1. Field of the Invention
The present invention relates to signal processing, and, in particular, to error-correction encoding and decoding techniques such as low-density parity-check (LDPC) encoding and decoding.
2. Description of the Related Art
In attempting to recover a correct low-density parity-check (LDPC)-encoded codeword, an LDPC decoder may encounter one or more trapping sets that prevent the decoder from properly decoding the codeword. Trapping sets, which represent subgraphs in a Tanner graph of an LDPC code, typically have a strong influence on error-floor characteristics of the LDPC code because a trapping set may force the decoder to converge to an incorrect result. To improve error-floor characteristics, an LDPC decoder may employ different techniques to, for example, (i) break the trapping sets and/or (ii) prevent the LDPC decoder from converging on trapping sets.
In one embodiment, the present invention is a method for recovering an error-correction (EC)-encoded codeword. For a current iteration, the method (a) receives a first set of input values and (b) generates a first check-node message based on the first set of input values and a first adjustment value. The first set of input values corresponds to the EC-encoded codeword, and each input value in the first set corresponds to a different bit of the EC-encoded codeword. Also, for the current iteration, the method (c) receives a second set of input values and (d) generates a second check-node message based on the second set of input values and a second adjustment value different from the first adjustment value. The second set of input values corresponds to the EC-encoded codeword, and each input value in the second set corresponds to a different bit of the EC-encoded codeword.
In another embodiment, the present invention is an apparatus for performing the method described above. The apparatus comprises an error-correction (EC) decoder for recovering the EC-encoded codeword. The EC decoder comprises at least first and second check-node units (CNUs). For a current iteration of the EC decoder, the first CNU receives the first set of input values and generates the first check-node message based on the first set of input values and the first adjustment value. Also, for the current iteration, the second CNU receives the second set of input values and generates the second check-node message based on the second set of input values and the second adjustment value, which is different from the first adjustment value.
Other aspects, features, and advantages of the present invention will become more fully apparent from the following detailed description, the appended claims, and the accompanying drawings in which like reference numerals identify similar or identical elements.
Reference herein to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments necessarily mutually exclusive of other embodiments. The same applies to the term “implementation.”
In general, LDPC decoder 200 decodes the 720 soft values Ln(0) (i.e., messages) using a block-serial message-passing schedule. The messages are updated using (i) 288 check-node units (CNUs) 210, where each CNU 210 performs check-node updates for one row (i.e., the mth check node) of H-matrix 100 and (ii) 72 five-bit variable-node units (VNUs) 204, where each VNU 204 performs the variable-node updates for ten columns (i.e., the nth variable nodes) of H-matrix 100. CNUs 210(0), . . . , 210(287) perform the check-node (i.e., row) updates for the 288 rows of H-matrix 100, one block column at a time, such that the check-node updates for the first block column (i.e., circulants B1,1, B2,1, B3,1, and B4,1) are performed, followed by the check-node updates for the second block column (i.e., circulants B1,2, B2,2, B3,2, and B4,2), followed by the check-node updates for the third block column (i.e., circulants B1,3, B2,3, B3,3, and B4,3), and so forth. VNUs 204(0), . . . , 204(71) then perform the variable-node (i.e., column) updates for the 720 columns of H-matrix 100, one block column at a time, such that the variable-node updates for the first block column (i.e., circulants B1,1, B2,1, B3,1, and B4,1) are performed, followed by the variable-node updates for the second block column (i.e., circulants B1,2, B2,2, B3,2, and B4,2), followed by the variable-node updates for the third block column (i.e., circulants B1,3, B2,3, B3,3, and B4,3), and so forth. An iteration of LDPC decoder 200 (i.e., a local iteration) is complete after all check-node updates and variable-node updates have been performed (i.e., one pass through LDPC decoder 200 has been performed).
Initially, the 720 five-bit soft values Ln(0) are provided to four multiplexers 206(0), . . . , 206(3) at a rate of 72 soft values Ln(0) per clock cycle such that each multiplexer 206 receives all 72 soft values Ln(0) in the set. Each multiplexer 206 also receives 72 five-bit variable-node messages (herein referred to as Q messages) from VNUs 204(0), . . . , 204(71), which are generated as discussed in further detail below. During the first iteration of LDPC decoder 200, multiplexers 206(0), . . . , 206(3) select the sets of 72 five-bit soft values Ln(0) that they receive to output to 72-way cyclic shifters 208(0), . . . , 208(3), respectively. The initial Q messages, which are not selected, may be Q messages generated for a previously considered codeword. During subsequent iterations of LDPC decoder 200, multiplexers 206(0), . . . , 206(3) select the sets of 72 five-bit Q messages that they receive from VNUs 204(0), . . . , 204(71) to output to 72-way cyclic shifters 208(0), . . . , 208(3), respectively. For the following discussion, it will be understood that any reference to Q messages, applies to soft values Ln(0) during the first iteration of LDPC decoder 200.
