SOFT-DECISION DECODING OF REED-SOLOMON CODES USING PATTERN INFORMATION OVER PARTIAL RESPONSE CHANNELS. Soowoong Lee

Size: px
Start display at page:

Download "SOFT-DECISION DECODING OF REED-SOLOMON CODES USING PATTERN INFORMATION OVER PARTIAL RESPONSE CHANNELS. Soowoong Lee"

Transcription

1 SOFT-DECISION DECODING OF REED-SOLOMON CODES USING PATTERN INFORMATION OVER PARTIAL RESPONSE CHANNELS by Soowoong Lee Submitted to the Graduate Faculty of Department of Electrical and Computer Engineering in partial fulfillment of the requirements for the degree of Doctor of Philosophy Carnegie Mellon University September 2009

2 ii

3 CARNEGIE MELLON UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING This dissertation was presented by Soowoong Lee It was defended on September 11, 2009 and approved by Prof. Vijayakumar Bhagavatula, Electrical and Computer Engineering Prof. Jim Bain, Electrical and Computer Engineering Prof. Rohit Negi, Electrical and Computer Engineering Prof. Heung-No Lee, Department of Information and Communications, Gwangju Institute of Science and Technology, Korea Advisor: Prof. Vijayakumar Bhagavatula, Electrical and Computer Engineering iii

4 iv

5 c Copyright by Soowoong Lee 2010 All Rights Reserved v

6 vi

7 Abstract Reed-Solomon (RS) codes have been used for a long time in many data storage systems for error correction. Popularity of RS codes is due to their powerful burst error correction capability and well-established decoding algorithm with efficient hardware implementation providing high throughput. Conventional hard-decision decoding algorithms are able to correct up to half the minimum distance. To achieve higher areal density needed these days, enhanced error correction capability is required. Soft information, which is probability information about binary decision, can be used to correct more errors than half the minimum distance. Rapid increase of computing power enables the systems to execute complicated decoding algorithms using soft information. Many soft-decision decoding algorithms for RS codes have been proposed and have been investigated for application to magnetic recording channels. However, even with increased computing power, the complexity of soft-decision decoding algorithms is too high for them to be employed in real applications which require high data rate, small hardware area and low power. Some soft-decision decoding algorithms adopt bit-based decoding schemes using bit reliability. Performance gains in magnetic recording channels provided by vii

8 the bit-based soft-decision decoding algorithms are not as good as those in memoryless additive white Gaussian Noise (AWGN) channels, because of the burst error characteristics of magnetic recording channels. On the other hand, symbol-based soft-decision decoding algorithms can extend burst error correction capability, but require excessively high complexity. In this thesis, we propose a series of algorithms for soft-decision decoding of RS codes: successive error-and-erasure correction decoding, pattern-flipping Chasetype algorithms, reliability matrix construction method and multiplicity assignment algorithm for Koetter-Vardy (KV) algorithm. All proposed algorithms target partial response (PR) channels of use in magnetic recording channels where burst errors are dominant. While most soft-decision decoding algorithms use soft information for bits or symbols, the proposed algorithms take advantage of soft information for patterns (An error pattern can extend to multiple bits and straddle symbol boundaries). In order to provide probable error patterns and corresponding reliabilities for the proposed algorithms, we also propose a modified Viterbi algorithm, named pattern-output Viterbi algorithm. Each proposed algorithm is supported by simulations and analysis, to show good competitive performance and complexity. viii

9 Acknowledgement This thesis and I owe many people deep gratitude beyond description. I would like to express my sincere appreciation to my advisor, Professor Vijayakumar Bhagavatula for guiding me on the right track with invaluable advice. I would also like to express my gratitude to Professor Jim Bain, Professor Rohit Negi and Professor Heung-No Lee. It was great honor to have them as my thesis committee. Their constructive comments have helped me to improve this thesis. I appreciate the support of my company, Samsung Electronics Co., Ltd., for having offered me this great opportunity to pursue Ph.D. degree abroad. I like to show my gratitude to my colleagues in the company and the staffs in the human resources group. I give my gratefulness to the staffs of ECE Department in CMU for their assistance. I thank all my colleague students for their friendship and help. I would like to express my love and gratitude to my family. I respect and thank my parents and parent-in-laws for their endless love and support throughout my life. I wish they would have healthy and long lives. Also, I thank my sister, brothers, sister-in-laws and brother-in-laws for cheering me. I thank my cousin and sister-inlaw who made my family feel home in Pittsburgh. Finally, I love my wife, Eunyee and my babies Gayoung and Jiyoung. Thank you for being beside me always. They Lived Happily Ever After. ix

10 x

11 Contents Abstract vii Acknowledgement ix 1 Introduction Motivation Thesis Organization and contributions Reed-Solomon Codes Definitions of RS codes Relationships among different definitions Hard-decision decoding of RS codes Soft-decision decoding algorithms of RS codes Successive algebraic decoding algorithms Algebraic soft-decision decoding (ASD) algorithm - Koetter- Vardy (KV) algorithm Adaptive belief propagation algorithm (ABP) Chapter summary Partial Response Channels 27 xi

