System and method for designing architecture for specified permutation and datapath circuits for permutation

Information

  • Patent Grant
  • 8321823
  • Patent Number
    8,321,823
  • Date Filed
    Thursday, October 2, 2008
    16 years ago
  • Date Issued
    Tuesday, November 27, 2012
    12 years ago
Abstract
Computer-implemented systems and methods that provide an efficient technique for performing a large class of permutations on data vectors of length 2n, n>1, implemented with streaming width 2k (where 1≦k≦n−1). The technique applies to any permutation Q on 2n datawords that can be specified as a linear transform, i.e., as an n×n bit matrix (a matrix containing only 1s and 0s) P on the bit level. The relationship between Q and P is as follows: If Q maps (dataword) i to (dataword) j, then the bit representation of j is the bit-matrix-vector product of P with the bit representation of i. Given such a permutation specified by the matrix P and given the streaming width (k), an architectural framework (or datapath) is calculated to implement the permutation.
Description
BACKGROUND

Many applications that are implemented in hardware take as input a list or vector of data words and produce a vector of data words of the same length as output. These applications are often implemented using streaming architectures. In these architectures, the input vector is divided into chunks of equal length and these chunks enter the architecture at regular intervals. Similarly, the output is produced in chunks exiting the architecture in regular intervals. Streaming means that the architectures can start processing the first chunk of the next input vector immediately after the last chunk of the current data vector entered. This present invention is concerned with the design of streaming architectures for permutations of a data vector. A permutation is a fixed reordering in a predetermined manner.



FIG. 1
a shows a permutation in space. All 2n datawords are available in one time interval and can hence be permuted using only wires (the wires are not shown).


SUMMARY

The present invention is concerned generally with designing streaming architectures for permutation in the scenario shown in FIG. 1b. In this figure, the 2n datawords are input in chunks of size 2k and over 2n−k time intervals. The output is produced accordingly. Now the permutation is across space and time and, in general, cannot be implemented using solely wires.


In one general aspect, the present invention is directed to computer-implemented systems and methods that provide an efficient technique for performing a large class of permutations on data vectors of length 2n, n>1, implemented with streaming width 2k (where 1≦k≦n−1). The technique applies to any permutation Q on 2n datawords that can be specified as a linear transform, i.e., as an n×n bit matrix (a matrix containing only 1s and 0s) P on the bit level. The relationship between Q and P is as follows: If Q maps (dataword) i to (dataword) j, then the bit representation of j is the bit-matrix-vector product of P with the bit representation of i. Bit-matrix-vector product means that the operations are over the finite field with two elements (often called GF(2)) 0 and 1, addition being XOR and multiplication being AND.


Given such a permutation specified by the matrix P and given the streaming width (k), an architectural framework (or datapath) is calculated to implement the permutation. In various embodiments, the datapath comprises: (i) a number of memory banks that are capable, during one time interval, of reading a data word and writing a data word; (ii) a write-stage connection network that takes in each time interval as input the chunks of the input vector and writes the contained data words to the memory banks according to a matrix M as explained below; and (iii) a read-stage connection network that reads in each time interval data words from the memory banks according to the matrix N as explained below and outputs them in chunks. N and M are such that P=NM (again, this matrix-matrix product is over the finite field with two elements) and rank(M1)=rank(N1′)=k, wherein M1 is a sub-matrix of M and N1′ is a submatrix of N−1. The details are described below.


In various embodiments, the computed solution always produces a partially optimal solution; that is, one of the stages (i.e., the write-stage or the read-stage) is optimal defined in terms of connectivity and control cost. Furthermore, in cases where the bit matrix P is a permutation matrix (i.e., a matrix having exactly one “1” in each row and in each column, with zeros elsewhere), both stages are optimal in terms of connectivity and control cost.


Various embodiments of the present invention are directed to a computer-implemented system and methods for computing the datapath, and, in other embodiments, to various classes of datapaths themselves.





FIGURES

Various embodiments of the present invention are described herein by way of example in conjunction with the following figures, wherein:



FIG. 1
a is a diagram of a prior art permutation datapath that receives 2n inputs at once;



FIG. 1
b is a diagram of a permutation datapath according to various embodiments of the present invention that receives streaming input data;



FIG. 2 is a diagram of a datapath according to various embodiments of the present invention; FIG. 2 shows the details of FIG. 1b;



FIG. 3 is a diagram of a process according to various embodiments of the present invention;



FIG. 4(
a) is a diagram illustrating the indexing of the streamed input vector with addresses according to various embodiments of the present invention;



FIG. 4(
b) is a diagram illustrating the indexing of the memory banks with addresses according to various embodiments of the present invention;



FIGS. 5, 6 and 8 are diagrams of an example datapath of the invention: a 8-to-8 connection network decomposed into two 4-to-4 blocks according to various embodiments of the present invention;



FIGS. 7
a and 7b are diagrams of the processes according to various embodiments of the present invention;



FIG. 9 is a diagram of a computer system according to various embodiments of the present invention;



FIG. 10 is a diagram of a computer-implemented process according to various embodiments of the present invention; and



FIGS. 11 to 25 illustrate forms of matrices according to various embodiments of the present invention.





DESCRIPTION

According to various embodiments, the present invention is directed to computer-implemented systems and methods that compute a datapath architecture for performing certain types of specified permutations. The architecture, with reference to FIG. 1b, utilizes streaming data of width 2k (where 1≦k≦n) data words per cycle. Accordingly, 2k inputs stream into the system each cycle, over a total of 2n−k cycles. When the streaming data are permuted, they must be reordered in space (via wires and switches) and across time boundaries (by storing and retrieving data from memory). Using streaming data allows datapath reuse to be exploited by building fewer of the identical computation blocks and reusing them over several cycles.


The process works on a large class of permutations, that is, any permutation that can be specified as a linear transform or matrix-vector multiplication with a matrix P on the bit level as defined in [0015]. In addition, the solution is optimal in terms of connectivity and cost for a subset of this class, namely permutations for which said matrix P is a permutation matrix, that is, it has exactly one (1) in each row and exactly one (1) in each column, with zeros elsewhere. This class of permutations includes stride permutations, which are a widely used type of permutation, especially in applications utilizing fast Fourier transforms and other transforms.


Initially, some background on permutations may be helpful. Consider a permutation on 2n points 0, . . . , 2n−1. For example, the cyclic shift is defined by:

    • {right arrow over (C)}2n:0custom character1custom character2custom character . . . custom character2n−1custom character0.


      Permutations also may be viewed as matrices. There are two choices for associating a matrix with a permutation and they are transposes of each other. In one embodiment, the one that makes











C



2
n


=

(



0


1





































































1




1












0



)





(
1
)








is chosen. The set of all permutations on 2n points is denoted with S2n and is a group, called the symmetric group. It has 2n! elements. A field (also called Galois field) may be denoted with 2 elements with F2={0, 1}, where its elements may be considered the two states of a bit. Addition and multiplication in F2 may be equivalent to the “xor” and “and” operations, respectively.


Permutations on 0, . . . , 2n−1 can equivalently be seen as permutations on the corresponding bit representations xεF2n of these numbers. These x may be viewed as column vectors and the least significant bit may be assumed to be on the bottom. For example, for n=2, 1 is represented as







(



0




1



)

.




In some cases the permutations of F2n correspond to linear mappings on F2n of the form,

δ=Px, PεGLn(F2)

where GLn(F2) is the group of all invertible n×n bit matrices. Its size is (2n−1)(2n−2) . . . (2n−2n−1). Every bit matrix PεGLn(F2) defies a permutation in S2n, which may be captured by the mapping:

π:GLn(F2)→S2n, Pcustom characterπ(P).  (2)

GLn (F2) may be identified with its image π (GLn(F2)) in S2n.


Consider an example where






P
=

(



1


1









1



)









maps






(



0




0



)




(



0




0



)


,


(



0




1



)



(



1




1



)


,


(



1




0



)



(



0




1



)


,


(



1




1



)



(



0




1



)


,





i
.
e
.

