Information
-
Patent Application
-
20020129318
-
Publication Number
20020129318
-
Date Filed
January 10, 200123 years ago
-
Date Published
September 12, 200222 years ago
-
Inventors
-
Original Assignees
-
CPC
-
US Classifications
-
International Classifications
Abstract
This invention is a Viterbi algorithm combined with the use of error filters outputs to produce bit reliabilities. The present invention is a SOVA-like method using error filters to reduce the complexity of bit reliability determination further than that of the ordinary SOVA method. Error patterns corresponding to each of a handful of dominant i.e., most common error patterns are determined from experimental data. Error filters determine likelihoods of each postulated error pattern. These likelihoods are then combined to produce bit reliabilities that may be passed on to an outer error correction decoder. The filters, typically six or seven of them, resolve most of the errors thereby simplifying computation dramatically.
Description
PARTIAL WAIVER OF COPYRIGHT
[0001] All of the material in this patent application is subject to copyright protection under the copyright laws of the United States and of other countries. As of the first effective filing date of the present application, this material is protected as unpublished material. However, permission to copy this material is hereby granted to the extent that the copyright owner has no objection to the facsimile reproduction by anyone of the patent documentation or patent disclosure, as it appears in the United States Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0002] Not Applicable
BACKGROUND OF THE INVENTION
[0003] 1. Field of the Invention
[0004] The invention relates to a Soft Output Viterbi Algorithm. More particularly, the invention is a simplified method and apparatus for more easily computing and providing bit reliabilities in combination with a Viterbi algorithm on a processing unit.
[0005] 2. The Prior Art
[0006] The Viterbi algorithm is used for detecting data possibly corrupted by noise in movement of data through communications or recording systems. The algorithm computes the most likely sequence written on the recording given the received noisy data. The output is consistent with some constraints on the sequences that are allowed to be written.
[0007] a. Ordinary SOVA
[0008] A channel trellis is a diagram defined by states and branches that describes the “ideal” sequence of outputs to a sequence of inputs. For instance, an Inter-Symbol Interference (ISI) channel trellis, determined by a linear channel impulse response such as Partial Response Class 4 (PR4), Extended Partial Response Class 4 (EPR4) or Extended2 Partial Response Class 4 (E2PR4) describes the ideal response of such a channel to any possible sequence of binary Non-Return to Zero (NRZ) inputs.
[0009] For simplicity, an assumption is made that the trellis is a possibly “pruned” version of a standard ISI channel trellis diagram with memory v. The states are binary v-tuples, and for u=0 or 1, there is a branch from state (x−v . . . x−1) to (x−v+1 . . . x−1u). Each branch has an input label (u) and output label (the ideal channel response to the input sequence (x−v . . . x−1u).
[0010] The “pruning” may be the consequence of a constraint (such as MTR) on the channel inputs designed to improve the performance of the detection process.
[0011] If the channel detector is designed to pass soft information to a code whose codewords are in some domain other than NRZ (e.g., NRZI, PR4), then the approach described here could be modified accordingly.
[0012] Naturally, an assumption is made that the ideal sequence of channel outputs is corrupted by a noise source. The Bahl, Cocke, Jelinek, Raviv (BCJR) algorithm, produces exact a posteriori probabilities (APP) for each bit, assuming that the noise is uncorrelated and data-independent (for instance, Additive White Gaussian Noise (AWGN)). These APP probabilities can be used as soft-decision inputs passed on to other modules in the detection/decoding process, such as a turbo decoder or low density parity check (LDPC) decoder.
[0013] Experimental results on test-stand data show that the BCJR algorithm, in conjunction with low density parity check codes, performs quite well—in spite of the fact that the test-stand noise is typically correlated and data-dependent. But the complexity of the BCJR algorithm may prove too costly for implementation.