12 3.1 Error Events Error event analysis Chapter summary Successive Error-and-Erasure Decoding (SED) SED as a hard-decision list decoding: HSED(f) Successive error-and-erasure decoding: SED(l,f) Simulation Performance estimation Average complexity Chapter summary Pattern-Output Viterbi Algorithm (POVA) Conventional method for error pattern extraction Pattern-Output Viterbi Algorithm Chapter summary Pattern-Flipping Chase-type Algorithms Pattern-flipping Chase2-type algorithm Simulation Performance estimation The efficiency of iterations List size and Stopping condition Pattern-flipping Chase3-type algorithm Comparison with list Viterbi algorithm Practical consideration for real applications Chapter summary xii

13 7 Application of the POVA to the KV Algorithm The Koetter-Vardy algorithm Reliability matrix construction using the POVA Simulation Modification of the BGMD over PR channels Chapter summary Epilogue Contributions Conclusions Future Work xiii

14 xiv

15 List of Tables 3.1 Dominant error patterns by simulation over the [ ] PR channel at 10/σ 2 n = 12dB and 16dB Performance gain and average complexity of SEDs at CER = xv

16 xvi

17 List of Figures 1.1 The block diagram of the conventional RLL-ECC structure in magnetic recording channels Illustration to show why error patterns should be considered over PR channels Several definitions of RS codes and their relations Pipelined structure of conventional hard-decision error-and-erasure decoding for RS codes The partial response channel model The ideal PR channel model used in this thesis The results of performance estimation and simulation of the conventional hard-decision decoding for the (255, 239, 17) RS code over the [ ] PR channel with AWGN Extension of correction bound by the HSED Performance of SED as a hard-decision list decoding for the (255, 239, 17) RS code over memoryless AWGN channel xvii

18 4.3 Simulation results of all possible SED(l,f)s for the (255, 239, 17) RS code at E b /N 0 =6.5dB over memoryless AWGN channel with BPSK modulation Performance versus complexity of SED(1 255) at E b /N 0 =6.5dB Simulation results of SEDs for the (255, 239, 17) RS code over memoryless AWGN channel Simulation results of SEDs for the (255, 239, 17) RS code over an artificial double-bit error channel Transform of symbol reliabilities over memoryless AWGN channel with BPSK modulation at E b /N 0 = 6.5dB Performance estimation of the SED for the (255, 239, 17) RS code over memoryless AWGN channel Average complexity of SEDs for (255, 239, 17) RS code over memoryless AWGN with BPSK The block diagram of the correlation-based pattern extracting method in magnetic recording channels An example of the POVA operation over a PR channel with memory of two Input and output illustration of the POVA Simulation results of the conventional Chase2 decoders for the (255, 239, 17) RS code over memoryless AWGN channel Simulation results of the conventional Chase2 decoders with the SOVA for the (255, 239, 17) RS code over the [ ] PR channel with AWGN. 65 xviii

19 6.3 The block diagram of the pattern-flipping Chase2 decoder with the POVA in magnetic recording channels Simulation results of the proposed pattern-flipping Chase2-type algorithms with p = compared to conventional Chase2 algorithms for the (255, 239, 17) RS code over the [ ] PR channel with AWGN Performance estimation of the proposed pattern-flipping Chase2-type algorithm for the (255, 239) RS code over the [ ] PR channel with AWGN Number of iterations versus CER of the pattern-flipping Chase2 algorithm for the (255, 239, 17) RS code over the [ ] PR channel with AWGN at 10/σn 2 = 14dB Average complexity of A(8) for the (255, 239, 17) RS code over the [ ] PR channel with AWGN Pattern flipping for the (n,k,d) RS code in the n dimensional vector space over GF(q) Simulation results of the proposed algorithm with the stopping condition for the (255, 239, 17) RS code over the [ ] PR channel with AWGN Simulation results of the proposed pattern-flipping Chase3-type decoder for the (255, 239, 17) RS code over the [ ] PR channel with AWGN Simulation results of the list Viterbi algorithm for the (255, 239, 17) RS code over the [ ] PR channel with AWGN The block diagram of the proposed reliability matrix generation method using the POVA xix

20 7.2 An example of the reliability matrix construction from the POVA outputs through the PR channel with channel depth of 3 over GF(2 3 ) Simulation results of the ASD algorithm and the BGMD algorithm for the (255, 239, 17) RS code over memoryless AWGN channel Simulation results of the ASD algorithm using the proposed patternbased reliability assignment over the [ ] PR channel Simulation results of the BGMD and the modified BGMD (PGMD) for the (255, 239, 17) RS code over the [ ] PR channel Codeword error rate versus the number of erased bits in the BGMD and the number of erased patterns in the modified BGMD (PGMD) at 10/σn 2 = 14dB for the (255, 239, 17) RS code over the [ ] PR channel xx