,

0

0

,

1

3

,
2
,
which





implies:







π


(
P
)


=


(



1


































1














1














1













)

.






To clearly distinguish matrices P that operate on n bits from permutation matrices that operate on 2n points, the latter is marked with a →.


In addition, the “direct sum” and the Kronecker or “tensor product” of matrices P, Q respectively may be denoted:








P

Q

=

(



P














Q



)


,



and





P


Q

=




(


p

i
,
j



Q

)


i
,
j







for





P

=


(

p

i
,
j


)

.








Further, In may be the n×n identity matrix and Jn is In with the columns in reversed order. The stride permutation may be defined via:

{right arrow over (L)}2n,2s:i2n−s+j├→j2s+i, 0≦i≦2s,0≦j≦2n−s

Equivalently, L2n,2s transposes a 2n−s×2s array stored in row-major order. L2n,2n−1 is also called the perfect shuffle. In addition, the bit-reversal permutation may be denoted R2n.


With this notation, the following properties of π in equation (2) above can now be stated. If P1QεGLn(F2), then the following holds:

π(PQ)=π(P)π(Q) and π(P−1)=π(P)−1 (i.e., π is a group homomorphism)  (1)
π(P⊕Q)=Pcustom characterQ  (2)
π(In)={right arrow over (I)}2n  (3)
π(Cnk)={right arrow over (L)}2n,2k  (4)
π(Jn)={right arrow over (R)}2n  (5)


Based on linear algebra, if PεF2m×n is a m×n bit matrix, then







im


(
P
)


=



{

Px
|

x


F
2
n



}






and





ker






(
P
)


=

{



x


F
2
n


|
Px

=
0

}







are the “image” and “kernel” (or nullspace) respectively of the linear mapping defined by the matrix P. It holds that dim(im(P))=rank(P) and dim(ker(P))+dim(im(P))=n. Further, rank(P+Q)≦rank(P)+rank(Q) and rank(PQ)≦min(rank(P), rank(Q).


If V≦F2n is a subvector space of dimension dim (V)=k, then |V|=2k. If xεF2n, then any x+V={x+υ|υεV} is called a coset of V in F2n. Its size is again 2k and there are precisely 2n−k many different cosets.


With this background, the problem posed is that, given an invertible linear bit mapping, or bit matrix, PεGLn(F2) where π(P) is the corresponding permutation on 2n points, the desire is to design a logic block that permutes a vector of 2n data words with π(P). The vector is streamed with a streaming width 2k, k≦n. This means that every cycle the logic block takes a segment of length 2k of the vector as input, and produces a segment of equal length of the permuted vector as output. Further, the logic block takes advantage of 2k banks of memory (e.g., addressable portions of memory, such as random access memory or RAM), each of which can hold at least 2n−k data words of the vector. In other embodiments, if each available RAM can only hold 2c words, c<n−k, then 2n−k−c RAMs can be used to simulate a RAM of size 2n−k. Preferably, each memory can concurrently read and write one (1) data word in each cycle. For example, the RAMs may be dual-ported (e.g., having an input port and an output port). This constraint can easily be generalized to any two-power number of ports.


A logic block satisfying the conditions described above can be implemented on current FPGA (field programmable gate array) platforms or ASICs (application specific integrated circuits).


As shown in FIG. 2, the circuit implementing the permutation may comprise two connection networks 12a-b to permute the data in two stages by writing into the memory banks (RAMs) 14 and reading out from the RAMs 14. The first stage (input data to RAM) is sometimes referred to as the write-stage and the second stage (RAM to output data) as the read-stage. Each stage preferably obeys the port restrictions of the RAMs 14, thereby obviating the need for additional buffers.


In addition to finding a solution for the permutation, the logic blocks of the connection networks 12a-b are also preferably optimized in terms of cost. The steps shown in FIG. 3 may be taken to formulate mathematically the problem. At step 31, the proper addresses to the input vector and the RAMs 14 are assigned. The problem is then to find a suitable factorization of the bit matrix P into a matrix product NM, one matrix for each stage (i.e., write stage and read stage). At step 32, the dual-ported constraint of the RAMs 14 is formulated mathematically as a condition of the submatrices M and N. At step 33, the cost of the connection network is captured through two metrics: (i) the connectivity of the network and (ii) the cost of the control logic. Both metrics are properties of M and N. These steps are described in more detail below.


For the address scheme and stages (step 31), the streamed input vector of length 2n may be indexed with addresses xεF2, as shown in FIG. 4(a). The stage number is given by the upper n−k bits of x and the location within the stage by the lower k bits, referred to as x2 and x1, respectively. The 2k RAMs may be indexed with addresses z as shown in FIG. 4(b). The RAM number z1 is given by the k lower bits of z, and the location z2 in the RAM by the n−k upper bits.


The addressing of the output vector y is analogous to the addressing of the input vector. Preferably P, i.e., y=Px, is performed in two stages, the write-stage z=Mx and the read-stage y=Nz, which is equivalent to a factorization

P=NM,  (3)

where M, NεGLn(F2) are again (necessarily) invertible bit matrices. In words, M determines how the streaming data is stored into the RAMs (the write-stage), and N determines how it is read out of the RAMs into the resulting data stream (the read-stage). The addressing preferably is chosen such that M=I2n or N=I2n makes the write or read stage trivial, respectively. This means that the connection network and all address computations vanish.


By partitioning the addresses as explained above, the following expanded version of the write-stage z=Mx may be obtained:














where





in





RAM






RAM





number






(




z
2






z
1




)


=


(




M
4




M
3






M
2




M
1




)



(




x
2






x
1




)






stage





number






where





in





stage









(
4
)








The matrix tiling is compatible with the partitioning of the vectors. For example, M1 is a k×k matrix.


Analogous to the write-stage, the read-stage y=N z may also be expanded. However, there is one crucial difference. Namely, the control logic 16 in FIG. 2 determines from which RAM 14 and where in this RAM to read, given the output stage number and the output stage location. Thus, the inverse equation z=N−1y and partition N−1 have to be considered as before as














where





in





RAM






RAM





number






(




z
2






z
1




)


=


(




N
4





N
3







N
2





N
1





)



(




y
2






y
1




)






stage





number






where





in





stage









(
5
)








The primes emphasize that N−1 is tiled and not N.


For step 32, because the RAMs are preferably dual-ported, they allow only one write (and read) per cycle. Thus, it is required that in the write-stage that for every fixed stage, the 2k data words are mapped into different RAMs 14. Mathematically, this means that for any fixed x2 the mapping

z1=M2x2+M1x1

is bijective. This is the case if and only if M1 is invertible, i.e., has full rank: rank(M1)=k. A similar discussion yields the requirement rank(N′1)=k.


For step 33, the major cost factors in the circuit of FIG. 2 are the two connection networks 12a-b. They are determined by the connections required for writing a stage to the RAMs 14, and for reading from the RAMs 14 into a stage, collected over all stages. In the worst case, an all-to-all connection has to be supported. In the best case, the data words are always written to or read from the same RAM, which reduces the connection network to a simple wired connection without control logic.


Given M and N, the required connectivity can be measured as follows. Let M be as in equation (4) (and N as in equation (5)), and assume that M1 (N′1) is invertible and set rank(M2)=s (rank(N′2)=s). Then, the 2k-to-2k connection network 12a in the write-stage (read-stage) of FIG. 2 decomposes into 2k−s independent 2s-to-2s networks, called blocks. The input and output index sets of these blocks (subsets of 0, . . . , 2k−1) are precisely the cosets:

x1+im(M1−1M2) and M1x1+im(M2)

for the write-stage and are the cosets

y1+im(N′1−1N′2) and N′1x1+im(N′2)

for the read-stage. Further, each block has to support an all-to-all connection and precisely 2s different configurations. We call this the “connectivity lemma.”


To prove the connectivity lemma, set s=rank(M2) and assume x1 is the address of a stage location. The RAM numbers z1 that x1 connects to can be accumulated, over all stages. This is the set










U

x
1


=


{




M
2



x
2


+


M
1



x
1



|


x
2



F
2

n
-
k




}

=


im


(

M
2

)


+


M
1



x
1








(
6
)








The size of this set is 2s. Now assume x′1 is another address within a stage, and satisfies Ux1∩Ux′≠0. Then

M1(x1−x′1im(M2)custom characterx′1εx1+M1−1im(M2)=x1+im(M1−1M2).