Cyclic shifters 208(0), . . . , 208(3) cyclically shift the sets of 72 five-bit Q messages that they receive based on a cyclic-shift signal that may be received from, for example, controller 214. The cyclic-shift signal corresponds to cyclic-shift factors of the circulants of H-matrix 100 of
Each CNU 210 (i) receives a number of five-bit Q messages equal to the hamming weight wr of a row of H-matrix 100 (e.g., 10) at a rate of one Q message per clock cycle and (ii) generates wr five-bit check-node messages (herein referred to as R messages). Each R message may be generated using a suitable check-node algorithm, such as the offset min-sum algorithm, characterized by Equations (1), (2), and (3) shown below:
where (i) Rnm(i) represents the R message corresponding to mth check node (i.e., row) and the nth variable node (i.e., column) of H-matrix 100 of
The particular offset value βm used by each CNU 210 may be selected, for example, by controller 214. Controller 214 may select offset values β0 to β287 such that all 288 offset values are equal to one another, or controller 214 may select offset values β0 to β287 such that the 288 offset values have anywhere from 2 to 288 different values. For this discussion, suppose that upon startup controller 214 sets offset values β0 to β287 equal to an initial offset value βm(0) (e.g., 0), that may be determined experimentally and that may vary based on code parameters. As discussed below, if after a specified number of iterations, LDPC decoder 200 encounters a trapping set, then the offset values βm may be modified in an attempt to overcome the trapping set.
During each of the first ten clock cycles, M1_M2 finder 302 receives a five-bit Q message in two's-complement format. M1_M2 finder 302 converts each five-bit Q message from two's-complement format to a five-bit sign-magnitude value using two's-complement-to-sign-magnitude (2TSM) converter 312. The sign bit 322 of the sign-magnitude value is provided to sign processing logic 328, which (i) generates a product of the sign bits 322 of all ten Q messages and (ii) multiplies each of the sign bits 322 by the product to generate a different sign bit (i.e., an R sign bit 334) for each of the ten R messages. The four-bit magnitude |Q|[3:0] of the five-bit sign-magnitude value Q[4:0] is provided to multiplexer (MUX) 320 along with the four-bit smallest magnitude value M1 and the four-bit second-smallest magnitude value M2 stored in partial state registers 330(0) and 330(1) of partial state memory 304, respectively. In addition, the four-bit magnitude value |Q|[3:0] is provided to flip-flop (FF) 314, which synchronizes the timing of CNU 300 with the clock signal of LDPC decoder 200.
Minimum operator 316(0) compares the magnitude value |Q| to smallest magnitude value M1 stored in register 330(0). If the magnitude value |Q| is smaller than smallest magnitude value M1, then minimum operator 316(0) asserts control signal 318(0) (i.e., sets 318(0) equal to 1). Otherwise, minimum operator 316(0) de-asserts control signal 318(0) (i.e., sets 318(0) equal to 0). Similarly, minimum operator 316(1) compares the magnitude value |Q| to second-smallest magnitude value M2 stored in register 330(1). If the magnitude value |Q| is smaller than M2, then control signal 318(1) is asserted. Otherwise, control signal 318(1) is de-asserted. To further understand the operation of MUX 320, consider the logic table of Table I for magnitude value |Q|.
Table I shows that, if control signals 318(0) and 318(1) are both de-asserted (i.e., |Q|≧M1 and M2), then magnitude value |Q| is discarded, and the previously stored smallest and second-smallest magnitude values M1 and M2 are retained in M1 register 330(0) and M2 register 330(1), respectively. If control signal 318(0) is de-asserted and control signal 318(1) is asserted (i.e., M2≧|Q|≧M1), then (i) smallest magnitude value M1 is retained in M1 register 330(0), (ii) magnitude value |Q| is stored in M2 register 330(1), and (iii) previously stored second-smallest magnitude value M2 is discarded. If control signals 318(0) and 318(1) are both asserted (i.e., |Q|≦M1 and M2), then (i) magnitude value |Q| is stored in M1 register 330(0), (ii) the previously stored smallest value M1 is stored in M2 register 330(1), and (iii) the second-smallest value M2 is discarded. In addition to storing magnitude value |Q| in M1 register 330(0), M1_index register 330(2) is enabled, counter value 326 (generated by counter 324) corresponding to the new smallest value M1 is stored in M1_index register 330(2), and the counter value previously stored in M1_index register 330(2) is discarded. Note that it is not possible that control signal 318(0) will be asserted and control signal 318(1) will be de-asserted because this would indicate that the magnitude value |Q| is smaller than smallest magnitude value M1 but larger than second-smallest magnitude value M2. Also, before the first clock cycle, the smallest and second-smallest magnitude values M1 and M2 are initialized to suitably large values (e.g., binary 1111), and M1_index is initialized to 0.