21 Chapter 1 Introduction Reed-Solomon (RS) codes are the most popular error correction codes (ECC) in current digital communications and data storage systems. In particular, most data storage systems employ RS codes for error correction; magnetic recording systems including hard-disk drives (HDD) and magnetic tape recording systems, and optical recording systems including compact disk (CD), digital versatile disk (DVD), and blue-ray disk (BD) [1]. The popular usage of RS codes is due to their powerful burst error correction capability and well-established decoding algorithm with efficient hardware implementation providing high throughput. In magnetic recording read channels, partial response (PR) channels with the Viterbi algorithm and run-length limited (RLL) codes produce short burst errors and media defects generate long burst errors. Data rate of current HDDs reaches higher than 2Gbps. Thanks to significant increases in computing power by the scaling of CMOS technology, however, it has become possible to implement complex decoding algorithms 1

22 2 CHAPTER 1. INTRODUCTION by taking advantage of soft information to achieve enhanced error correction capability. More powerful error correction capability may lead to increased areal density on data storage media for the same data reliability, or more reliable storage systems for the same areal density. Towards the goal of achieving better error correction capability using increased computing power, soft-decision decoding algorithms (decoding algorithms that use the probabilities or likelihoods of input bits or symbols) are receiving increasing research attention; low-density parity check (LDPC) codes [2] and soft-decision decoding algorithms of RS codes. Many soft-decision decoding algorithms have been proposed [3] [10] and investigated for application to magnetic recording channels [11] [13]. However, they are still not attractive in real applications because of some limitations. Much research about LDPC codes has been done since their rediscovery in 1999 [6]. LDPC codes have been shown to approach the Shannon s channel capacity and provide significant performance gain over RS codes in memoryless additive white Gaussian noise (AWGN) channels. However, the performance gains provided by LDPC codes for magnetic recording channels are much smaller than they are for memoryless AWGN channels [11], because of the burst error characteristics of magnetic recording channels. Burst errors are basically more detrimental to binary codes than to non-binary codes and introduce correlation among erroneous bits. Furthermore, the LDPC error floor problem (i.e., significant slowing down of performance improvement at high signal-to-noise ratio (SNR)) [14] has been a bottleneck in LDPC codes replacing RS codes in magnetic recording channels. Alternately, keeping RS codes but applying soft-decision decoding algorithm could be a more practical solution if good (i.e., low-complexity and high-accuracy) soft-decision decoding algorithms for RS codes can be developed.

23 1.1. MOTIVATION 3 Since the initial advent of RS codes in 1960 [15], there has been much research in extending their correction bound. The early approaches were to conduct the conventional hard-decision algebraic decoding algorithm iteratively modifying the received sequence and selecting the most probable codeword out of the list of candidate codewords, so called successive algebraic decoding algorithms [3] [5]. Due to their limited performance gains or excessive complexity, however, those algorithms have been mainly used as benchmarks for comparing with new algorithms. Recently, two remarkable algorithms were proposed, which sparked significant interest in soft-decision decoding algorithms of RS codes. One algorithm, so called Koetter-Vardy (KV) algorithm [7][8], introduced a new algebraic soft-decision decoding method based on polynomial interpolation using the original definition of RS codes which is different from popular definitions. However, due to its high computational complexity and large memory requirement, that soft-decision decoding method is still unattractive for practical applications. The other algorithm uses the belief propagation algorithm adapting parity check matrices at each iteration in order to overcome the denseness of the parity check matrices of RS codes [9]. However, it requires additional complexity for adapting the parity check matrices as well as for the belief propagation algorithm. 1.1 Motivation Soft-decision decoding algorithms would, in general, provide certain amount of error correction performance gain as desired. However, the soft-decision decoding algorithms, when applied to magnetic recording systems, suffer from several deficiencies.

24 4 CHAPTER 1. INTRODUCTION ECC encoder RLL encoder Channel Bit detector RLL decoder ECC decoder Figure 1.1: The block diagram of the conventional RLL-ECC structure in magnetic recording channels. First, the complexity of the soft-decision decoding algorithms that offer reasonable performance gain is too high to achieve the high throughput needed in magnetic recording systems [16]. The high complexity also results in large hardware area, long latency and/or high power consumption. Second, the performance gains in magnetic recording channels provided by the bit-based soft-decision decoding algorithms such as LDPC codes, are not as good as those in memoryless AWGN channels [12], because of the media noise and the burst error characteristics of the magnetic recording channels. The burst errors introduce correlation among erroneous bits and are more detrimental to binary codes and/or bitbased decoding algorithms than to nonbinary codes and/or symbol-based decoding algorithms. Third, the LDPC error floor problem [14] is of concern and is one of the main reasons why LDPC codes have not replaced RS codes in magnetic recording channels. Recently, it was announced that LDPC codes are used in commercial products, but RS codes are still dominant. Another common problem in using the soft-decision decoding algorithms in magnetic recording channels is their incompatibility with the standard hard decoding used by run-length limited (RLL) codes. Most data storage systems employ RLL codes which constrain the minimum run-length and the maximum run-length of data sequences. Though many magnetic storage systems do not require the minimum runlength constraint anymore, they still require the maximum run-length constraint in