The size of this set is also 2s. Conversely, assume x′1 has the above form, i.e., x′1=x1+M1−1M2x2 for some xεF2n−k. Then, using (6),

Ux′1=im(M2)+M1x1+M2x2=im(M2)+M1x1=Ux1.

In other words, if x1 and x′1 share one connection target z1, they share all 2s targets, which proves the block decomposition. The input and output index sets are also computed as desired.


The above also shows that each block has to support an all-to-all connection. The remaining question is the number of control configurations. Assume two stages x2, x′2 that connect all x1 equally, i.e., for all x1εF2k,

M2x2+M1x1=M2x′2+M1x1custom characterx′2εx2+ker(M2).

The size of this set is 2n−k−s, and the 2n−k stages partition into 2s many groups of size 2n−k−s each, such that within the groups, all connections are equal. These groups are the cosets x2+ker(M2). Between different groups of stages the connections differ since each x1 has 2s many targets (|Ux1|−2s).


The connectively lemma implies that it is desirable to minimize rank(M2) and rank(N′2) in (4) and (5) to minimize the area cost of the implementation in FIG. 2. It motivates the following definition for “connectivity:” Given a matrix M in (4) or N in (5), the conn(M, k)=2rank(M2) and conn(N, k)=2rank(N′2) are called the connectivity of M and N, respectively, with respect to the streaming width 2k. In the following, the second argument k is mostly omitted since it is clear from the context. In words, high connectivity implies high switching cost.


The control blocks 16a-b in FIG. 2 have to compute z given x and z given y, respectively. This motivates the following definition for “control cost” for the control blocks: If M is as in (4) (and N as in (5)), then the cost(M) (or cost(N)) is called the “control cost” of M (or N), defined as the linear complexity of M (N−1), i.e., the minimum number of (binary) additions to compute z=M x (z=N−1x).


With the above notation and discussion, the problem can be formally stated as, given an invertible bit matrix PεGLn (F2) and a streaming width 2k, k≦n, determine a factorization P=N M, such that rank(M1)=rank(N′1)=k. The goal is to minimize rank(M2), rank (N′2), and the complexity of M and N−1. Necessarily, M, NεGLn(F2). This problem is sometimes referred to hereinafter as the “factorization problem.”


As an example, let M be the matrix representing the write stage of a permutation, streamed with 23 ports, blocked as in (4).









M
=


(




M
4




M
3






M
2




M
1




)

=


(









1






















1






















1






















1




1








1













1








1






)

.






(
7
)








From the connectivity lemma, it is seen that the 8-to-8 network decomposes into two 4-to-4 blocks. The input set is given by the coset











x
1

+

im


(


M
1

-
1




M
2


)



=




x
1

+

im


(


(



0


1


0




0


0


1




1


0


0



)

·

(



0


0


0




1


0


0




0


1


0



)


)









=




x
1

+

im


(



1


0


0




0


1


0




0


0


0



)










=




x
1

+

{


(



0




0




0



)

,

(



0




1




0



)

,

(



1




0




0



)

,

(



1




1




0



)


}



,








and the output set is given by the coset









M

1

x





1


+

im


(

M
2

)



=



(



0


0


1




1


0


0




0


1


0



)



x
1


+

{


(



0




0




0



)

,

(



0




0




1



)

,

(



0




1




0



)

,

(



0




1




1



)


}



,





Thus, the input sets are {0, 2, 4, 6} and {1, 3, 5, 7}. The output sets are {0, 1, 2, 3} and {4, 5, 6, 7}. From the “connectivity” definition, it is seen that the connectivity of this network is given by

conn(M)=2rank(M2)=22=4.

The definition for “control cost” given above shows that the control cost, cost (M), is given by the linear complexity of M. So,

cost (M)=2.
FIG. 5 illustrates this decomposition.


Before providing an explicit method to compute suitable factorizations P=N M, the lower bounds on the quality, i.e., the connectivity and the control cost, may be determined of a possible solution. This will allow later identification of the cases where the solutions are guaranteed optimal. To do this, similar to M and N−1 in (4) and (5), P and P−1 may also be tiled as









P
=



(




P
4




P
3






P
2




P
1




)






and






P

-
1



=

(




P
4





P
3







P
2





P
1





)






(
8
)








for the following discussion.


Our “connectivity theorem” is that, assuming P=N M is a solution of the factorization problem, then

rank(M2)≧k−rank(P′1) and rank(N′2)≧k−rank(P1),

which is equivalent to

conn(M)≧2k−rank(P′1) and conn(N)≧2k−rank(P′)


To prove this theorem, assume a solution P=N M, which implies N−1 P=M, i.e., the equation












(




N
4





N
3







N
2





N
1





)



(




P
4




P
3






P
2




P
1




)


=

(




M
4




M
3






M
2




M
1




)


,




(
9
)








and M1 and N′1 have full rank k. Further, let r=rank (P1), which implies rank rank (P3)≧k−r, since P has full rank. Equation (9) implies M1=N′2P3+N′1P1. From this, the following is obtained:







k
=


rank


(



N
2




P
3


+


N
1




P
1



)













rank


(


N
2




P
3


)


+

rank


(


N
1




P
1


)














min


(


rank


(

N
2


)


,

rank


(

P
3

)



)


+
r



,





As a consequence rank(N′2)≧k−r or

conn(N)≧2k−r=2k−rank(P1)

as desired. The bound on conn (M) may be obtained analogously, starting from M P−1=N−1.


Our control cost theorem is that, assuming P=N M is a solution, then

cost(M)≧k−rank(P′1) and cost (N)≧k−rank(P1)

To prove this theorem, in the proof of the connectivity theorem, it was asserted that rank (N′2)≧k−rank (P1). This implies that N′2 contains at least k−rank (P1) non-zero elements. Since rank (N′1)=k, the linear complexity of the matrix (N′2 N′1), and thus that of N−1, is also at least k−rank (P1). The bound on cost (M) may be obtained analogously.


The connectivity and control cost theorems show that the lower bounds for both the connectivity and the control cost are determined by rank (P1) and rank (P′1), respectively. In the worst case, both ranks are zero.


As an example, consider the stride permutation








L




2

n

,
4


=

π


(


C


n
2

)







streamed with width 2k. The corresponding tiling of P=Cn2 as in (8) has, independent of k, the form










C
n
2

=

(



0


0


1













































































































1

















































0












1


































0












0


1


































0


0


1













































































































1




1










































0









1





































0



)





(
10
)








In this case rank (P1)=rank (P′1)=k−2 (using P−1=PT). This implies that a solution P=NM that meets the lower bounds satisfies conn (M)=conn (N)=4, i.e., both connection networks decompose into 4-to-4 all-to-all networks. Further, cost (M)=cost (N)=2, i.e., each address computation requires two additions (or xor operations). It is shown later see that such an optimal solution does indeed exist.


In the connectivity lemma, it was established that the two connection networks 12a-b in the write and read stage decompose into block with 2s inputs and outputs, where s=rank (M2) or s=rank (N′2), respectively. In the following, these networks are further analyzed and decomposed to obtain an efficient implementation.


Consider the write stage given by M partitioned as in (4) and with invertible M1. The connection network 12a of the write stage, now considered without subsequent writing into the RAMs 14, performs for every stage a permutation within that stage according to Z1=M1X2+M1X1. If the addressing scheme in FIG. 4(a) is adopted for the input and output data streams of the network, then the network is again represented by a bit matrix, namely by









T
=

(




I

n
-
k












M
2




M
1




)





(
11
)








Conversely, every matrix of this form with invertible M1 defines a connection network that decomposes into 2s-to-2s blocks, where s=rank (M2).