After all ten Q messages have been considered, processing logic 332 of offset-and-sign-magnitude-to-two's-complement (SMT2) processor 306 offsets four-bit smallest magnitude value M1 and four-bit second-smallest magnitude value M2 by offset value βm as shown in Equation (1) to generate four-bit offset smallest magnitude value M1′ and four-bit offset second-smallest magnitude value M2′. Processing logic 332 converts four-bit offset smallest magnitude value M1′ into two's-complement format and appends a positive sign bit to generate a five-bit positive value (+M1′), which is subsequently stored in register 336(0) of final-state processor 308. Processing logic 332 also converts four-bit offset smallest magnitude value M1′ into two's-complement format and appends a negative sign bit to generate a five-bit negative value (−M1′), which is subsequently stored in register 336(1). In addition, if R sign bit 334 from sign processing logic 328 is a positive sign bit (0), then processing logic 332 converts four-bit offset second-smallest magnitude value M2′ into a five-bit positive two's-complement value (+M2′) for storage in register 336(2). If R sign bit 334 from sign processing logic 328 is a negative sign bit (1), then processing logic 332 converts four-bit offset second-smallest magnitude value M2′ into a five-bit negative two's-complement value (−M2′) for storage in register 336(2). Register 336(3) of final-state processor 308 stores the counter value M1_INDEX from M1_index register 330(2).
During each of the next ten clock cycles, MUX 342 of R selector 310 outputs a five-bit R message based on (1) the positive value (+M1′), (2) the negative value (−M1′), (3) the positive or negative value (±M2′), (4) a comparison bit 340 from comparison operator 338, and (5) the corresponding sign bit 334 stored in sign processing logic 328. Each comparison bit 340 is generated by comparing current counter value 326 to the M1_index value stored in register 336(3). When the two are equal, comparison bit 340 is asserted, and when the two are not equal, comparison bit 340 is de-asserted. Each sign bit 334 may be generated as δmn(i) using Equation (3), or alternatively, in the event that sign processing logic 328 is implemented using a FIFO, by multiplying a stored sign bit 322, as it is output from the FIFO, by the product of all sign bits 322 stored in sign processing logic 328. To further understand how R messages are output from MUX 342, consider the logic table of Table II.
Table II shows that, if both comparison bit 340 and sign bit 334 are de-asserted, then the positive value (+M1′) stored in register 336(0) will be output as the five-bit R message. If comparison bit 340 is de-asserted and sign bit 334 is asserted, then the negative value (−M1′) stored in register 336(1) will be output as the five-bit R message. If comparison bit 340 is asserted and sign bit 334 is de-asserted, then the positive value (+M2′) will have been stored in register 336(2) and will now be output as the five-bit R message. If both comparison bit 340 and sign bit 334 are asserted, then the negative value (−M2′) will have been stored in register 336(3) and will now be output as the five-bit R message.
Referring back to
Cyclic shifters 212(0), . . . , 212(3) provide 4×72 cyclically shifted five-bit R messages to VNUs 204(0), . . . , 204(71), such that each VNU 204 receives four of the R messages, one from each cyclic shifter 212. Each VNU 204 updates each of the four five-bit Q messages that it generates as shown in Equation (4):
where m′ is a check node in the set M(n)/m of all check nodes connected to the nth variable node except the mth check node (i.e., m′εM(n)/m). The nth variable node generates message Qnm(i) based on (i) all R messages received during the previous (i−1)th iteration from the set M(n)/m and (ii) an initial soft value Ln(0) received from soft value memory 202 that corresponds to the nth variable node. Each VNU 204, which may be implemented using adder circuits, outputs the four updated five-bit Q messages that it generates, such that a different one of the four messages is provided to a different corresponding MUX 206.