[0014] SOVA (soft output Viterbi algorithm) is a method for producing approximate APP's at a lower computational cost than BCJR. The estimates produced by SOVA are based on Viterbi margins (i.e., differences between the metric of a survivor path and its non-surviving path in the Viterbi algorithm). SOVA was introduced by Hagenauer and Hoeher in “A Viterbi Algorithm with Soft Decision Outputs and its Applications”, Proceedings of Globecom, 1989, pp. 1680-1686.
[0015] b. Description of Algorithm
[0016] SOVA begins with an ordinary run of the Viterbi algorithm on a long block (of length N) of data. The branch metrics are ordinarily determined by the received channel sample rj and the ideal channel output w on the branch: ∥rj−w∥2; but prior information from previous LDPC iterations may be incorporated in the branch metrics (by adding a term of the form log p where p is the prior probability that the j-th data bit equals the branch input label).
[0017] At each bit position j, in between 1 and N, the Viterbi algorithm computes and outputs a detected data bit xj. As is well known this requires a delay equal to the so-called path memory, denoted M (typically, N will be much larger than M). SOVA requires an additional delay, denoted Δ, within which one makes use of Viterbi margins.
[0018] At bit position j, after a delay of Δ+M, the Viterbi detector will have detected data bits in positions up to j+Δ. For each k=j+1, . . . , j+Δ, the detected path up to position k will be a survivor path. As such, it will have at most one non-surviving (runner-up) path ending at the same state (it may have no such paths if the trellis has been pruned). Call this non-surviving path pk, and let mk denote the Viterbi margin (i.e., the difference between the metric of the detected path up to time k and the metric of Pk) The algorithm is concerned only with those pk that would result in a different value for the j-th data bit, i.e.
(pk)j≠xj.
[0019] Such a k is called j-qualified. So, for bit position j, Viterbi margins are computed only for those k that are j-qualified. FIG. 1 illustrates a non-surviving path pk (100) for a j-qualified k as described in the prior art.
[0020] For the j-th bit position SOVA will output
1
[0021] where the minimum runs over all j-qualified k such that j+1≦k≦j+Δ. As shown in J. Hagenauer and E. Offer and L. Papke, “Iterative Decoding of Binary Block and Convolutional Codes”, IEEE Transactions on Information Theory, March, v.42, 1996, pp 429-445, this quantity is an approximation to the true APP log-likelihood:
2
[0022] where rj denotes the received sequence of samples up to time j+Δ+M and {overscore (χj)}, denotes the binary complement of χj.
[0023] c. Access to the non-surviving path pk
[0024]
FIG. 2 illustrates a Soft Output Viterbi Algorithm Decoder (200) as described in the prior art. Signals are input into the decoder (200) from a channel (202). The signals pass through an equalizer (204) and into the primary decoding stages of the SOVA. The non-surviving path pk could be obtained from the Viterbi detector with a delay of time M. But then each state s and each i=1, I . . . , M, would require an enormous buffer to store all the non-surviving paths ending at state s at time slot k-i.
[0025] An alternative would be to use a second Viterbi detector (212), V2, operating with delay M (210) with respect to the first Viterbi detector (206), V1. Then V1 (206) would provide the detected data path with delay M (210), and V2 (212) would provide the non-surviving path pk. This is described as follows.
[0026] First, a buffer is needed, detected buffer (208) DB in FIG. 2, to store the last Δ detected bits: xk−Δ+1 . . . xk. At time slot k+M, this buffer is updated by shifting one unit to the left and filling in the right-most position with the newly detected bit xk from V1 (206). If Δ≧v (i.e., the look-ahead is at least as large as the channel trellis memory), then the ending state sk of the detected path can be read directly from DB (208) and fed to V2 (212). The differences between the Viterbi detectors V1 (206) and V2 (212) are:
[0027] 1—V2 (212) has path memory Δ instead of M.
[0028] 2—At time slot k+M, V2 (212) computes all survivor paths ending at bit position k instead of k+M.
[0029] In all other respects, V2 (212) operates exactly the same as V1 (206).