To implement efficiently the network, it may be decomposed further. First,






T
=


(




I

n
-
k












M
2




I
k




)



(




I

n
-
k

















M
1




)







Next, the following may be used:











(




I

n
-
k











A



I
k




)



(




I

n
-
k











B



I
k




)


=

(




I

n
-
k












A
+
B




I
k




)





(
12
)








Namely, M2 may be written as a sum of s=rank (M2) many matrices Ti of rank one,

M2=T1+ . . . +Ts.  (13)

This is possible constructively, for example, by performing Gauss elimination, M2=QM′2, where Q is invertible and M′2 has s nonzero rows. Each row yields a summand T′i:

M′2=T′1+ . . . +T′s,

and setting Ti=QT′i yields the result.


Using equation (12), T in equation (11) can be factorized to decompose the connection network. Analyzing the factors with the connectivity lemma yields the following theorem (which is referred to herein as the “connection network decomposition” theorem): The connection network 12a of the write stage in FIG. 2 is defined by the matrix T in (11). With previous notation, the following factorization is obtained:






T
=


(




I

n
-
k












T
1




I
k




)













(




I

n
-
k












T

s
-
1





I
k




)



(




I

n
-
k












T
x




M
1




)







This implies that the connection network can be decomposed into a cascade of s stages. Each stage is a connection network that consists of parallel 2-to-2 connection networks, or blocks, simultaneously controlled by one control bit. The input and output sets of these blocks are again cosets, as determined by the connectivity lemma. A similar statement holds for connection network of the read stage 12b in FIG. 2.


In equation (13), the summands can be permuted into any order, which implies that the stages can also be permuted. Each stage may be controlled by one bit. This implies that the entire network has 2s many possible configurations. This number coincides with the number stated in the connectivity lemma, as desired. The control bit for each stage may be calculated by Tix2 (or Tiy2 when performing N−1).


The input and output sets of the first (or write) state may be determined by:







x
1

+


im


(


M
1

-
1




T
s


)







and






M

1
×
1



+


im


(

T
s

)


.






For all other stages Ti, where 1≦i<s, both the input and output sets are given by

x1+im(Ti).

For the read stage, the same expressions hold, with N′1 substituted for M1.


Continuing the above example, let M be as given in (7). Based on the connection network decomposition theorem, it can be seen that M2 can be decomposed in the following way.







M
2

=


(



0


0


0




1


0


0




0


1


0



)

=



(



0


0


0




1


0


0




0


0


0



)

+

(



0


0


0




0


0


0




0


1


0



)


=


T
1

+


T
2

.









A matrix with rank 2 (M2) may be decomposed into two matrices of rank 1. This corresponds to breaking the 4-to-4 connection network into two independent 2-to-2 networks. This results in the following factorized connection network T:












T
=




(



I


0





T
1



I



)



(



I


0





T
2




M
1




)








=




(



1






















1






















1






















1










1











1






















1



)



(



1






















1






















1




























1













1













1








1






)









(
14
)








Recall that T operates on a vector x, of length 6. x can be written as (X5, x4, x3, x2, x1, x0)T, where x5 indicates the most significant bit, and x0 indicates the least significant bit. Reading T from right to left allows the resulting connection network to be determined, as shown in FIG. 6, which shows the 8-to-8 connection network corresponding to equation (14). Each 4-to-4 block is decomposed into two cascaded stages. The upper and lower gray boxes highlight the separation between the two independent 4-to-4 blocks. Each column of switches 60 is controlled, in this example, by a single control value (x4 or x5), as shown.


First, the rightmost term may be used to determine the initial permutation and first switching stage. This stage has input sets:









(




x
2






x
1






x
0




)

+

im


(


M
1

-
1




T
2


)



=



(




x
2






x
1






x
0




)

+

im


(



0


0


0




0


1


0




0


0


0



)



=


(




x
2






x
1






x
0




)

+

{


(



0




0




0



)

,

(



0




1




0



)


}




,





and output sets









M
1



(




x
2






x
1






x
0




)


+

im


(

T
2

)



=


(




x
0






x





2






x





1




)

+


{


(



0




0




0



)

,

(



0




0




0



)


}

.







So, the input sets are {0, 2}, {1, 3}, {4, 6}, and {5, 7}, and the output sets are {0, 1}, {2, 3}, {4, 5}, and {6, 7}. This, along with the initial blocking examined above, gives the initial permutation and switching structure seen in FIG. 6.


Next, the second stage's input and output sets may be determined by








(




x
2






x
1






x
0




)

+

im


(

T
1

)



=


(




x
2






x
1






x
0




)



{


(



0




0




0



)

,

(



0




1




0



)


}







So, both the input and out put sets are {0, 2}, {1, 3}, {4, 6}, and {5, 7}. This gives the criss-crossing pattern seen before and after the switching column in FIG. 6. As expected, this network has a connectivity of 4 and a control cost of 2.


To solve the factorization problem outlined above (namely, determining a factorization P=N M, such that rank(M1)=rank(N′1)=k), so called “helper matrices,” denoted as HεGLn(F2), may be used. According to various embodiments, a helper matrix has the form









H
=

(




I

n
-
k












H
2




I
k




)





(
15
)








and, due to (12), is always self-inverse:

H=H1.

Given P and any H, the factorization becomes:

P=H·HP.

Setting N=H and M=HP, it is observed that N satisfies the rank condition rankN′2=k set forth above. The remaining question is how to design H such that the rank condition on M is also satisfied and to minimize the connectivity and control costs.


In one embodiment, to solve this problem, assume P is given tiled as in (8). If M=HP, tiled as in (4), then

M1=H2P3+P1.

In other words, an H2 must be found such that rank (M1)=k. H2 determines H in (15) and hence the factorization of P in (16). The following theorem (referred to sometimes herewith as the “helper matrix theorem”) explains that this is possible. Let PεGLn(F2) be tiled as in (8) with rank (P1)=r≦k; then there exists H2 with rank (H2)=k−r and with exactly k−r non-zero entries such that M1=H2P3+P1 has full rank k. To prove this theorem at the outset, define E((i1, j1), . . . , (ik, jk) as the matrix that has ones at the locations (i1, j1), . . . , (ik, jk), and zeros elsewhere. The size of the matrix is clear from the context. Assuming H2=E((i, j)), then H2P3+P1 is the matrix P1 with the jth row of P3 added to its ith row. This gives the basic idea: k−r suitable rows of P3 are selected and added to suitable k−r rows of P1 to correct its rank deficiency. Intuitively, this is possible since P, and thus its submatrix







(




P
3






P
1




)

,





have full rank.


Consider first the special case where P is a permutation of bits, since it is somewhat simpler and important for applications. If P is a permutation, P1 contains r base vectors (as rows); the remaining k−r rows, with row indices i1, . . . , ik−r (in any order), are zero. The missing k−r base vectors are in P3, say at row indices j1, . . . , jk−r. It follows that H2=E((i1, j1), . . . , (ik−r, jk−r)) satisfies the requirements.


For a general P, more work has to be done to identify the proper row indices. Since P1 has rank r, r linear independent columns of P1 can be permuted into the first r locations, and a Gauss elimination on the columns may be performed to zero out the last k−r columns. In other words, there is an invertible matrix GεGLk(F2) such that Q1=P1G has the last k−r columns equal to zero. Setting Q3=P3G, the following is obtained:







(




P
3






P
1




)

=


(




Q
3






Q
1




)




G

-
1


.







Now, r linear independent rows of Q1 may be identified, and the other row indices (in any order) may be called i1, . . . , ik−r. In each of the rows, the rightmost k−r entries are equal to zero. Since








(




Q
3






Q
1




)






has full rank, there are k−r rows whose subvectors, consisting of the k−r rightmost entries, are linear independent. Their indices may be denoted by j1, . . . , jk−r. Setting H2=E((i1, j1), . . . , (ik−r, jk−r)), it is clear that H2Q3+Q1 has full rank and so does

(H2Q3+Q1)G−1=M1

The other requirements are also satisfied by H2.


This proof of this theorem is constructive and yields the following algorithm (referred to as the “factorization algorithm”) for solving the factorization problem discussed above. Assume an input permutation of PεGLn(F2) and k≦n, with the goal of obtaining an output N,MεGLn(F2) such that P=NM and rank(M1)=rank(N′1)=k.