In addition to outputting four updated five-bit Q messages, each VNU 204 outputs (i) a seven-bit extrinsic LLR value, (ii) a hard-decision output bit, and (iii) an eight-bit P value. Each seven-bit extrinsic LLR value may be represented as shown in Equation (5):
where m is a check node in the set M(n) of all check nodes connected to the nth variable node (i.e., mεM(n)). Each eight-bit P value may be generated using Equation (6) as follows:
each hard-decision bit {circumflex over (x)}n may be generated based on Equations (7) and (8) below:
{circumflex over (x)}n=0 if Pn≧0 (7)
{circumflex over (x)}n=1 if Pn≦0. (8)
Pn is determined for each variable node by adding the extrinsic value from Equation (5) to the initial soft value Ln(0) received from soft-value memory 202 that corresponds to the nth variable node. If Pn is greater than or equal to zero, then the hard-decision bit {circumflex over (x)}n is equal to zero, as shown in Equation (7). If Pn is less than zero, then the hard-decision bit {circumflex over (x)}n is equal to one, as shown in Equation (8).
A parity check is then performed by, for example, a syndrome check calculator, using the hard-decision bits {circumflex over (x)}n to determine whether LDPC decoder 200 has possibly converged on a valid codeword. In particular, a 720-element vector {circumflex over (x)} formed from 720 hard-decision bits {circumflex over (x)}n output from VNUs 204(0), . . . , 204(71) during ten clock cycles is multiplied by the transpose HT of H-matrix 100 of
If each element of the resulting 288-bit vector is equal to zero (i.e., {circumflex over (x)}HT=0), then LDPC decoder 200 has converged on a valid codeword and a cyclic-redundancy check (CRC) may be performed by, for example, controller 214 to determine whether the valid codeword is the correct codeword (i.e., the codeword that was transmitted). When a CRC is performed, typically a number r of CRC bits are appended to the user data at the transmitter before LDPC encoding such that, upon decoding, the 720-element vector {circumflex over (x)} output from VNUs 204(0), . . . , 204(71) comprises (i) the user data transmitted by the transmitter and (ii) the r CRC bits. To perform the CRC, the user data may be divided by a keyword that is known a priori by the receiver and the remainder of the division process may be compared to the r CRC bits. If the remainder is equal to the r CRC bits, then LDPC decoder 200 has converged on the correct codeword. If the remainder is not equal to the r CRC bits, then LDPC decoder 200 has not converged on the correct codeword.
If, after a predetermined number of iterations, LDPC decoder 200 does not converge on the correct codeword, then controller 214 may (i) check for the number of unsatisfied check nodes and (ii) compare the number of unsatisfied check nodes to a specified threshold value (e.g., 16). The specified threshold value, which may be determined experimentally, may be used to predict whether LDPC decoder 200 has (i) converged on a trapping set or (ii) experienced an error in the communication channel that does not correspond to convergence on a trapping set. If the number of unsatisfied check nodes is greater than or equal to the specified threshold value, then it is likely that LDPC decoder 200 has experienced an error in the communication channel. Such errors may result from, for example, a flaw on the platter of a hard-disk drive or excessive noise in the communication channel. When such errors occur, further action, such as retransmission of the data, may be needed to recover the correct codeword. In some cases, LDPC decoder 200 might not be capable of recovering the correct codeword.
If the number of unsatisfied check nodes is less than the specified threshold value, then it is likely that LDPC decoder 200 has converged on a trapping set. A trapping set, which may be defined as a set of w variable nodes that converges on a syndrome having a set of v odd-degree check nodes (i.e., unsatisfied check nodes) and an arbitrary number of even-degree check nodes (i.e., satisfied and/or missatisfied check nodes), may be caused by the passing of incorrect information between the check nodes and variable nodes. To further understand how a trapping set may result from the passing of incorrect information, consider
Typically, when a trapping set is encountered, the messages from missatisfied check nodes m, (m+2), and (m+3) override the messages from unsatisfied check node (m+1). For example, suppose that variable node (n+1) receives (i) one message from unsatisfied check node (m+1) indicating that the hard-decision bit of variable node (n+1) is incorrect and (ii) two messages from missatisfied check nodes m and (m+2) indicating that the hard-decision bit of variable node (n+1) is correct. In updating the hard-decision bit of variable node (n+1), the three messages are added together along with the initial soft-value as shown in Equation (6).
If the confidence values of the messages from missatisfied check nodes m and (m+2) together are greater than the confidence value of the message from unsatisfied check node (m+1), then the missatisfied check-node messages may steer variable node (n+1) toward an incorrect hard-decision bit (represented as shown in Equations (7) and (8)). As subsequent iterations are performed, and as the confidence values of the messages from missatisfied check nodes m and (m+2) together increase over the confidence value of the message from unsatisfied check node (m+1), the decoder may become trapped, making it difficult to recover the correct hard-decision bit for variable node (n+1). Typically, when the decoder converges on a trapping set after several iterations, the incorrect messages from the missatisfied check nodes are already relatively strong (i.e., have relatively large confidence values).