25 1.1. MOTIVATION 5 (a) Errors over memoryless AWGN channels binary codes nonbinary codes 2-bit errors 2-symbol errors (b) Errors over PR channels binary codes nonbinary codes pattern codes? 8-bit errors 4-symbol errors 2-pattern errors Figure 1.2: Illustration to show why error patterns should be considered over PR channels. order to provide signal transitions for clock recovery. Conventionally, the RLL encoder comes after the ECC encoder in order to produce an RLL-constrained recording sequence, as shown in Fig Accordingly the RLL hard decoder comes before the ECC decoder, with the consequence that it blocks soft information from the channel which is needed by the soft-decision decoder. In this thesis, we propose several soft-decision decoding algorithms for RS codes to avoid the common problems of soft-decision decoding algorithms while maintaining performance gains. The algorithms target PR channels rather than memoryless AWGN channels. Fig. 1.2 shows what errors look like over PR channels compared to memoryless AWGN channels. Over memoryless AWGN channels, each erroneous bit is independent of others and single-bit errors would be very sparsely located (at high SNRs) as shown in Fig. 1.2(a). In this case, RS codes exhibit no advantage due to their symbol correction and binary codes would be more efficient. In contrast, PR channels with the Viterbi algorithm generate burst errors, e.g., as shown in Fig. 1.2(b).

26 6 CHAPTER 1. INTRODUCTION Such correlated errors are better handled by symbol-based RS codes, making them better-suited for magnetic recording systems. To maintain symbol-based correction capability of RS codes, we first propose a soft-decision decoding algorithm for RS codes using error-and-erasure correction, named successive error-and-erasure decoding algorithm (SED). The proposed SED repeats conventional error-and-erasure correction using symbol reliability. In order to increase efficiency of repetition, we propose another soft-decision decoding algorithm using reliabilities of patterns rather than reliabilities of bits or symbols, named pattern-flipping Chase-type algorithms (pchase). The proposed pchase algorithms repeat conventional error-only correction using probable error patterns and corresponding reliabilities. This scheme dramatically reduces the number of iteration of error-only correction by the Chase algorithms to achieve the same performance gain. In order to provide the probable error patterns and reliabilities for the pchase algorithms, a modified Viterbi algorithm is also proposed, named patternoutput Viterbi algorithm (POVA). This thesis will be focused on the pattern-flipping Chase-type algorithms with the POVA. As an extension of the POVA application, we propose a new method to construct a reliability matrix which is the input for the KV algorithm. In addition, we propose a multiplicity matrix construction method using the POVA without a reliability matrix for the KV algorithm. 1.2 Thesis Organization and contributions The remaining parts of this thesis is organized as follows. Definitions of RS codes and decoding algorithms

27 1.2. THESIS ORGANIZATION AND CONTRIBUTIONS 7 In Chapter 2, several definitions of RS codes are introduced and their relations are clarified. RS codes are defined in several different ways which are not exactly equivalent. Distinct algorithms for encoding and decoding of RS codes have been developed based on the different definitions. This thesis clarifies the relations among the several definitions of RS codes, especially focusing on the connection between non-binary Bose-Chaudhuri-Hocquenghem (BCH) codes [17][18], which are not necessarily narrow-sense, and generalized Reed- Solomon (GRS) codes [19]. Error event analysis over the PR channel In Chapter 3, error events by the Viterbi algorithms over PR channels are analyzed. It will be shown how error events happen and what error patterns look like over PR channels. It will also be reviewed how to approximate error event probability, bit error rate and codeword error rate with RS codes over PR channels. Successive error-and-erasure decoding (SED) In Chapter 4, we propose a soft-decision decoding algorithm of RS codes using successive error-and-erasure decoding. Extensive simulation is conducted to show the possible performance gain of the proposed method. We derive an expression for performance estimation based on ordered statistics of symbol reliability, which matches well with the simulation results. Pattern-output Viterbi algorithm (POVA) In Chapter 5, we propose a modified Viterbi algorithm that provides probable error patterns with corresponding reliabilities. The POVA will be used with following proposed algorithms.

28 8 CHAPTER 1. INTRODUCTION Pattern-flipping Chase-type algorithms (pchase) In Chapter 6, we propose a new soft-decision decoding algorithm of RS codes (based on the Chase algorithm), which flips unreliable patterns instead of unreliable symbols or bits. Possible performance gain will be shown by simulation and analytical performance approximation. As well as expected performance gain, other benefits such as low average complexity, high throughput and simple stopping condition will be discussed. Reliability matrix construction with the POVA and modified bit-level generalized minimum distance (BGMD) algorithm In Chapter 7, a new method to construct the reliability matrix for the KV algorithm over PR channels is proposed by using the POVA instead of the symbol-based Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm. In addition, we modify the BGMD algorithm [36] by taking advantage of the POVA to achieve performance gains over PR channels that are as high as over memoryless AWGN channels. Conclusions In Chapter 8, we summarize the thesis.