For a case where P is a permutation of bits (a matrix having exactly one 1 in each row and exactly one 1 in each column, with zero elsewhere), the process, as shown in FIG. 7a, involves:

    • (1) Locating the k−r all-zero rows of P1, denoting their indices (in any order) with i1 . . . , ik−r.
    • (2) Locating the k−r non-zero rows of P3, denoting their indices with j1, . . . , jk−2,
    • (3) Setting H2=E((i1, j1), . . . , (ik−r, jk−r)). Output N=H and M=HP


For cases of an arbitrary P, the process, as shown in FIG. 7b, involves:

    • (1) Computing GεGLk(F2) such that Q1=P1G has the last k−r columns equal to zero, and setting Q3=P3G.
    • (2) Locating r linear independent rows of Q1, denoting the remaining row indices (in any order) by i1, . . . , ik−r.
    • (3) Locating k−r rows of Q3 such that their subvectors consisting of the last k−r entries are linear independent, and denote the row indices with j1, . . . , jk−r.
    • (4) Setting H2=E((i1, j1), . . . , (ik−r, ik−r)). Output N=H and M=HP.


      The correctness of the factorization algorithm follows from the helper matrix theorem.


In addition, the factorization algorithm terminates and is correct. Also, the factorization algorithm always produces a “partially” optimal solution, that is, at least one stage is optimal. In some important cases, such as stride permutations and other, the solution is optimal (i.e., both stages are optimal). This theorem, referred to as the “optimality theorem,” is that, for a given permutation P and k (related to the streaming width), the factorization algorithm produces a solution in which the read-stage is optimal with respect to both connectivity and control cost. Further, if P is a permutation of bits, then also the write-stage is optimal with respect to both connectivity and control cost. To prove this theorem, the lower bounds for the connectivity and control cost theorems can be compared. For the read stage, the helper matrix theorem establishes that in the factorization algorithm N′2=H2 has rank k−r. Thus conn (N)=2k−rank(P1), which is minimal (see connectivity theorem). Further, N−1=H incurs k−r additions, i.e., cost(N)=k−rank (P1), which also is minimal (see control cost theorem).


For the write-stage, if permutation P is a permutation of bits, then M=HP, which implies M2=H2P4+P2. Since rank (P1)=r, rank (P2)=k−r. H2 is constructed to extract the k−r nonzero rows with indices jl from P3. Since P is a permutation, this implies that the jlth row of P4 is zero. As a consequence, H2P4 is zero and thus M2=P2. Further, P−1=PT and, hence, P′1=P1T. In summary, rank (M2)=k−r=k−rank (P1)=k−rank (P′1), which is minimal (see connectivity theorem). Further, M incurs k−r additions, i.e., cost (M)=k−rank (P′1), which is minimal (see control cost theorem).


As just demonstrated, for bit permutations P, the factorization algorithm produces optimal solutions. A few other special properties hold in this case and are discussed next. The proof of the optimality theorem asserts that if P is a bit permutation, then the algorithm yields M2=P2. In other words, M has the form









M
=

(




P
4




P
3






P
2






H
2



P
3


+

P
1





)





(
17
)








and, hence, differs from P only in the bottom right k×k submatrix. In the general case, both bottom submatrices M1, M2 differ. Further, the matrix M1=H2P3+P1 is a permutation matrix in this case, since it has full rank and at most k and thus precisely k nonzero entries. Finally, the matrix H2 obtained by the factorization algorithm contains exactly k−r ones, which are located in precisely those rows of P1 that are zero. The same holds for P2. Since rank (P2)=rank (H2)=k−r, one gets im (M2)=im (P2)=im (H2)=im (N′2). As a consequence, recalling that if M is as in equation (4) (and N as in equation (5)), and assuming that M1 (N′1) is invertible and set rank(M2)=s (rank(N′2)=s), then the 2k-to-2k connection network 12a in the write-stage (12b in the read-stage) of FIG. 2 decomposes into 2k−s independent 2s-to-2s networks, the blocking of the two connection networks 12a-b in FIG. 2 is compatible.


For the connection networks, the read stage of the solutions produced by the factorization algorithm has the form







N


=

N
=

(




I

n
-
k








E


(


(


i
1

,

j
1


)

,





,

(


i

k
-
r


,

j

k
-
r



)


)




I
k





)







This makes the decomposition of the connection network according to the connection network decomposition theorem easy by setting

Tl=E((il,jl)).

As an example, one may derive a solution for P=C62 streamed with width 23, as shown below. Performing the above algorithm step by step, P is a permutation, thus the algorithm of FIG. 7a applies.






P
=


(









1






















1






















1






















1




1






















1















)

.







    • Step 1: P1 has two all-zero rows, namely the last two with indices i1=2 and i2=1.

    • Step 2: P3 has two non-zero rows, namely the last two with indices j1=2 and j2=1.

    • Step 3: Therefore, H2=E((2, 2), (1, 1)); H2 is a 3 3 matrix with two 1 values. The desired factorization is readily computed through N=H, M=HC62













C
6
2

=


(



1






















1






















1






















1













1








1













1








1



)



(









1






















1






















1






















1




1








1













1








1






)






(
18
)








M matches (17) and M1 is a permutation matrix as asserted above. Further, the solution has to be optimal for the reasons discussed. Indeed, conn (M)=conn (N)=4 and cost (M)=cost (N)=2, which meets the lower bounds for the connectively and control cost theorems. It is interesting to note that the solution introduces bit arithmetic, namely two additions or xors for each address computation, even though the original P requires none.


Now, the complete hardware implementation of this example is discussed, seen in FIG. 8. Note that M corresponds to the matrix M seen in (7), so M may be implemented as in the previous example, seen in FIG. 6.


Considering the input vector of length 64 to be indexed with addresses, xεF26, with the upper three (3) bits corresponding to the stage number, and the lower three (3) bits indicating the location within the stage. x may be written as (x5, x4, x3, x2, x1, x0)T, with x5 as the most significant bit and x0 as the least significant. Likewise, the output vector may be indexed with address yεF26 of the same form.


The factorization of M's connection network was previously shown in (14). From this, the following characteristics for the write stage are determined. As explained in the example above, the first stage is controlled by x4 and the second stage is controlled by x5. As discussed above, the memory write addresses are calculated directly from M. The write addresses are given by M4x2+M3x1. So, this gives memory write addresses









M
4



x
2


+


M
3



x
1



=




(



0


0


1




0


0


0




0


0


0



)



(




x
5






x
4






x
3




)


+


(



0


0


0




1


0


0




0


1


0



)



(




x
2






x
1






x
0




)



=


(




x
3






x
2






x
1




)

.







It is seen that the memory address where each word must be written is the three bit value given by (x3, x2, x1)T. The input and output connections of each block may be determined from the cosets, as discussed above.


The same process may be performed for N. Note that N=N−1, so all N′i matrices are equal to the Ni versions. N−1 may be decomposed, using the connection network decomposition theorem, to










N

-
1


=



(



1






















1






















1






















1













1








1













1








1



)







=




(



1






















1






















1






















1













1








1






















1



)



(



1






















1






















1






















1






















1













1








1



)










The first stage has input sets








(




x
2






x
1






x
0




)

+

im


(


N
1


-
1




T
2


)



=


(




x
2






x
1






x
0




)

+

{


(



0




0




0



)

,

(



0




0




1



)


}







and output sets given by









N
1




(




x
2






x
1






x
0




)


+

im


(

T
2

)



=



(




x
2






x
1






x
0




)

+

im


(



0


0


0




0


0


0




0


0


1



)



=


(




x
2






x
1






x
0




)

+


{


(



0




0




0



)

,

(



0




0




1



)


}

.








The second stage has input and output sets given by








(




x
2






x
1






x
0




)

+

im


(

T
1

)



=



(




x
2






x
1






x
0




)

+

im


(



0


0


0




0


1


0




0


0


0



)



=


(




x
2






x
1






x
0




)

+


{


(



0




0




0



)

,

(



0




1




0



)


}

.