[0030] In the trellis, state sk has at most two incoming branches. The initial states of these branches are called s and s′. As usual, V2 (212) will add the branch metrics to the current state metrics of s and s′ in order to determine the survivor path at state sk. One of these will be the detected path, and the other will be the non-surviving path pk. Of course, V2 (212) will have access to DB (208) and therefore to the identity of state sk as shown in FIG. 2.
[0031] Then V2 (212) will pass the margin mk, at state sk, as well as the last Δ bits of the non-surviving path, (pk )j, j=k−Δ+1, . . . , k, to the qualification/minimization (QM 214) module, which also requires access to the buffer DB (208) of detected bits and an accumulated minimum margin buffer (AMMB 216). At any given time instant k, this module finds the bit positions j for which k is j-qualified and iteratively computes the margins mk, the minimum margin ω and ultimately the soft outputs.
[0032] c. Pseudo-Code for Computation of Soft-Output
[0033] Fork=1, . . . , N,{
[0034] obtain detected bit xk from Viterbi detector;
[0035] μk=1000;
1|
|
For (j = Max(k-Δ,1); j<=k; j++) { //loop executed in parallel//
If ((Pk)j != xj ) {
μj = Min(μj,mk);
}
}
j* = k−Δ +1;
ωj* = (−1)xj* μj*
}
|
[0036] d. Complexity
[0037] The overhead required by SOVA, above and beyond that required by the Viterbi detector V1, comprises the following:
[0038] 1—A second Viterbi detector V2 with path memory Δ.
[0039] 2—A detection buffer (DB) to hold the detected bits xk−Δ+1 . . . xk.
[0040] 3—Δ−1 comparisons per bit in the qualification/minimization module.
[0041] 4—An accumulated minimum margin buffer (AMMB) to hold the accumulated minimum margins μk−Δ+1 . . . μk.
[0042] For a 64-state channel trellis, with M=Δ=64, the number of additions and multiplications for SOVA will be double that of ordinary Viterbi detection and the number of comparisons with be triple that of Viterbi detection. Also, the additional buffers will make the storage requirements somewhat more than double that of Viterbi detection. In addition, SOVA will produce soft outputs with double the latency that the Viterbi algorithm produces hard decisions.
[0043] e. Other Prior Art
[0044] Further, other related prior art includes Hagenauer's paper, a patent application filed on Oct. 27, 1999, Attorney Docket No. CH19990112, “Method and Apparatus for Encoding and Detection/Decoding of MTR/Parity Codes”, by Cideciyan et al., and U.S. Pat. No. 5,949,831, “Method and Apparatus for Data Detection for PRML Data Channels”, by Coker et al.,filed May 21,1997, issued Sep. 7, 1999. These references use error filters to determine if the output reliability crosses some threshold or if parity is violated in a transmission or recording. Here, each filter corresponds to a most likely error which is corrected using an error correction scheme applied to a sequence of symbols or bits.
[0045] Also, H. Sawaguchi and S. Mita describe a method for decoding using concatenated error correction in “Soft-output decoding for concatenated error correction in high-order PRML channels,” ICC, 1999, pp. 1632-1637.
[0046] Accordingly, what is needed is an improved system and method that is not as complex as a BCJR or the ordinary SOVA algorithm and yet accurately produces bit reliabilities. The present invention addresses such a need.
SUMMARY OF THE INVENTION
[0047] This invention is not a variation of a Viterbi Algorithm itself, rather, the invention is a Viterbi algorithm combined with the use of error filter outputs to produce bit reliabilities.
[0048] Thus, the present invention is a SOVA-like method using error filters to reduce the complexity of bit reliability determination further than that of the ordinary SOVA method.
[0049] Error patterns corresponding to each of a handful of dominant i.e., most common error patterns, are determined from experimental data. Error filters determine likelihoods of each postulated error pattern. The filters, typically six or seven of them, resolve most of the errors thereby simplifying computation dramatically. The filters do not do general error correction, rather, the error filters compute likelihoods of the most likely error-causing events and are combined to provide bit reliability estimates.
