of coefficients are formed, for example using the conventional apparatus shown in

FIG. 3

, where x[k] is a scalar and y[


7


:


0


] is an eight-bit array.






x[


0


]·y[


7


:


0


]=z


0


[


7


:


0


],  (6-0)








x[


1


]·y[


7


:


0


]α=z


1


[


7


:


0


],  (6-1)








. . .








x[k]·y[


7


:


0





k


=zk[


7


:


0


](k=0, 1, . . . , 7),  (6-k)








w


0


[


7


:


0


]=z


0


[


7


:


0


]+z


1


[


7


:


0


],  (7-0)








w(k+1)[


7


:


0


]=zk{


7


:


0


]+wk[


7


:


0


](k=0, 1, . . . , 5),  (7-k)








w


6


[


7


:


0


]+c[


7


:


0


]=w


7


[


7


:


0


],  (7-6)






where zk[


7


:


0


] also has eight entries, obtained by multiplying each of the eight entries in y[


7


:


0


] by the scalar x[k], and c[


7


:


0


] is a portion of a checkbyte c


0


or c


1


. The variables x[


7


:


0


] and y[


7


:


0


] may be taken to be any of the pairs {s


0


,


8


′hf


4


}, {s


0


,


8


′hf


5


} and {s


1


,


8


′hf


7


} that appear in the relations(1) and (2).




The checkbytes c


0


and c


1


are formed as follows. Two code word variables s


0


and s


1


are defined by









s0
=





n
=
0

N




I


(
n
)


·
1


=


{


I


(
0
)


+

I


(
1
)


+

+

I


(
N
)



}

·
1






(
8
)






s1
=




n
=
0

N




I


(
n
)


·

α
n







(
9
)













where, for example, the choices N=24 and N=43 correspond to P-parity correction and Q-parity correction, respectively, and I(n) is one of a column of data elements. Two 16-bit check bytes, c


0


=c


0


[


15


:


8


]+c


0


[


7


:


0


] and c


1


=c


1


[


15


:


8


]+c


1


[


7


:


0


], are added for every code word to detect up to two errors per code word and to allow correction of up to one error per code word.




The check bytes c


0


and c


1


satisfy the error check relations






c


1


+c


0


+s


0


=0,  (10)








c


1


+c


0


α+s


1


α


2


=0.  (11)






One verifies from the relations (5), (10) and (11) that






(1+α)·c


0


=s


0





2


·s


1


  (12)








c


1


=c


0


+s


0


,  (13)



















c0
=







(

1
+
α

)


-
1




{

s0
+


α
2

·
s1


}








=







α

-
25




{

s0
+


α
2

·
s1


}


=



α

255
-
25



s0

+


α

257
-
25


·
s1









=







α
230

·
s0

+


α
232

·
s1









=







8




hf4
·
s0


+


8




hf7
·
s1




,







(
14
)






















c1
=







α
231

·
s0

+


α
232

·
s1









=







8




hf5
·
s0


+


8




hf7
·
s1




,







(
15
)













which exhibit the values of the (now-known) eight-bit coefficients


8


′hf


4


,


8


′hf


5


and


8


′hf


7


. Higher order coefficients can be computed in a similar manner. Where the arrays x and y have the forms






x=x


7


α


7


+x


6


α


6


+x


5


α


5


+x


4


α


4


+x


3


αx


3


+x


2


α


2


+x


1


α


1


x


0


α


0


,








y=y


7


α


7


+y


6


α


6


+y


5


α


5


+y


4


α


4


+y


3


α


3


+y


2


α


2


+y


1


α


1


+y


0


α


0


,






the product x*y of these arrays is defined as






x*y=x


7





7


+x


6





6


+x


5





5


+x


4





4


+x


3





3


+x


2





2


+x


1





1


+x


0


y.  (16)






The coefficients


8


′hf


4


,


8


′hf


5


,


8


′hf


7


and others are part of an array of coefficients defined as follows.