So, the first stage has input and output sets {0, 1}, {2, 3}, {4, 5}, and {6, 7}. The second stage has input and output sets {0, 2}, {1, 3}, {4, 6}, and {5, 7}. Using the technique described above, it is seen that the first stage is controlled by y3, and the second by y4. The memory read addresses may be determined from









N
4




y
2


+


N
3




y
1



=




(



1


0


0




0


1


0




0


0


1



)



(




y
5






y
4






y
3




)


+


(



0


0


0




0


0


0




0


0


0



)



(




y
2






y
1






y
0




)



=


(




y
5






y
4






y
3




)

.







So, the memory read addresses are given by the three bit value (y5, y4, y3)T. The resulting implementation is visualized in FIG. 8, which shows the hardware corresponding to C62 with stream width 8, as decomposed in (18). Once the factorization problem is solved, a synthesized hardware description language (HDL) file may be generated, that may be synthesized to generate the hardware circuit to implement the permutation.



FIG. 9 is a diagram of a computer system 90 according to various embodiments of the present invention. The computer system 90 comprises a computer device 92, such as a personal computer, laptop, server, workstation, etc. The computer device 92 comprises a processor 94 and a memory 96. The processor 92 may have one or multiple cores. The memory 94 may be a random access memory (e.g., a DRAM). The memory 96 comprises a factorization software module 98 and a hardware description language (HDL) generation software module 100. The factorization software module 98 may comprise computer instructions that, when executed by the processor 92, cause the processor 92 to factorize an input permutation P, given an input stream width (k), to compute the write stage bit matrix M and the read-stage bit matrix N, where P=NM, and rank(M1)=rank (N′1)=k, with optimal connectivity and cost, as described above. The control bits and the address bits are also determined, as described above. The permutation P and the stream width k may be read from a data file, for example. Based on the computed write- and read-stage matrices for the connection networks 12a-b, the control bits for the control logic 16a-b, and the address bits for the RAMs 14, the HDL generation software module 100 may generate a HDL, synthesizable file 101 that describes a circuit for implementing the reorderings of the input permutation P. The HDL file may be, for example, a Verilog file. The HDL file 101 may be stored in a file or database associated with the computer system 90. It may also be transported via a computer network to a remote computer system (not shown). Of course, the computer system 90 may comprise one or a number of distributed computing devices 92. In addition, the computing device(s) 92 may comprise one or a number of processors 94 and/or one or a number of memory units 96.



FIG. 10 shows a computer implemented process according to various embodiments of the present invention. At step 102, the input permutation P and the stream width k are received. Next, at step 104, the write- and read-stage matrices for the connection networks 12a-b, the control bits for the control logic 16a-b, and the address bits for the RAMs 14 are calculated, using the techniques described above. Then, at step 106, the HDL synthesizable file 102 is generated. Next, at step 108, the hardware circuit 10 may be constructed based on the HDL synthesizable file 102. The circuit 10 may be implemented in, for example, a FPGA platform or an ASIC. The connection networks 12a-b may be implemented as switches or multiplexers, for example.


For purposes of illustration, now presented are seven example permutations with their full solutions. In addition to an exact specification, a visual representation of the solution matrices is used to show the form of the matrix under general conditions. In these figures, each box represents a matrix P, N, or M. The dashed lines show the divisions between the submatrices, and the solid black lines indicate segments with value 1 in the matrix. Gray boxes are used to indicate portions of the matrix that are unknown or not specified in the problem. Lastly, the blank areas of the box indicate portions of the matrix equal to zero. For example, the matrix Cn2 given in (10) is represented as shown in FIG. 11.


EXAMPLE 1

P with full rank(P1). If the bottom-right matrix P1 has full rank (i.e., rank(P1)=k), then P fulfills the restrictions by itself. So, a solution of P=N·M is given by P=I·IP. This factorization can be visualized as shown in FIG. 12. The costs of N are given by:

cost(N)=0 and conn(N)=1.

The cost of M, cost(M), is equal to the linear complexity of P, and the connectivity, conn(M)=rank(P2).


EXAMPLE 2

π(Q)custom characterI. Given π(Q)custom characterI.2l, then P=Q⊕Il. For the case where l≧k, under this condition, P1 has full rank and the problem is solved as in Example 1 above. This produces solution shown in FIG. 13. For the case where l<k, a factorization Q=N0·M0 is found, with a streaming width of k−l. This solution has the form shown in FIG. 14. Once this solution is found, the values for N and M are found according to:

N=N0⊕Il, M=M0⊕Il

The arithmetic and connection costs of N and M are identical to the costs for N0 and M0 (respectively).


EXAMPLE 3

Icustom characterπ(Q). Given π(P)=I2custom characterπ(Qm), then P=Il⊕Qm. For the case where m≦k, P1 has full rank, so the factorization is trivial. Using the “full-rank” solution seen in Example 1, the solution shown in FIG. 15 may be obtained. For the case where m>k, the factorization Q=N0·M0 is first solved, with a streaming width of k. Then, N and M are found according to:

N=Ik−m⊕N0, M=Ik−m⊕M0

The resulting solution will have the costs:

cost(N)=cost(N0), conn(N)=conn(N0),
cost(M)=cost(M0), conn(M)=conn(M0).

The solution has the form shown in FIG. 16.


EXAMPLE 4

Icustom characterπ(Q)custom characterI. If π(P)=I2′custom characterπ(Qm)custom characterI2h, then P=Il⊕Qm⊕Ih. If k≦h, then P1 has full rank, so the solution follows Example 1 above. If k>h, P can be regrouped as P=Il⊕(Qm⊕Ih), and the solution can be found as in the Icustom characterπ(Q) case, which is Example 3 above.


EXAMPLE 5

Stride permutation L. A solution for stride permutation π(P)=L2n,2s, streamed with width 2k, 1≦k≦n−1 is derived. From the discussion above, it is seen that P=Cns. Let r=rank(P1).









r
=

{




0
,




k
<

s





and





k

<

n
-
s








k
-
s

,




s

k


n
-
s








k
-

(

n
-
s

)


,





n
-
s

<
k
<
s








2

k

-
n

,




k
>

n
-

s





and





k


>
s









(
19
)








Applying the factorization algorithm described above, the helper matrix H2 is obtained:

H2=E((min(k, n−s)−i, n−max(s, k)−i|i=1 . . . , k−r)  (20)

Thus,









H
=

(




I

n
-
k












H
2




I
k




)





(
21
)








allows the final factorization to be computed according to N=H, M=HCns. This factorization yields cost(M)=cost(N)=k−r and conn(N)=conn(M)=2k−r. For the case where k<s and k<n−s, the P=Cns=N·M has the form shown in FIG. 17. For the case where s≦k≦n−s, then P1 has one or more non-zero rows, which occur at the top of the matrix. P=Cns=N·M has the form shown in FIG. 18. For the case where n−s<k<s, then P1 has one or more non-zero rows, which occur at the bottom of the matrix. P=Cns=N·M has the form shown in FIG. 19. For the case where k>n−s and k>s, then P1 has one or more non-zero rows, which occur at the top and bottom of the matrix. P=Cns=N·M has the form shown in FIG. 20.


EXAMPLE 6

Bit reversal R. If π(P)=R2n, then it is seen, based on the above discussion, that P=Jn. If r=rank(P1), then r=2·max(0,k−n/2). Applying the factorization algorithm discussed above, the helper matrix H2 is obtained:

H2=E((r+i,i)|i=0, . . . , k−r)  (22)

Then, using P=N·M=H·HP, a solution with the following costs is produced:

cost(M)=cost(N)=k−r, conn(M)=conn(N)=2k−r.

For the case where k≦n/2, the solution has the form shown in FIG. 21. For the case where k>n/2, the solution has the form shown in FIG. 22.


EXAMPLE 7

Hadamard reordering. The Hadamard reordering permutes the 2n-element data vector X=(x0, x1, . . . , x2n−1)T to the vector Y=(xh2n(0), xh2n(1), . . . , xh2n(2n−1))T, where h2n(·) is recursively generated according to:

h1(0)=0
h2K(2i)=hK(i)
h2K(2i+1)=2K−1−hK(i), i=0, 1, . . . , K−1.