29 Chapter 2 Reed-Solomon Codes Initially, RS codes were described by Reed and Solomon using polynomial evaluations [15]. Later, it was shown that the original RS codes are the special cases of nonbinary BCH codes. Thanks to the resulting efficient decoding algorithms and the advantage of systematic encoding, nonbinary BCH approach using a generator polynomial is generally used to represent RS codes in most textbooks and real applications. Recently, list decoding algorithms using polynomial fitting provided a chance to extend the error correction capability beyond the conventional limit of half the minimum distance [7]. Koetter-Vardy (KV) soft-decision RS decoders based on the list decoding show potential for considerable performance gain [8]. These algorithms are based on the original definition of RS codes by polynomial evaluations. However, non narrow-sense RS codes which are special cases of RS codes and are used in many applications can not be represented by the original definition using polynomial evaluation. The optical storage systems such as CD, DVD, Blue-Ray, and HD-DVD employ non narrow-sense RS codes. In those cases, it is not clear how to apply the KV algorithm. In Section 2.1, several definitions for RS codes are presented 9

30 10 CHAPTER 2. REED-SOLOMON CODES and in Section 2.2, we discuss the relationships among these definitions. These multiple definitions will prove useful as we develop soft-decision decoding strategies for RS codes. In Section 2.3, we discuss the benefits of conventional hard-decision decoding algorithms. In Section 2.4, several soft-decision decoding algorithms are reviewed in brief. 2.1 Definitions of RS codes An (n,k,d) RS code with m bits per symbol can be defined in several different ways over GF(q) with a primitive polynomial whose root is α and where q = 2 m in binary systems. Here, n is the length (i.e., the number of symbols) of a codeword, k is the length of a message and d is the minimum distance (i.e., the smallest Hamming distance between any pair of distinct codewords). All the different definitions for RS codes below have a length of n = q 1 basically, which is called primitive, and have the minimum distance d = n k + 1, which is called maximum distance separable (MDS). A message can be represented as a row vector m = [m 0,m 1,,m k 1 ] or a polynomial m(x) = m 0 + m 1 x + + m k 1 x k 1. Similarly, a codeword is represented as a row vector c = [c 0,c 1,,c n 1 ] or a polynomial c(x) = c 0 +c 1 x+ +c n 1 x n 1. Nonbinary BCH codes - Definition A RS codes are q-ary BCH codes of length (q 1) which have generator polynomials of the form g(x) = (x α b )(x α b+1 ) (x α b+d 2 ), where b is any integer from zero to (n 1) [19][20]. Because all codeword polynomials c(x)s have g(x) as a factor, every c(x) has all the roots of g(x) as its roots and has the parity

31 2.1. DEFINITIONS OF RS CODES 11 check matrix H in (2.1), i.e., ch T = 0. H = 1 α b (α b ) 2 (α b ) n 1 1 α b+1 (α b+1 ) 2 (α b+1 ) n 1 1 α b+2 (α b+2 ) 2 (α b+2 ) n α b+d 2 (α b+d 2 ) 2 (α b+d 2 ) n 1 (2.1) For systematic encoding, a codeword polynomial c(x) is obtained by concatenating a message polynomial m(x) and a parity polynomial p(x) such that c(x) = g(x)q(x) = x d 1 m(x) p(x), where Q(x) is the polynomial multiplying the generator polynomial g(x) to yield the codeword polynomial c(x). Also, p(x) is the remainder of dividing x d 1 m(x) by g(x), thus of degree (d 2) or smaller. Nonbinary narrow-sense BCH codes - Definition B RS codes are q-ary BCH codes of length (q 1) which have generator polynomials g(x) = (x α)(x α 2 ) (x α d 1 ) [21]., i.e., same as Definition A except that b = 1. The parity check matrix is represented as follows. H = 1 α α 2 α n 1 1 α 2 α 4 α 2(n 1) 1 α 3 α 6 α 3(n 1) α d 1 α 2(d 1) α (d 1)(n 1) (2.2) Evaluation map encoding - Definition C

32 12 CHAPTER 2. REED-SOLOMON CODES A codeword c is generated by polynomial evaluations at the points in the given evaluation set x, where x = [x 0,,x n 1 ] and x i s are all distinct non-zero elements in GF(q) [8]. Given a message polynomial m(x) = m 0 + m 1 x + + m k 1 x k 1, we obtain c i = m(x i ) for i = 0, 1,,n 1 or c = [m(x 0 ),,m(x n 1 )]. The generator matrix is represented as follows such that mg = c. G = x 0 x 1 x 2 x n 1 x 2 0 x 2 1 x 2 2 x 2 n x k 1 0 x k 1 1 x k 1 2 x k 1 n 1 (2.3) Evaluation map encoding with a specific evaluation set - Definition D A codeword c is generated by polynomial evaluations at the points in the evaluation set x, where x = [1,α,,α n 1 ] [7]. Given a message polynomial m(x) = m 0 +m 1 x+ +m k 1 x k 1, we obtain c i = m(α i ) for i = 0, 1,,n 1 or c = [m(1),m(α),,m(α n 1 )]. The generator matrix is represented as follows. G = α α 2 α n 1 1 α 2 α 4 α 2(n 1) α k 1 α 2(k 1) α (n 1)(k 1) (2.4) Generalized Reed-Solomon (GRS) codes - Definition E A codeword c is generated by polynomial evaluations at the points in the