BRIEF DESCRIPTION OF THE FIGURES
[0050] The subject matter which is regarded as the invention is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other features and advantages of the invention will be apparent from the following detailed description taken in conjunction with the accompanying drawings.
[0051]
FIG. 1 illustrates a non-surviving path pk for a j-qualified k as described in the prior art.
[0052]
FIG. 2 illustrates a Soft Output Viterbi Algorithm Decoder as described in the prior art.
[0053]
FIG. 3 illustrates an Error Event which is the difference between two sequences that differ in only finitely many places.
[0054]
FIG. 4 illustrates a Modified Soft Output Viterbi Algorithm with Error Filters as practiced in this invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0055] It is important to note that these embodiments are only examples of the many advantageous uses of the innovative teachings herein. In general, statements made in the specification of the present application do not necessarily limit any of the various claimed inventions. Moreover, some statements may apply to some inventive features but not to others. In general, unless otherwise indicated, singular elements may be in the plural and vice versa with no loss of generality.
[0056] In the drawing like numerals refer to like parts through several views.
[0057] 1. Exemplary Embodiment
[0058] a. Modified SOVA: SOVA with Error Filters
[0059] An error event is the difference between two sequences which differ in only finitely many places. If the sequences are binary (such as NRZ), then an error event can be considered to be a finite word over the alphabet {+1,0,−1}, often abbreviated as {+,0,−}. For a given channel impulse response, a finite set E of error events is fixed. These should be chosen to be the most likely error events for a given channel impulse response, such as E={+,+−+} for PR4.
[0060] Just as in ordinary SOVA, the ordinary Viterbi algorithm is applied to a block of data, possibly incorporating prior information from a previous LDPC iteration, with some specified path memory M. But instead of using the minimum Viterbi margin over a range of some size, the modified SOVA uses the minimum Viterbi margin with respect to only the error events in E. This sub-optimal scheme will generally have much lower complexity than ordinary SOVA.
[0061] Typically, an assumption is made that the block size N is substantially larger than the path memory M which in turn is substantially larger than the maximal length, L, of an error event in E.
[0062] b. Description of Algorithm
[0063] Let h0, h1, . . . , hv denote the coefficients of the channel impulse response h so v+1 is the length of the response. For any k, at time k+M the Viterbi detector will have detected candidate symbols or data bits in positions up to k:
x=x
1
. . . x
k
.
[0064] For any error event e=e1 . . . eI in E where I=I(e) is the length of e, let y be the sequence obtained from x by e positioned so that it ends at bit position k−v as in FIG. 3. It is convenient to represent this translate of e as a sequence, sk(e), of length k:
s
k
(e)=0 . . . 0 e1 . . . eI0 . . . 0
[0065] where in this expression there are k−I−v 0's at the beginning and v 0's at the end. Then:
y=x+s
k
(e).
[0066] Note that while the error event (in NRZ) ends at bit position k−v, the effect of the error event in the channel trellis does not end until bit position k (in order to flush out the channel memory).
[0067] Of course, in order for the error event to be plausible, y must be a binary sequence. For instance, one cannot simultaneously have xI=1 and (sk(e))I=+. Also, the only error events that need to be considered are those that would have resulted in a different detected decision. So, given j, for the j-th bit position Viterbi margins are computed only over those pairs (k, e) that qualify under the following two conditions:
Q1: for
i=k−I−v+
1, . . . k−v
[0068] if (sk(e))I=+, then xI=0 and
[0069] if (sk(e))I=−, then xI=1
Q2: (
s
k
(e))j≠0
[0070] Such a pair (k,e) is called j-qualified.