This permutation is represented as the matrix Z2n. If π(P)=Z2n, then P=Sn, defined as










S
n

=

(













1


1






















1

















1


















)





(
23
)








If r=rank(P1), then r=max(0, 2k−n). Applying the factorization algorithm, the helper matrix H2 is obtained:

H2=E((k−1i, k−r−i)|i=0, . . . , k−r−1)  (24)

For the case where k≦n/2, the solution P=N·M=H·HP has the form shown in FIG. 23. For the case where n/2<k<n/2+1, the solution has the form shown in FIG. 24. In addition, for the case where k≧n/2+1, the solution has the form shown in FIG. 25. These solutions have the following costs:

cost(M)=n−1+2(k−r) cost(N)=k−r conn(M)=conn(N)=2k−r.


Table I below includes a summary of the example bit matrices and their solutions.
















TABLE I





P
π(P)
solution
conn(M)
conn(N)
cost(M)
cost(N)
optimal

















Cn
L2n,2s
(21)












Case 1: k < min(s, n − s),
2k
2k
k
k
yes


Case 2: s ≦ k ≦ n − s,
2s
2s
s
s
yes


Case 3: n − s < k < s,
2n−s
2n−s
n − s
n − s
yes


Case 4: k > max(n − s, s),
2n−k
2n−k
n − k
n − k
yes









Jn
R2n
(22)












Case 1: k ≦ n/2,
2k
2k
k
k
yes


Case 2: k > n/2,
2n−k
2n−k
n − k
n − k
yes









Sn
Z2n
(24)












Case 1: k ≦ n/2,
2k
2k
k
n − 1 + 2k
?


Case 2: n/2 < k < n/2 + 1,
2k−1
2k−1
k − 1
n − 3 + 2k
?


Case 3: k ≧ n/2 + 1,
2n−k
2n−k
n − k
3n − 2k − 1
?









The streaming permutations considered in this application have a wide range of applications.


Some of the most important applications include transforms, transposition, sorting networks, and Viterbi coding, many of which access data in a stride permutation pattern.


Permutations are extremely important in fast computation of linear transforms. The Cooley-Tukey fast Fourier transform (FFT) and its variants use stride permutation L and bit reversal R. A similar Cooley-Tukey-like fast algorithm for the Walsh-Hadamard transform (WHT) also uses stride permutation L. Streaming permutations are applicable to fast algorithms for the discrete cosine transform (DCT) and discrete sine transform (DST). Fast Cooley-Tukey type algorithms for these transforms have been derived. These algorithms use the stride permutation, as well as the permutation K2n,2m., defined

K2n,2m=(I2m−lcustom character(I2n−m⊕J2n−m))L2n,2m

If π(Q)=I2n−m⊕J2n−m, then






Q
=

(



1



















1


1
































1












1



)






So, if π(P)=K2n,2m, then

P=(Im−1⊕Q)Cnm.

The K permutation is linear on the bits, so it can be implemented by the factorization algorithm.


In addition to Cooley-Tukey type algorithms, fast regularized (or constant geometry) algorithms for computing the DCT and DST exist. These algorithms require the stride permutation L as well as the Hadamard reordering, Z2n, seen in Example 7 above.


Additionally, some optimizations in the transform domain can be simply implemented using embodiments of the present invention. For example, the prior art shows how the bit reversal and matrix transposition needed in the 2-D FFT can be performed together at a reduced cost. According to various embodiments, this optimization is easily realized as

π(P)=(I2n⊕R2m)L2n2,2m and P=(In⊕JnCn2n


Permutations can be important applications themselves. For example, the transposition (or corner turn) of an n n matrix is simply the stride permutation Ln2,n. Transposition is a very important application; it is commonly used in multi-dimensional separable signal processing (e.g., multi-dimensional DFT, image processing, etc.). This permutation is easily implemented with embodiments of the present invention


Other possible applications for the present invention occur in a variety of domains. For example, sorting networks and Viterbi coding both access data in a stride permutation pattern. The techniques of the present invention can be used in streaming implementations of these applications.


The examples presented herein are intended to illustrate potential and specific implementations of the embodiments. It can be appreciated that the examples are intended primarily for purposes of illustration for those skilled in the art. No particular aspect or aspects of the examples is/are intended to limit the scope of the described embodiments.


It is to be understood that the figures and descriptions of the embodiments have been simplified to illustrate elements that are relevant for a clear understanding of the embodiments, while eliminating, for purposes of clarity, other elements. For example, certain operating system details for computer system are not described herein. Those of ordinary skill in the art will recognize, however, that these and other elements may be desirable in a typical processor or computer system. Because such elements are well known in the art and because they do not facilitate a better understanding of the embodiments, a discussion of such elements is not provided herein.


In general, it will be apparent to one of ordinary skill in the art that at least some of the embodiments described herein may be implemented in many different embodiments of software, firmware and/or hardware. The software and firmware code may be executed by a processor or any other similar computing device. The software code or specialized control hardware, which may be used to implement embodiments, is not limiting. For example, embodiments described herein may be implemented in computer software using any suitable computer software language type, such as, for example, C or C++ using, for example, conventional or object-oriented techniques. Such software may be stored on any type of suitable computer-readable medium or media, such as, for example, a magnetic or optical storage medium. The operation and behavior of the embodiments may be described without specific reference to specific software code or specialized hardware components. The absence of such specific references is feasible, because it is clearly understood that artisans of ordinary skill would be able to design software and control hardware to implement the embodiments based on the present description with no more than reasonable effort and without undue experimentation.


Moreover, the processes associated with the present embodiments may be executed by programmable equipment, such as computers or computer systems and/or processors. Software that may cause programmable equipment to execute processes may be stored in any storage device, such as, for example, a computer system (nonvolatile) memory, an optical disk, magnetic tape, or magnetic disk. Furthermore, at least some of the processes may be programmed when the computer system is manufactured or stored on various types of computer-readable media.


It can also be appreciated that certain process aspects described herein may be performed using instructions stored on a computer-readable medium or media that direct a computer system to perform the process steps. A computer-readable medium may include, for example, memory devices such as diskettes, compact discs (CDs), digital versatile discs (DVDs), optical disk drives, or hard disk drives. A computer-readable medium may also include memory storage that is physical, virtual, permanent, temporary, semipermanent, and/or semitemporary. A computer-readable medium may further include one or more data signals transmitted on one or more carrier waves.


A “computer,” “computer system,” “host,” or “processor” may be, for example and without limitation, a processor, microcomputer, minicomputer, server, mainframe, laptop, personal data assistant (PDA), wireless e-mail device, cellular phone, pager, processor, fax machine, scanner, or any other programmable device configured to transmit and/or receive data over a network. Computer systems and computer-based devices disclosed herein may include memory for storing certain software applications used in obtaining, processing, and communicating information. It can be appreciated that such memory may be internal or external with respect to operation of the disclosed embodiments. The memory may also include any means for storing software, including a hard disk, an optical disk, floppy disk, ROM (read only memory), RAM (random access memory), PROM (programmable ROM), EEPROM (electrically erasable PROM) and/or other computer-readable media.


In various embodiments disclosed herein, a single component may be replaced by multiple components and multiple components may be replaced by a single component to perform a given function or functions. Except where such substitution would not be operative, such substitution is within the intended scope of the embodiments. Any servers described herein, for example, may be replaced by a “server farm” or other grouping of networked servers (such as server blades) that are located and configured for cooperative functions. It can be appreciated that a server farm may serve to distribute workload between/among individual components of the farm and may expedite computing processes by harnessing the collective and cooperative power of multiple servers. Such server farms may employ load-balancing software that accomplishes tasks such as, for example, tracking demand for processing power from different machines, prioritizing and scheduling tasks based on network demand and/or providing backup contingency in the event of component failure or reduction in operability.