If, on the other hand, the confidence values of the messages from missatisfied check nodes m and (m+2) together are less than the confidence value of the message from unsatisfied check node (m+1), then the unsatisfied check-node message may steer the decoder away from the trapping set, thereby enabling the decoder to recover the correct hard-decision bit for variable node (n+1).
In theory, after a trapping set has been encountered, the confidence values of the check-node messages may be adjusted to break the trapping set. The confidence values of the check-node messages may be adjusted by, for example, adjusting offset values βm from the initial offset value βm(0). Breaking trapping sets can be efficiently achieved by (i) changing offset values βm relative to the initial offset βm(0) to increase the confidence values of messages corresponding to unsatisfied check nodes (i.e., strengthening the unsatisfied check-node messages) such that the unsatisfied check-node messages override the missatisfied check-node messages and/or (ii) changing offset values βm relative to the initial offset βm(0) to decrease confidence values of messages corresponding to missatisfied check-node messages (i.e., weakening the unsatisfied check-node messages) such that the unsatisfied check-node messages override the missatisfied check-node messages.
In practice, it is relatively easy to identify the locations of unsatisfied check nodes, but it may be relatively difficult, if not impossible, to identify the locations of missatisfied check nodes with certainty. The locations of the unsatisfied check nodes may be identified by looking at the location of the ones in the syndrome. The locations of the missatisfied check nodes, on the other hand, typically cannot be identified by looking at the syndrome because missatisfied check nodes falsely appear as being satisfied (i.e., having a value of zero). Since any check node corresponding to a syndrome value of zero is a possible missatisfied check node, the decoder could treat all such check nodes (i.e., all satisfied and missatisfied check nodes) alike by weakening the messages from all satisfied and missatisfied check nodes. However, weakening the messages from all satisfied and missatisfied check nodes might not be preferable because this would involve weakening messages that are correct (i.e., the check node messages corresponding to the satisfied check nodes).
As an alternative, the decoder could attempt to approximate the locations of the missatisfied check nodes to minimize or prevent weakening of satisfied check nodes. For example, suppose that, after the specified number of iterations, LDPC decoder 200 converges on a set CUSC of unsatisfied check nodes (e.g., node (m+1)ε CUSC in
Once the set CUSC of unsatisfied check nodes and the approximated set CVUSC/CUSC of missatisfied check nodes are ascertained, the messages corresponding to the check nodes in the set CUSC of unsatisfied check nodes may be strengthened and the messages corresponding to the check nodes in the approximated set CVUSC/CUSC of missatisfied check nodes may be weakened.
To strengthen the check-node messages generated for the set CUSC of unsatisfied check nodes, the offset values βm corresponding to each unsatisfied check node in the set CUSC may be increased or decreased relative to the initial offset value βm(0) depending on whether the LDPC decoder performs offsetting using addition or subtraction. For example, if the decoder subtracts offset values βm as shown in Equation (1), then decreasing the offset values βm relative to initial offset value βm(0) increases the confidence values of the check-node messages. If, on the other hand, the decoder adds offset values βm, then increasing the offset values βm relative to initial offset value βm(0) increases the confidence values of the check-node messages.
To weaken the check-node messages generated for the approximated set CVUSC/CUSC of missatisfied check nodes, the offset values βm corresponding to each check node in the approximated set CVUSC/CUSC may also be increased or decreased relative to the initial offset value βm(0) depending on whether the LDPC decoder performs offsetting using addition or subtraction. For example, if the decoder subtracts offset values βm as shown in Equation (1), then increasing the offset values βm relative to initial offset value βm(0) decreases the confidence values of the check-node messages. If on the other hand, the decoder adds offset values βm, then decreasing the offset values βm relative to initial offset value βm(0) decreases the confidence values of the check-node messages.
The particular offset values βm applied for the set CUSC of unsatisfied check nodes and/or the particular offset values βm applied for the approximated set CVUSC/CUSC of check nodes may be selected by, for example, controller 214. Note that the offset values βm do not need to be the same for all check nodes in the set CUSC or for all check nodes in the approximated set CVUSC/CUSC. These values should preferably be selected such that the correct messages from the unsatisfied check nodes sufficiently disturb the incorrect messages from the missatisfied check nodes.