8


′hf


5


=


8


′hf


4


α,










8


′hf


7


=


8


′hf


5


α,










8


′hf


3


=


8


′hf


7


α,










8


′hfb=


8


′hf


3


α,










8


′heb=


8


′hfb α,










8


′hcb=


8


′heb α,










8


′h


8


b=


8


′hcb α,










8


′h


0


b=


8


′h


8


b α,


8


′h


16


=


8


′h


0


b α,  (17)






where additional higher terms in this array can also be defined, if desired, based on a Gray code expressed in hexadecimal format. The quantities in (17) may be computed once and stored in software or hardware, and these quantities (and higher order coefficients) are considered known.




The input quantities s


0


and s


1


are characterized as sums of powers of α, as in (8) and (9). For example, the quantities


8


′hf


4


·s


0


and


8


′hf


5


·s


0


in the relations (14) and (15) are the product of the coefficients


8


′hf


4


and


8


′hf


5


=


8


′hf


4


·α multiplied by a known numerical coefficient times a known power of a and are easily computed once and stored, without requiring recomputation of different (positive) powers of α.




Each of the quantities


8


′hf


4


·s


0


,


8


′hf


5


·s


0


and


8


′hf


7


·s


1


, if expressed in a conventional manner, will require use of approximately 3N−1 gates, including N−1 gates that form selected powers α


m


(m=1, 2, . . . , N−1), as illustrated in

FIG. 3

, and will require a substantial total time delay for the sequential operations indicated in FIG.


3


. However, if the parity input quantity si is expressed as an (N+1)-tuple S


1


={s


1


[


0


], s


1


[


1


], s


1


[


2


], . . . , s


1


[N}}, the gate count can be reduced substantially (to N) by forming the usual logical product (AND) of a sequence of coefficients α


k


·


8


′hf


7


with each a sequence of coefficients s


1


[k] in the k-tuple S


1


.





FIG. 4

shows apparatus suitable for implementing, according to the invention, formation of the Reed-Solomon products or multipliers used to define c


1


in (15), for the choice N=7. The number of gates required is reduced from 3N−1=23 in

FIG. 3

to 2N−1=15 in FIG.


4


. More generally, the coefficients in (17) would include N+1 pre-computed input signals


8


′hf


4


, α·


8


′hf


4


, α


2


·


8


′hf


4


, . . . , α


N


·


8


′hf


4


, each directed to a separate two-input AND gate, with the input signals to the other terminal of each AND gate being the scalar quantities s


1


[n] (n=0, 1, 2, . . . . , N). The computed quantities


8


′hf


4


·α


k


(k=0, 1, 2, . . . ) are preferably stored in a look-up table for subsequent use. Preferably, the coefficients


8


′hf


7


·α


k


are provided in groups of N+1=8.





FIG. 5

shows apparatus suitable for implementing formation of the Reed-Solomon multipliers used to define c


0


in (14), where the input signals are the quantities


8


′hf


5


·s


0


(k=0, 1, 2, . . . ). Here, each of the input signals for the first terminal of the AND gates have the same value, such as


8


′hf


5


.




Similarly,

FIG. 6

shows apparatus suitable for implementing the input signals


8


′hf


7


·s


1


. (k=0, 1, 2, . . . ).




The control bytes c


0


and c


1


are formed as indicated in (14) and (15) and are appended to the binary representation {I(


0


), I(


1


), . . . , I(N)} to implement a Reed-Solomon error control procedure.





FIG. 7

is a flow chart illustrating one method of practicing the invention. In step


71


, a code word of length N+1 eight-bit arrays, expressible as a binary sequence {I


n


} of bytes (n=0, 1, . . . , N), is provided. In step


73


, an eight-bit primitive a satisfying a selected primitive polynomial relation p(α)=0, is provided. In step


75


, a selected sequence of powers {J


m





m


} of α is provided. In step


77


, a first (N+1)-tuple code word element, s


0


, is computed as a logical sum of the eight-bit arrays I


n


(n=0, 1, . . . , N). In step


79


, a second (N+1)-tuple code word element, s


1


, is computed as a logical sum of eight-bit product arrays I


n


·J(n+N1) (n=0, 1, . . . , N). In step


81


, the system provides a selected sequence {h(k)} (k=0, 1, . . . , N


2


−N


1


) of eight-bit arrays, with each element being proportional to a selected power of the primitive α. In step