[0071] Let {circumflex over (χ)}, ŷ denote the channel responses to the input sequences x,y:
{circumflex over (χ)}=h*χ (1)
{circumflex over (y )}=h*y
(2)
[0072] where * denotes convolution. The channel error response to the error event e is then:
ƒ=ŷ−{circumflex over (χ)}=h*s
k
(e) (3)
[0073] Define the (k,e)-margin to be:
3
[0074] where r denotes the sequence of received channel samples up to time k and
εr−{circumflex over (χ)}
[0075] the alleged error sequence.
[0076] The (k,e)-margin is computed as follows. The dot product in equation 4 above can be rewritten:
4
[0077] where hR is the filter matched to h, i.e., the time reversal of h.
[0078]
FIG. 4 illustrates a Modified Soft Output Viterbi Algorithm with Error Filters (400) as practiced in this invention. The Modified SOVA Decoder (400) comprises a channel (402) for reception of symbols, bits or numbers, an equalizer (404), a viterbi detector (406) a detected buffer (408) a delay M (410), accumulated minimum margin buffers (416, 418), qualification/minimization modules (412, 414) and a minimization function (420). To begin with, the alleged error sequence ε is convolved with hR, a filter (*hR) as shown in FIG. 4, and the result is passed through a bank of error filters with taps given by the error events e (see the filters (·ei) in FIG. 4). The output of each error filter is then added to the term ∥f∥2 which is a constant energy term using a summation unit. Each such f depends on e and can be retrieved from a look-up table. The first convolution involves multiplications and additions, but the bank of error filters involves only additions since the entries of e are {+1, 0, −1}. Then, a qualification and combining process is performed on the margins mk,e in the QMs (412, 414). The specific operational conduct of the qualification and combining process is found below. The combining process is a process utilizing a combining unit, in this example a QM, so that the combining process is a minimization process. Next, the mk,e that are j-qualified are buffered in the AMMBs (416, 418). Finally, a minimization function is performed by the minimizer (420). The minimizer (420) computes a minimization over all mk,e that are j-qualified and produces μk−v−L+1, which is multiplied by a sign value (−1)Xk−v−L+1 to produce a soft output ωj.
[0079] The soft output is defined as:
5
[0080] where the minimum ranges over all j-qualified pairs (k,e). Alternatively, instead of generating a final soft output reliability using a minimization function, an averaging function can be used instead in the combining unit. Returning to the analysis of the soft output, ωj gives an approximation to the log-likelihood:
6
[0081] which agrees with the APP log-likelihood:
7
[0082] provided that 0's and 1's are equally likely. Otherwise, the computation of mk,e is adjusted using prior information p(xI=1): namely, by adding to mk,e the following quantity:
8
[0083] where
v
I
=0 if (sk(e))I=0
v
I
=log(p(xi=1)/p(xI=0)) if (sk(e))I=+
v
I
=log(p(xi=0)/p(xI=1)) if (sk(e))I=−
[0084] The pseudo-code in the next section describes the operations of the filters and the qualification/minimization QM′ (412, 414) modules in FIG. 4. The qualification/minimization modules represent a plurality of modules though only two are shown in FIG. 4. Likewise, there are a plurality of AMMB′ present although only two are shown in FIG. 4.
[0085] Within a QM module, the error event is tested for plausibility, i.e., condition Q1 above, and then the set of j=k−I(e) −v+1, . . . , k−v for which (k,e) is j-qualified (condition Q2 above) is determined. (If the error event is not plausible, then the set of such j is empty.) For each such j, the margin is updated by comparison with mk,e. The QM′ modules (412, 414) require access to an accumulated minimum margin buffer AMMB′ (416, 418) and a detected buffer (420). For each error event, e, the corresponding QM module computes the minimum of mk,e over all j-qualified (k,e). These are then passed on to the minimization function (420) which computes on overall minimum over all error patterns, e. Alternatively, the minimization operation in the QM modules as well as the minimization function (420) can be replaced by averaging operations.