By selectively strengthening unsatisfied check nodes and/or selectively weakening missatisfied check nodes to break trapping sets, the present invention may improve error-floor characteristics of LDPC codes. The present invention may be implemented in existing LDPC decoder structures with little or no hardware modifications or may be implemented in new LDPC decoder structures.
Determining whether the decoder has encountered a trapping may be performed using any suitable method. For example, as described above, the controller may compare the number of unsatisfied check nodes after a specified number of iterations of the decoder to a specified threshold value. If the number of unsatisfied check nodes is greater than or equal to the specified threshold value, then it is likely that LDPC decoder 200 has experienced an error in the communication channel. If the number of unsatisfied check nodes is less than the specified threshold value, then it is likely that LDPC decoder 200 has converged on a trapping set. As another example, the decoder could track the number of unsatisfied check nodes over several iterations. If, over several iterations, the number of unsatisfied check nodes is relatively stable, then this could be indicative of a trapping set. This method may be implemented by tracking the variance of the number of unsatisfied check nodes over several iterations. If the variance is less than a specified threshold value, then the LDPC decoder may suppose that a trapping set has been encountered. This later example may be advantageous when the decoder converges on a trapping set before the specified number of iterations. By identifying a trapping set before the specified number of iterations, the decoder can avoid performing unnecessary iterations. As yet another example, the decoder could determine whether (i) the vector resulting from {circumflex over (x)}HT possess a number (bobserved) of unsatisfied check nodes that is greater than zero and less than a pre-defined threshold bmax (e.g., 16) and (ii) the particular configuration of unsatisfied check nodes has remained relatively stable (i.e., the number and locations of the unsatisfied check nodes has not changed) for several iterations of the LDPC decoder (e.g., two or three iterations). As yet still another example, the decoder could determine whether (i) the vector resulting from {circumflex over (x)}HT possess a number (bobserved) of unsatisfied check nodes greater than zero and less than a pre-defined threshold bmax (e.g., 16), and (ii) the particular configuration of unsatisfied check nodes has remained relatively stable (i.e., unchanged) for several global iterations (e.g., two global iterations).
If the controller determines in decision 508 that the decoder has not converged on a trapping set, then the decoder may determine whether or not to continue decoding (decision 510). For example, if the number of unsatisfied check nodes is relatively large (e.g., greater than 16), then, as described above, the decoder might have experienced an error in the communication channel. In such a case, it might not be possible for the decoder to recover the correct codeword, and the controller might initiate further actions (step 512) such as request a retransmission of the data. If the decoder determines in decision 510 to continue decoding, then processing returns to step 504 for more decoding.
If the controller determines in decision 508 that the decoder has converged on a trapping set, then, in step 514, the controller (i) identifies the locations of the unsatisfied check nodes and/or (ii) approximates the locations of the missatisfied check nodes using, for example, the method described above. After identifying the locations of the unsatisfied check nodes and/or approximating the locations of the missatisfied check nodes, the controller (i) selects, in step 516, new offset values βm for the unsatisfied check nodes and/or missatisfied check nodes and (ii) continues, in step 518, decoding using the new offset values βm. If the decoder converges within a specified number of iterations (decision 520), then decoding is stopped and a CRC check may be performed as described above. If the decoder does not converge within a specified number of iterations (decision 520), then further actions (step 522) may be taken to break the trapping set. For example, the controller could again select new offset values βm and attempt to recover the correct codeword. Various other alternative actions may be taken to break the trapping set.
Although the present invention was described relative to strengthening and weakening check-node messages by changing offset values βm, the present invention is not so limited. Strengthening and weakening may be performed using scaling factors αm rather than, or in addition to, offset values βm. Each check-node message generated using a scaling factor αm may be represented as shown in Equation (9) below:
Rnm(i)=δnm(i)αmκnm(i) (9)
Suppose that an initial scaling factor αm(0) is selected. To strengthen check-node messages generated by unsatisfied check nodes, the scaling factor αm may be increased and, to weaken check-node messages generated by missatisfied check nodes, the scaling factor αm may be decreased. Check-node messages generated using both a scaling factor αm and offset value βm may be represented as shown in Equation (10) below:
Rnm(i)=δnm(i)max(αmκnm(i)−βm,0 (10)
According to various embodiments, LDPC decoders of the present invention may apply only strengthening or only weakening rather than both strengthening and weakening. For example, according to some embodiments, the messages generated by the check nodes in the set CVUSC of check nodes may be weakened. Note that, in this example, the messages generated by the set CUSC of unsatisfied check nodes are also weakened since the set CUSC is a subset of the set CVUSC. Further, the messages generated by the satisfied check nodes that are not in the set CVUSC are not weakened at all.