33 2.2. RELATIONSHIPS AMONG DIFFERENT DEFINITIONS 13 evaluation set x and weighting on each symbol according to v, where x = [x 0,,x n 1 ] and x i s are all distinct non-zero elements in GF(q) and v = [v 0,,v n 1 ] and v i s are non-zero, but not necessarily distinct, elements in GF(q) [19]. Given a message polynomial m(x) = m 0 + m 1 x + + m k 1 x k 1, we obtain c i = v i m(x i ) for i = 0, 1,,n 1 or c = [v 0 m(x 0 ),,v n 1 m(x n 1 )]. The generator matrix is represented as follows. G = v 0 v 1 v 2 v n 1 v 0 x 0 v 1 x 1 v 2 x 2 v n 1 x n 1 v 0 x 2 0 v 1 x 2 1 v 2 x 2 2 v n 1 x 2 n v 0 x k 1 0 v 1 x k 1 1 v 2 x k 1 2 v n 1 x k 1 n 1 (2.5) 2.2 Relationships among different definitions Five different definitions for RS codes were presented, which are often confused with one another. Though all of the definitions are called RS codes, they are not equivalent. The term equivalent does not require that the same message word leads to the same codeword according to the two definitions, but that the two definitions build the same vector space (i.e., the collection of all codewords). In other words, equivalent RS codes have the same parity check matrix. At a glance, the definitions can be classified into two categories: those based on BCH codes, Definitions A and B, and the others based on polynomial evaluations, Definitions C, D, and E. Definitions A and B are the most popular definitions for RS codes. A special case of Definition A in which b = 1 leads to Definition B, which is called narrow-sense. Definition D is a subset of Definition C corresponding to the

34 14 CHAPTER 2. REED-SOLOMON CODES Definition E Generalized RS codes n, k f x f 0 f 1 x f k-1 x k-1 x i i n x i x j x k j k v i i n v i c i v i f x i Definition A Non-binary BCH codes - popular definition g x c x b x x b+1 x m x g x m x x d-1 p x v i x i i i(1-b) b+d 2 v i b Definition C Evaluation map encoding f x f 0 f 1 x f k-1 x k-1 x i i n x i x j x k j k f x i c i Definition D f x f 0 f 1 x f k-1 x k-1 i f c i Definition B Narrow sense RS codes d 1 g x x x c x m x g x m x x d-1 p x x i i Figure 2.1: Several definitions of RS codes and their relations. case where the evaluation set x has a specific order of ascending powers of α and Definition C is a subset of Definition E corresponding to the case where all v i s are equal to one. As a connection between the two categories, it has been already proven that Definitions B and D are equivalent although they look very different [19][22]. Consequently, Definition B is also a subset of Definitions C and E. Finally, the relationship between Definition A and E remains unclear. Following theorems clarify the connection between them [23]. Theorem 1. The (n,k,d) RS codes with generator polynomials g(x) = (x α b )(x α b+1 ) (x α b+d 2 ) where 0 b < n are special cases of generalized Reed-Solomon (GRS) codes GRS n,k (x,v), where x i = α i and v i = α i(1 b) for i = 0, 1,,n 1. A codeword c can be represented as c i = α i(1 b) f(α i ) for any polynomial f(x) with degree of (k 1) or less. Theorem 2. Let c(x) be a codeword polynomial in the (n,k,d) RS code with a generator polynomial g(x) = (x α b )(x α b+1 ) (x α b+d 2 ). Then we can find

35 2.2. RELATIONSHIPS AMONG DIFFERENT DEFINITIONS 15 a unique f(x) with degree (k 1) or less which corresponds to the c(x) such that c i = α i(1 b) f(α i ) for i = 0, 1,,n 1 as follows: f i = c(α i+b 1 )/n. Proof. Let c(x) be a codeword polynomial in the (n,k,d) RS code with a generator polynomial g(x) = (x α b )(x α b+1 ) (x α b+d 2 ) and c(x) be the inverse Galois field Fourier transform (GFFT) [20] of c(x). Because c(x) takes g(x) as a factor, c(α b ) = c(α b+1 ) = = c(α b+d 2 ) = 0. By the property of GFFT, c mod ( b,n) = c mod( b 1,n) = = c mod( b d+2,n) = 0. For b = 0, 1 or k + 1 b < n, the coefficients of c(x) are zeros except successive k coefficients. Also, remind that x n = 1 for any x GF(q). c(x) = mod( b+k,n) i=mod( b+1,n) mod( b+k,n) c i x i = x mod( b+1,n) i=mod( b+1,n) k 1 k 1 = x b+1 c mod(j b+1,n) x j = x b+1 f j x j j=0 j=0 c i x i mod( b+1,n) = x b+1 f(x), where f i = c mod(i b+1,n). (2.6) For 2 b k, successive (d 1) coefficients of c(x) are all zeros. That is c n b = c n b 1 = = c k b+1 = 0. k b c(x) = c i x i + = i=0 n 1 i=n b+1 n 1 i=n b+1 k b c i x i + i=0 c i x i = ( b 2 = x n b+1 c j+n b+1 x j + j=0 n 1 i=n b+1 k b c i x i + c i x i i=0 ( n 1 c i x i+n = x n b+1 k 1 j=b 1 i=n b+1 k b ) c i x i n+b 1 + c i x i+b 1 i=0 ) k 1 c j b+1 x j = x n b+1 f j x j = x n b+1 f(x), where f i = c mod(i+n b+1,n). (2.7) j=0