83


, a first control element, c


0


, is expressed as a logical sum of products h(k+N


1


)·s


0


+h(k+N


1


+2)·s


1


(k=0, 1, . . . , N


2


−N


1


). In step


85


, a second control element, c


1


, is expressed as a logical sum of products h(k+N


1


)·s


0


+hk+N


1


+2)·s


1


(k=0, 1, . . . , N


2


−N


1


). The quantities c


0


and c


1


may be interpreted as error control checkbytes for the code word sequence {I


n


}. Optionally, in step


87


, at least one of the error control checkbytes, c


0


and c


1


, is appended to the code word sequence {I


n


}.



Claims
  • 1. A method for computing error control checkbytes for a sequence of data, the method comprising:receiving a sequence of N+1 eight-bit data elements that are to be processed for error control purposes, where N is a selected positive integer; computing a first error control syndrome s0 as a sum of the sequence of data elements; computing a second error control syndromes s1 as a sum of the sequence of data elements, each multiplied by a selected power of an eight-bit array α that satisfies a selected primitive polynomial relation p(α)=α8+α4+α3+α2+1=0; and computing first and second checkbytes, c0 and c1, for the sequence of data elements as first and second linear combinations c0=s0·α230⊕s1·α232, c1=s0·α231⊕s1·α232.
  • 2. The method of claim 1, further comprising:analyzing said checkbytes, c0 and c1, together with said data element sequence, to determine when said data element sequence contains at least one data element error.
  • 3. The method of claim 1, further comprising selecting said integer N=24.
  • 4. The method of claim 1, further comprising selecting said integer N=43.
  • 5. A method of error control for a digital signal, the method comprising:providing a code word having a selected byte length N+1 and being expressible as an ordered sequence {In} (n=0, 1, . . . , N} of bytes, where In (=0 or 1) is a selected numerical coefficient; providing a primitive element α that satisfies a selected primitive polynomial equation p(α)=α8+α4+α3+α2+1=0; providing a selected sequence of eight-bit coefficients J(m)=αm (N1≦m≦N2) that are powers of the primitive α, where N1 and N2 are selected non-negative integers satisfying N1=230 and N2=237; computing a first (N+1)-tuple code word element, s0={s0[0], s0[1], . . . , s0[N]}, as a logical sum of the sequence of numerical values In (n=0, 1, . . . , N), all multiplied by a selected identity element 1; computing a second (N+1)-tuple code word element, s1={s1[0], s1[1], . . . , s1[N}}, as a logical sum of the products In·J(n+N1); providing and storing a selected sequence of elements h(k) (k=0, 1, . . . , N2−N1 [+2]), with each element being proportional to a selected power of the primitive element α; computing a first control element, c0, as a logical sum of products h(k+N1)·s0+h(k+N1+2)·s1 (k=0, 1, . . . , N2−N1); computing a second control element, c1, as a logical sum of products h(k+N1+1)·s0+h(k+N1+2)·s1 (k=0, 1, . . . , N2−N1); and interpreting the elements c0 and c1 as error control checkbytes for the code word {In}.
  • 6. The method of claim 5, further comprising:appending at least one of said first and second checkbytes, c0 and c1, to said sequence {In}.
  • 7. The method of claim 5, further comprising selecting said integer N=24.
  • 8. The method of claim 5, further comprising selecting said integer N=43.
US Referenced Citations (13)
Number Name Date Kind
3697948 Bossen Oct 1972 A
4404674 Rhodes Sep 1983 A
4703485 Patel Oct 1987 A
4706250 Patel Nov 1987 A
4833679 Anderson et al. May 1989 A
4849975 Patel Jul 1989 A
4928280 Nielson et al. May 1990 A
5040179 Chen Aug 1991 A
5422895 Nguyen et al. Jun 1995 A
5640286 Acosta et al. Jun 1997 A
5689727 Bonke et al. Nov 1997 A
5812564 Bonke et al. Sep 1998 A
5818855 Foxcroft Oct 1998 A
Non-Patent Literature Citations (1)
Entry
Stephen B. Wicker, “Error Control Systems for Digital Communication and Storage”, Prentice Hall, 1995.