Although the present invention has been described relative to the specific non-layered LDPC decoder configuration 200 of
According to various embodiments, the present invention may be implemented using check-node algorithms other than the offset min-sum algorithm. For example, such embodiments may use a scaled min-sum algorithm, or any soft-input/soft-output algorithms other than the min-sum algorithm, such as a sum-product algorithm (SPA) or the Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm.
Although the present invention was described relative to the specific H-matrix 100 of
It will be further understood that various changes in the details, materials, and arrangements of the parts which have been described and illustrated in order to explain the nature of this invention may be made by those skilled in the art without departing from the scope of the invention as expressed in the following claims. For example, rather than receiving Q messages and outputting R messages using two's-complement format, CNU 300 may receive and output messages in another format such as sign-magnitude format. Also, two's-complement-to-sign-magnitude conversion may be performed by, for example, the VNUs. As yet another example, LDPC decoders of the present invention may process messages of sizes other than five bits. As even yet another example, scaling and/or offsetting may be applied at a location other than that shown for processing logic 332 of
Although embodiments of the present invention have been described in the context of LDPC codes, the present invention is not so limited. Embodiments of the present invention could be implemented for any code that can be defined by a graph, e.g., tornado codes and structured irregular repeat-accumulate (IRA) codes, since graph-defined codes suffer from trapping sets.
While the exemplary embodiments of the present invention have been described with respect to processes of circuits, including possible implementation as a single integrated circuit, a multi-chip module, a single card, or a multi-card circuit pack, the present invention is not so limited. As would be apparent to one skilled in the art, various functions of circuit elements may also be implemented as processing blocks in a software program. Such software may be employed in, for example, a digital signal processor, micro-controller, or general purpose computer.
The present invention can be embodied in the form of methods and apparatuses for practicing those methods. The present invention can also be embodied in the form of program code embodied in tangible media, such as magnetic recording media, optical recording media, solid state memory, floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. The present invention can also be embodied in the form of program code, for example, whether stored in a storage medium, loaded into and/or executed by a machine, or transmitted over some transmission medium or carrier, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. When implemented on a general-purpose processor, the program code segments combine with the processor to provide a unique device that operates analogously to specific logic circuits. The present invention can also be embodied in the form of a bitstream or other sequence of signal values electrically or optically transmitted through a medium, stored magnetic-field variations in a magnetic recording medium, etc., generated using a method and/or an apparatus of the present invention.
Unless explicitly stated otherwise, each numerical value and range should be interpreted as being approximate as if the word “about” or “approximately” preceded the value of the value or range.
The use of figure numbers and/or figure reference labels in the claims is intended to identify one or more possible embodiments of the claimed subject matter in order to facilitate the interpretation of the claims. Such use is not to be construed as necessarily limiting the scope of those claims to the embodiments shown in the corresponding figures.
It should be understood that the steps of the exemplary methods set forth herein are not necessarily required to be performed in the order described, and the order of the steps of such methods should be understood to be merely exemplary. Likewise, additional steps may be included in such methods, and certain steps may be omitted or combined, in methods consistent with various embodiments of the present invention.
Although the elements in the following method claims, if any, are recited in a particular sequence with corresponding labeling, unless the claim recitations otherwise imply a particular sequence for implementing some or all of those elements, those elements are not necessarily intended to be limited to being implemented in that particular sequence.