[0086] c. Pseudo-Code for Computation of Soft-output
[0087] For (k=1; k<=N; k++), {
[0088] obtain detected bit xk from Viterbi detector;
[0089] obtain alleged error εk;
[0090] obtain ck=(ε*hR)k; //convolve alleged error with hR//
[0091] μk=1000;
[0092] For (i=1; i<=n; i++) {//for each error event e in E; executed in parallel//
2|
|
e = el;
μkl = 1000;
l = Length(e);
temp = 2c* e)k //error filter//
retrieve ||f||2 from look-up table;
mk,e = −temp + ||f||2;
For (t= Max(k−l−v+1,1); t≦ k−v; t++) {
If (xt + (sk(e))t is not binary), terminate;
}
For (j=k−l−v+1; j ≦ k−v; j++) {//executed in parallel//
If ( ej ≠ 0 ) {
μjl = Min(μjl, mk,e);
}
}
j* = k−L−v+1;
μj* = Min(μj*, μj*i);
}
ωj* = (−1)xj* μj*
}
|
[0093] d. Complexity
[0094] Convolution of the alleged error ε with the matched filter hR requires v+1 multiplications and v additions per bit while recalling that v+1 is the length of the channel impulse response. The error filter corresponding to error event e involves I(e) −1 additions and no multiplications per bit. Thus, the total overhead required by a Modified SOVA above that required by the Viterbi detector is:
[0095] v+ΣeεE (I(e) −1) additions per bit;
[0096] v+1 multiplications per bit;
[0097] ΣeεE I(e) comparisons per bit;
[0098] a detected buffer (DB 408) to store the last L+v detected bits;
[0099] n accumulated minimum margin buffers (AMMB1, . . . , AMMBn 416, 418) where n is the number of error events in E;
[0100] look-up tables to hold the contents of ∥f∥2 for each error event e.
[0101] Modified SOVA also requires a latency of L+v beyond the Viterbi detector latency.
[0102] Assuming a 64-state channel trellis (so v=6), M=64, and 5 error events of average length 4 and maximal length L=6, the extra overhead required by modified SOVA would be:
[0103] 6+15=21 additions per bit;
[0104] 7 multiplications per bit;
[0105] 20 comparisons per bit;
[0106] a buffer to store the last 12 detected bits;
[0107] 5 buffers each containing at most 6 analog entries and;
[0108] a look-up table containing 5 analog entries.
[0109] Thus, the buffer and look-up table overhead are insignificant and the number of additions, multiplications and comparisons per bit increase by (roughly) 15%, 5% and 30% respectively. Also, the latency would increase marginally from 64 to 76.
[0110] Note that the multiplications required here are all required by the Viterbi algorithm anyway. So, in principle these extra multiplications could be eliminated but this would come at the price of an additional huge buffer.
[0111] 2. Conclusion
[0112] Therefore, a more efficient method, apparatus and product has been described that is not as complex as a BCJR or the ordinary SOVA algorithms and yet accurately represents bit reliabilities. Such a method is needed in order to produce bit reliabilities, in a simple and efficient manner, to be passed on to an outer error-correction decoder.
[0113] 3. Discussion of Hardware and Software Implementation Options
[0114] The present invention, as would be known to one of ordinary skill in the art could be produced in hardware or software, or in a combination of hardware and software. The system, or method, according to the inventive principles as disclosed in connection with the preferred embodiment, may be produced in a single computer system having separate elements or means for performing the individual functions or steps described or claimed or one or more elements or means combining the performance of any of the functions or steps disclosed or claimed, or may be arranged in a distributed computer system, interconnected by any suitable means as would be known by one of ordinary skill in art.