36 16 CHAPTER 2. REED-SOLOMON CODES For both cases, we can write as follows. n 1 k 1 c(x) = c i x i = x 1 b f j x j = x 1 b f(x), (2.8) i=0 j=0 where f i = c mod(i b+1,n). By the definition of GFFT, c i = c(α i ) = α i(1 b) f(α i ). Then, we can say that x i = α i and v i = α i(1 b) for the definition of GRS codes. In this case, f(x) is not a message polynomial, but is uniquely specified for each c(x) such that k 1 f(x) = f i x i, where f i = c mod(i+n b+1,n). (2.9) i=0 It was shown that q-ary BCH codes based on Definition A are special cases of GRS codes. Now we have all the relationships among the definitions and Fig. 2.1 summarizes those. All the definitions can be generalized as GRS codes with explicitly specified x and v. Using these relationships, the interpolation based algorithm based on Definition C, D, or E can be applied to the RS codes systematically encoded by Definition A or B [23]. 2.3 Hard-decision decoding of RS codes The conventional hard-decision decoding algorithms for RS codes such as the Berlekamp- Massey algorithm and the Euclidean algorithm are able to correct up to any t symbol errors, where t = (d min 1)/2. If N era symbols are erased (i.e., there are N era symbol locations where we know there may be errors), the error-and-erasure decoder with almost the same algorithm

37 2.3. HARD-DECISION DECODING OF RS CODES 17 Syndrome computation Erasure manipulation Key equation solving Error value and location finding Syndrome computation Erasure manipulation Key equation solving Error value and location finding Syndrome computation Erasure manipulation Key equation solving Error value and location finding Figure 2.2: Pipelined structure of conventional hard-decision error-and-erasure decoding for RS codes. can correct N err errors in unerased locations in addition to N era erasures under the condition that 2N err + N era < d min. (2.10) Those algorithms have well-established hardware structures which provide high throughput using pipelining with moderate hardware resources [24]. Fig. 2.2 shows a popular 4-stage pipelined structure of conventional hard-decision error-and-erasure decoding. For error-only correction, the second stage of erasure manipulation is not needed. In general implementation, each stage consumes roughly n clocks for the (n, k, d) RS code over GF(2 m ). Latency of one codeword decoding is 3n clocks and 4n clocks for error-only correction and error-and-erasure correction, respectively. However, by means of pipelining, both the error-only correction decoder and the error-and-erasure correction decoder provide a throughput of f clock symbols per second, or m f clock bits per second (bps), where f clock is the clock frequency of decoding circuits. The maximum clock frequency decreases with increasing m. Hardware size mainly depends on (n k) and m.

38 18 CHAPTER 2. REED-SOLOMON CODES 2.4 Soft-decision decoding algorithms of RS codes Successive algebraic decoding algorithms Successive algebraic decoding algorithms repeat the conventional hard-decision decoding algorithm such as the Berlekamp-Massey algorithm or the Euclidean algorithm modifying the received sequence according to soft information. The main steps of such algorithms are as follows. 1. Build a set of error sequences E = {e i } using predefined rules. 2. Repeat the conventional hard-decision decoding for the modified received sequence r = r + e i with every e i in E, where r is a hard-decision received sequence. The error-and-erasure correction is used if the modified received sequence includes erasures, and the error-only correction is used otherwise. 3. Select the most probable codeword among at most E candidate codewords using soft information. Because conventional hard-decision decoding algorithms may result in decoding failure with high probability when (2.10) is not satisfied, the number of candidate codewords is generally much smaller than E. Depending on how the set of error sequences E is determined, following algorithms have been proposed. Generalized minimum distance decoding (GMD) The GMD decoder repeats the error-and-erasure correction while erasing the least reliable symbols (LRSs) successively [3]. The LRSs are identified from the soft information being input to the decoder. At the ith stage, 2i LRSs are erased for i = 0, 1,, t. So the number of iterations is t + 1, which results in at most t + 1 candidate codewords.