This application claims the benefit of the filing date of U.S. provisional application No. 61/089,297, filed on Aug. 15, 2008 as, the teachings all of which are incorporated herein by reference in their entirety. The subject matter of this application is related to U.S. patent application Ser. No. 12/113,729 filed May 1, 2008, U.S. patent application Ser. No. 12/113,755 filed May 1, 2008, U.S. patent application Ser. No. 12/323,626 filed Nov. 26, 2008, U.S. patent application Ser. No. 12/401,116 filed Mar. 10, 2009, PCT patent application no. PCT/US08/86523 filed Dec. 12, 2008, PCT patent application no. PCT/US08/86537 filed Dec. 12, 2008, PCT patent application no. PCT/US09/39918 filed Apr. 8, 2009, PCT application no. PCT/US09/39279 filed on Apr. 2, 2009, U.S. patent application Ser. No. 12/420,535 filed Apr. 8, 2009, U.S. patent application Ser. No. 12/475,786 filed Jun. 1, 2009, U.S. patent application Ser. No. 12/260,608 filed on Oct. 29, 2008, PCT patent application no. PCT/US09/41215 filed on Apr. 21, 2009, U.S. patent application Ser. No. 12/427/786 filed on Apr. 22, 2009, U.S. patent application Ser. No. 12/492,328 filed on Jun. 26, 2009, U.S. patent application Ser. No. 12/492,346 filed on Jun. 26, 2009, U.S. patent application Ser. No. 12/492,357 filed on Jun. 26, 2009, and U.S. patent application Ser. No. 12/492,374 filed on Jun. 26, 2009, the teachings of all of which are incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
6307901 | Yu et al. | Oct 2001 | B1 |
6888897 | Nazari et al. | May 2005 | B1 |
7181676 | Hocevar | Feb 2007 | B2 |
7237181 | Richardson | Jun 2007 | B2 |
7340671 | Jones et al. | Mar 2008 | B2 |
7739558 | Farjadrad et al. | Jun 2010 | B1 |
7752523 | Chaichanavong et al. | Jul 2010 | B1 |
7805642 | Farjadrad | Sep 2010 | B1 |
7895500 | Sun et al. | Feb 2011 | B2 |
7904793 | Mokhlesi et al. | Mar 2011 | B2 |
7941737 | Gopalakrishnan et al. | May 2011 | B2 |
8010869 | Wehn et al. | Aug 2011 | B2 |
8020078 | Richardson | Sep 2011 | B2 |
8046658 | Heinrich et al. | Oct 2011 | B2 |
8127209 | Zhang et al. | Feb 2012 | B1 |
8151171 | Blanksby | Apr 2012 | B2 |
8156409 | Patapoutian et al. | Apr 2012 | B2 |
20020062468 | Nagase et al. | May 2002 | A1 |
20020166095 | Lavi et al. | Nov 2002 | A1 |
20050193320 | Varnica et al. | Sep 2005 | A1 |
20050204255 | Yeh et al. | Sep 2005 | A1 |
20050283707 | Sharon et al. | Dec 2005 | A1 |
20060107181 | Dave et al. | May 2006 | A1 |
20060285852 | Xi et al. | Dec 2006 | A1 |
20070011569 | Vila Casado et al. | Jan 2007 | A1 |
20070011573 | Farjadrad et al. | Jan 2007 | A1 |
20070011586 | Belogolovyi et al. | Jan 2007 | A1 |
20070044006 | Yang et al. | Feb 2007 | A1 |
20070071009 | Nagaraj et al. | Mar 2007 | A1 |
20070089018 | Tang et al. | Apr 2007 | A1 |
20070124652 | Litsyn et al. | May 2007 | A1 |
20070147481 | Bottomley et al. | Jun 2007 | A1 |
20070153943 | Nissila | Jul 2007 | A1 |
20070162788 | Moelker | Jul 2007 | A1 |
20070220408 | Huggett et al. | Sep 2007 | A1 |
20070234178 | Richardson et al. | Oct 2007 | A1 |
20070234184 | Richardson | Oct 2007 | A1 |
20080082868 | Tran et al. | Apr 2008 | A1 |
20080104485 | Lyakh et al. | May 2008 | A1 |
20080109701 | Yu et al. | May 2008 | A1 |
20080126910 | Venkatesan et al. | May 2008 | A1 |
20080148129 | Moon et al. | Jun 2008 | A1 |
20080163032 | Lastras-Montano | Jul 2008 | A1 |
20080235561 | Yang | Sep 2008 | A1 |
20080276156 | Gunnam et al. | Nov 2008 | A1 |
20080301521 | Gunnam et al. | Dec 2008 | A1 |
20090083609 | Yue et al. | Mar 2009 | A1 |
20090150745 | Langner et al. | Jun 2009 | A1 |
20090235146 | Tan et al. | Sep 2009 | A1 |
20090273492 | Yang et al. | Nov 2009 | A1 |
20090319860 | Sharon et al. | Dec 2009 | A1 |
20100042806 | Gunnam | Feb 2010 | A1 |
20100042890 | Gunnam | Feb 2010 | A1 |
20100050043 | Savin | Feb 2010 | A1 |
Number | Date | Country |
---|---|---|
WO03092170 | Nov 2003 | WO |
WO2004079563 | Sep 2004 | WO |
WO2008004215 | Jan 2008 | WO |
WO 2010019168 | Feb 2010 | WO |
Number | Date | Country | |
---|---|---|---|
20100042897 A1 | Feb 2010 | US |
Number | Date | Country | |
---|---|---|---|
61089297 | Aug 2008 | US |