[0115] According to the inventive principles as disclosed in connection with the preferred embodiment, the invention and the inventive principles are not limited to any particular kind of computer system but may be used with any general purpose computer, as would be known to one of ordinary skill in the art, arranged to perform the functions described and the method steps described. The operations of such a computer, as described above, may be according to a computer program contained on a medium for use in the operation or control of the computer, as would be known to one of ordinary skill in the art. The computer medium which may be used to hold or contain the computer program product, may be a fixture of the computer such as an embedded memory or may be on a transportable medium such as a disk, as would be known to one of ordinary skill in the art.
[0116] The invention is not limited to any particular computer program or logic or language, or instruction but may be practiced with any such suitable program, logic or language, or instructions as would be known to one of ordinary skill in the art. Without limiting the principles of the disclosed invention any such computing system can include, inter alia, at least a computer readable medium allowing a computer to read data, instructions, messages or message packets, and other computer readable information from the computer readable medium. The computer readable medium may include non-volatile memory, such as ROM, Flash memory, floppy disk, Disk drive memory, CD-ROM, and other permanent storage. Additionally, a computer readable medium may include, for example, volatile storage such as RAM, buffers, cache memory, and network circuits.
[0117] Furthermore, the computer readable medium may include computer readable information in a transitory state medium such as a network link and/or a network interface, including a wired network or a wireless network, that allow a computer to read such computer readable information.
Claims
- 1. A method for generating bit reliabilities by means of a simplified Soft Output Viterbi Algorithm, the method on a processing unit for fault-tolerant communication comprising the steps of:
receiving a sequence of numbers r over a channel, having a channel impulse response h with coefficients h0, h1, . . . , hv, wherein v+1 is a length of the response; detecting by means of a Viterbi detector candidate symbols x=x1 . . . xk from the received sequence of numbers r; and generating symbol reliability estimates for each symbol position from r and for each detected candidate symbol x using error filters.
- 2. The method as defined in claim 1, wherein the error filters are used to provide reliability estimates relative to error events for predetermined common error patterns that are most likely causes of errors.
- 3. The method as defined in claim 1, further comprising the steps of:
convolving an error sequence ε with hR, a time reversal of h; and passing the convolution (ε*hR) through a bank of error filters with taps determined by the error events ei.
- 4. The method as defined in claim 3, wherein the step of passing the convolution through the error filter is given by:
- 5. The method as defined in claim 4, further comprising the step of:
computing (k, e) margins mk,e by summing an energy term ∥f∥2 with a result of the convolution through the error filter wherein the result of the convolution is multiplied by a constant factor of −2 before being summed with the constant energy term.
- 6. The method as defined in claim 5, further comprising the step of:
testing error events for plausibility in a plurality of qualification modules wherein only plausible error events that are binary sequences resulting in a different detected decision are considered for bit reliability determination i.e., for the j-th bit position Viterbi margins are computed only over those j-qualified pairs (k, e) that qualify under the following two conditions:Q1: for i=k−I−v+1, . . . , k−vif (sk(e))I=+, then xi=0 and if (sk(e))I=−, then xI=1Q2: (sk(e))J≠0.
- 7. The method as defined in claim 6, further comprising the steps of:
buffering mk,e that are j-qualified; and combining such mk,e to produce a reliability for the jth bit position.
- 8. The method as defined in claim 7, wherein the combining step is a minimization followed by multiplication by an appropriate sign.
- 9. The method as defined in claim 7, wherein the combining step is an averaging followed by multiplication by an appropriate sign.
- 10. A computer readable medium comprising instructions for generating bit reliabilities by means of a simplified Soft Output Viterbi Algorithm, the instructions for fault-tolerant communication to and from a processing unit comprising the instructions of:
receiving a sequence of numbers r over a channel, having a channel impulse response h with coefficients h0, h1, . . . , hv, wherein v+1 is a length of the response; detecting by means of a Viterbi detector candidate symbols x=x1 . . . xk from the received sequence of numbers r; and generating symbol reliability estimates for each symbol position from r and for each detected candidate symbol x using error filters.
- 11. The computer readable medium as defined in claim 10, wherein the error filters are used to provide reliability estimates relative to error events for predetermined common error patterns that are most likely causes of errors.