While various embodiments have been described herein, it should be apparent that various modifications, alterations, and adaptations to those embodiments may occur to persons skilled in the art with attainment of at least some of the advantages. The disclosed embodiments are therefore intended to include all such modifications, alterations, and adaptations without departing from the scope of the embodiments as set forth herein.

Claims
  • 1. A computer-implemented method for generating a synthesizable hardware description language file for a datapath for performing a permutation, the method comprising: receiving, with a computer system, the permutation on 2n data words, n>1, and a positive integer value k, 1≦k≦n−1, wherein the permutation is given by an invertible n×n bit matrix P, 2k is the streaming width for the datapath, such that the datapath receives 2k data words at regular intervals;computing, with the computer system, n×n bit matrices N and M, wherein P=NM and rank(M1)=rank(N1′)=k, wherein M1 is the bottommost rightmost k×k submatrix of M and N1′ is the bottommost rightmost k×k submatrix of N−1;generating, with the computer system, one or more synthesizable hardware description language files for the datapath, wherein the datapath comprises a write-stage connection network, a plurality of memory banks connected to the write-stage connection network, and a read-stage connection network connected to the plurality of memory banks, wherein the write-stage connection network writes the 2k data words received at every interval to the memory banks according to the matrix M, and wherein the read-stage connection network reads data words from the memory banks each interval according to the matrix N and wherein the datapath is capable of accepting the first 2k datawords of the next 2n datawords to be permuted in the interval immediately following accepting the last 2k datawords of the preceding 2n datawords; andstoring the one or more synthesizable hardware description language files in a computer file.
  • 2. The method of claim 1, further comprising synthesizing the one or more synthesizable hardware description language files to generate hardware for the datapath.
  • 3. The method of claim 2, wherein the datapath comprises multiplexers and the memory banks.
  • 4. The method of claim 3, wherein the datapath receives 2k data words at every clock cycle.
  • 5. The method of claim 4, wherein the memory banks comprise dual-ported RAM.
  • 6. A computer system comprising: a processor; anda memory in communication with the processor, wherein the memory stores instructions which, when executed by the processor, cause the processor to generate a synthesizable hardware description language file for a datapath for performing a permutation, wherein the permutation is on 2n data words and is given by an invertible n×n bit matrix P, where 2k is the streaming width for the datapath, such that the datapath receives 2k data words at regular intervals, n>1 and 1≦k≦n−1, by: computing n×n bit matrices N and M, wherein P=NM and rank(M1)=rank(N1′)=k, wherein M1 is the bottommost rightmost k×k submatrix of M and N1′ is the bottommost rightmost k×k submatrix of N−1; andgenerating one or more synthesizable hardware description language files for the datapath, wherein the datapath comprises a write-stage connection network, a plurality of memory banks connected to the write-stage connection network, and a read-stage connection network connected to the plurality of memory banks, wherein the write-stage connection network writes the 2k data words received at every interval to the memory banks according to the matrix M, and wherein the read-stage connection network reads data words from the memory banks each interval according to the matrix N, and wherein the datapath is capable of accepting the first 2k datawords of the next 2n datawords to be permuted in the interval immediately following accepting the last 2n datawords of the preceding 2n datawords.
  • 7. The system of claim 6, wherein the datapath comprises multiplexers and the memory banks.
  • 8. The system of claim 7, wherein the datapath is for receiving 2k data words at every clock cycle.
  • 9. The system of claim 8, wherein the memory banks comprise dual-ported RAM.
  • 10. A non-transitory computer readable storage medium, having instructions stored thereon, which when executed by a processor, cause the processor to generate a synthesizable hardware description language file for a datapath for performing a permutation, wherein the permutation is on 2n data words and is given by an invertible n×n bit matrix P, where 2k is the streaming width for the datapath, such that the datapath receives 2k data words at regular intervals, n>1 and 1≦k≦n−1, by by: computing n×n bit matrices N and M, wherein P=NM and rank(M1)=rank(N1′)=k, wherein M1 is the bottommost rightmost k×k submatrix of M and N1′ is the bottommost rightmost k×k submatrix of N−1; andgenerating one or more synthesizable hardware description language files for the datapath, wherein the datapath comprises a write-stage connection network, a plurality of memory banks connected to the write-stage connection network, and a read-stage connection network connected to the plurality of memory banks, wherein the write-stage connection network writes the 2k data words received at every interval to the memory banks according to the matrix M, and wherein the read-stage connection network reads data words from the memory banks each interval according to the matrix N, and wherein the datapath is capable of accepting the first 2k datawords of the next 2n datawords to be permuted in the interval immediately following accepting the last 2k datawords of the preceding 2n datawords.
  • 11. The non-transitory computer readable storage medium of claim 10, wherein the datapath comprises multiplexers and the memory banks.
  • 12. The non-transitory computer readable storage medium of claim 11, wherein the datapath is for receiving 2k data words at every clock cycle.
  • 13. The non-transitory computer readable storage medium of claim 12, wherein the memory banks comprise dual-ported RAM.
  • 14. A datapath for performing a fixed permutation on a vector of 2n data words, n>1, wherein the permutation has the property that it can be specified as an n×n bit matrix P, the datapath comprising: a plurality of databanks;a write-state connection network connected to the plurality of databanks, wherein the write-stage connection network receives the 2n data words in chunks of 2k data words in 2n−k regular intervals, 1≦k≦n−1; anda read-stage connection network connected to the plurality of databanks;wherein N and M are n×n matrices such that P=NM and rank(M1)=rank(N1′)=k, wherein M1, is the bottommost rightmost k×k submatrix of M and N1′ is the bottommost rightmost k×k submatrix of N−1; andwherein the write-stage connection network writes the 2k data words received at every interval to the memory banks according to the matrix M;wherein the read-stage connection network reads data words from the memory banks each interval according to the matrix N; andwherein the datapath is capable of accepting the first 2k datawords of the next 2n datawords to be permuted in the interval immediately following accepting the last 2k datawords of the preceding 2n datawords.
  • 15. The datapath of claim 14, wherein P is a matrix that has at least one row with 2 entries equal to 1.
  • 16. The datapath of claim 15, wherein k>1.
  • 17. The datapath of claim 14, wherein P is a matrix that has exactly one entry 1 in every row and every column and that is zero elsewhere and P is not a cyclic shift and P is not a matrix with entries 1 only along the diagonal from top right to bottom left and zero elsewhere.
  • 18. The datapath of claim 17, wherein k>1.
  • 19. The datapath of claim 14 wherein P is a cyclic shift or P is a matrix with entries 1 only along the diagonal from top right to bottom left and zero elsewhere.
  • 20. The datapath of claim 19 wherein k=2.
  • 21. The datapath of claim 19 wherein k=3.
  • 22. The datapath of claim 19 wherein k=4.
  • 23. The datapath of claim 19 wherein k>4.
PRIORITY CLAIM

The present application claims priority to U.S. provisional application Ser. No. 60/997,596, filed Oct. 4, 2007, entitled “Streaming Data Permutation Datapath Using Memory Arrays,” which is incorporated herein by reference in its entirety.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

This invention was made with support from the U.S. government, under National Science Foundation No. ITR/ACI-0325687, and Defense Advanced Research Program No. NBCH-1050009. The U.S. government has certain rights in this invention.

US Referenced Citations (13)
Number Name Date Kind
5163017 Wong et al. Nov 1992 A
5594657 Cantone et al. Jan 1997 A
5808942 Sharpe-Geisler Sep 1998 A
6304887 Ju et al. Oct 2001 B1
6389379 Lin et al. May 2002 B1
6549925 Amrany et al. Apr 2003 B1
7010558 Morris Mar 2006 B2
7023938 Kapoor et al. Apr 2006 B1
7062744 Osann, Jr. Jun 2006 B2
7237055 Rupp Jun 2007 B1
20030121010 Aubury Jun 2003 A1
20030140337 Aubury Jul 2003 A1
20070250656 Rupp Oct 2007 A1
Related Publications (1)
Number Date Country
20090094578 A1 Apr 2009 US
Provisional Applications (1)
Number Date Country
60997596 Oct 2007 US