- 12. The computer readable medium as defined in claim 10, further comprising the instructions of:
convolving an error sequence ε with hR, a time reversal of h; and passing the convolution (ε*hR) through a bank of error filters with taps determined by the error events ei.
- 13. The computer readable medium as defined in claim 12, wherein the instruction of passing the convolution through the error filter is given by:
- 14. The computer readable medium as defined in claim 13, further comprising the instruction of:
computing (k,e) margins mk,e by summing an energy term ∥f∥2 with a result of the convolution through the error filter wherein the result of the convolution is multiplied by a constant factor of −2 before being summed with the constant energy term.
- 15. The computer readable medium as defined in claim 14, further comprising the instruction of:
testing error events for plausibility in a plurality of qualification modules wherein only plausible error events that are binary sequences resulting in a different detected decision are considered for bit reliability determination i.e., for the j-th bit position Viterbi margins are computed only over those j-qualified pairs (k,e) that qualify under the following two conditions:Q1: for i=k−I−v+1, . . . , k−vif (sk(e))I=+, then xi=0 and if (sk(e))I=−, then xI=1Q2: (sk(e))J≠0.
- 16. The computer readable medium as defined in claim 15, further comprising the instructions of:
buffering mk,e that are j-qualified; and combining such mk,e to produce a reliability for the jth bit position.
- 17. The computer readable medium as defined in claim 16, wherein the combining instruction is a minimization followed by multiplication by an appropriate sign.
- 18. The computer readable medium as defined in claim 16, wherein the combining instruction is an averaging followed by multiplication by an appropriate sign.
- 19. A system for generating bit reliabilities by means of a simplified Soft Output Viterbi Algorithm, the system for fault-tolerant communication to and from a processing unit comprising:
an equalizer for receiving a sequence of numbers that the equalizer identifies as r over a channel, having a channel impulse response h with coefficients h0, h1, . . . , hv, wherein v+1 is a length of the response; a viterbi detector for detecting candidate symbols x=x1 . . . xk from the received sequence of numbers r; and a qualification and minimization module for generating symbol reliability estimates for each symbol position from r and for each detected candidate symbol x using error a filters.
- 20. The system as defined in claim 19, wherein the error filters are used to provide reliability estimates relative to error events for predetermined common error patterns that are most likely causes of errors.
- 21. The system as defined in claim 19, further comprising:
a filter for convolving an error sequence ε with hR , a time reversal of h; and a bank of error filters with taps determined by the error events ei for receiving and passing the convolution (ε*hR) there through.
- 22. The system as defined in claim 21, wherein passing the convolution through the error filter is given by:
- 23. The system as defined in claim 22, further comprising:
a summation unit for computing (k,e) margins mk,e by summing an energy term ∥f∥2 with a result of the convolution through the error filter wherein the result of the convolution is multiplied by a constant factor of −2 before being summed with the constant energy term.
- 24. The system as defined in claim 23, further comprising:
a plurality of qualification modules for testing error events for plausibility wherein only plausible error events that are binary sequences resulting in a different detected decision are considered for bit reliability determination i.e., for the j-th bit position Viterbi margins are computed only over those j-qualified pairs (k, e) that qualify under the following two conditions:Q1: for i=k−I−v+1, . . . , k−vif (sk(e))I=+, then xi=0 and if (sk(e))I=−, then xI=1Q2: (sk(e))J≠0.
- 25. The system as defined in claim 24, further comprising:
accumulated minimum margin buffers for buffering mk,e that are j-qualified; and a combining unit for combining such mk,e to produce a reliability for the jth bit position.
- 26. The system as defined in claim 25, wherein the combining unit comprises a combining unit that performs a minimization followed by multiplication by an appropriate sign.
- 27. The system as defined in claim 25, wherein the combining operation comprises a combining unit that performs an averaging followed by multiplication by an appropriate sign.