39 2.4. SOFT-DECISION DECODING ALGORITHMS OF RS CODES 19 For example, consider the (7, 3, 5) RS code over GF(2 3 ). Assume that the allzero codeword is transmitted, and let the received sequence r be (1,3,0,0,0,4,0) in integer representation with ascending order of reliabilities, i.e., the first symbol is the least reliable symbol. The received sequence has three symbol errors, so the conventional error-only correction decoder cannot correct those since t for this code is 2. The set of error sequences for the GMD decoder is E ={(0,0,0,0,0,0,0), (x,x,0,0,0,0,0), (x,x,x,x,0,0,0)} with 3 error sequences, where x denotes a symbol erasure. With the second error sequence, the corresponding modified received sequence r satisfies (2.10), the conventional errorand-erasure correction decoder can reconstruct the original codeword. Chase2 algorithm The Chase2 algorithm repeats the error-only correction while flipping t LRSs of the received sequence r exhaustively. Flipping t symbols means taking all possible combinations of t symbols, which leads to q t cases [4]. The Chase2 algorithm can be modified to have a parameter p which specifies the maximum number of modified LRSs instead of t. The Chase2 algorithm was proposed originally for binary codes whose q is 2. For nonbinary codes like RS codes, the number of iterations by the Chase2 algorithm is impractically large. For the same example, the set of error sequences for the Chase2 decoder is E={(0,0,0,0,0,0,0), (1,0,0,0,0,0,0),..., (7,0,0,0,0,0,0), (0,1,0,0,0,0,0), (1,1,0,0,0,0,0),..., (7,1,0,0,0,0,0),..., (0,7,0,0,0,0,0), (1,7,0,0,0,0,0),..., (7,7,0,0,0,0,0)} with 64 error sequences. The modified received sequences for the received sequence (1,3,0,0,0,4,0) are correctable with three error sequences; (1,0,0,0,0,0,0), (0,3,0,0,0,0,0), and (1,3,0,0,0,0,0). Even though the code is a nonbinary code, the bit-flipping Chase2 decoder

40 20 CHAPTER 2. REED-SOLOMON CODES flips p least reliable bits (LRBs) instead of p LRSs, which generates 2 p cases. Though the complexity increases exponentially with p in both symbol-based and bit-based Chase2 algorithms, the bit-flipping Chase2 decoder has relatively affordable complexity which is 1/2 p(m 1) times that of the symbol-flipping Chase2 decoder for the same p. The performance difference between the bit-flipping Chase2 decoder and the symbol-flipping Chase2 decoder will be discussed at the beginning of Ch. 6. Chase2-GMD algorithm (CGA) The GMD decoder is simple, but provides only moderate error-correction performance gain. On the other hand, the Chase2 decoder exhibits better performance but with much higher complexity. As a compromise between the GMD and the Chase2, the CGA was introduced to provide a performance-complexity tradeoff [5]. A CGA(η) decoder induces q η base error sequences flipping η LRSs and executes GMD-like decoding for each base error sequence, where η is 0 to t. Erasure patterns include 0 to (2t 2η) erasures in increments of 2, erasing (η + 1)th to (2t 2η)th LRSs. The number of total error sequences for the CGA(η) is q η (t + 1 η). CGA(0) is the GMD algorithm and CGA(t) is the Chase2 algorithm. With increasing η, performance becomes better, but complexity increases exponentially. For the same example, consider the CGA(1) decoder. The base error sequences are (0,0,0,0,0,0,0), (1,0,0,0,0,0,0),..., and (7,0,0,0,0,0,0). After including GMDlike erasures, the set of error sequences is E ={(0,0,0,0,0,0,0),(0,x,x,0,0,0,0), (1,0,0,0,0,0,0), (1,x,x,0,0,0,0),..., and (7,0,0,0,0,0,0), (7,x,x,0,0,0,0)} with 16 error sequences. With the error sequences (1,0,0,0,0,0,0) and (1,x,x,0,0,0,0), the resulting modified received sequences satisfy (2.10).

41 2.4. SOFT-DECISION DECODING ALGORITHMS OF RS CODES Algebraic soft-decision decoding (ASD) algorithm - Koetter- Vardy (KV) algorithm The algebraic soft-decision algorithm, so called the KV algorithm, uses the definitions of RS codes based on polynomial evaluations, Definitions C and D in Section 2.1 [8]. Before the KV algorithm, the Guruswami-Sudan (GS) algorithm was proposed as a hard-decision list decoding algorithm, on which the KV algorithm is based [7]. The GS algorithm consists of two main steps, interpolation and factorization. Interpolation: For an (n,k,d) RS code, given a set of n interpolation points {(x 0,r 0 ), (x 1,r 1 ),, (x n 1,r n 1 )}, where x i s are code evaluation points and r i s are received symbols, we generate the nontrivial bivariate polynomial Q(x, y) that passes through each of the interpolation points with a multiplicity m. If the RS code is generated by Definition D, x i is α i. Given Q(x,y) = i=0 j=0 a i,jx i y j and (X,Y ), Q(x,y) is said to pass through a point (X,Y ) with the multiplicity m if and only if Q [k,l] (X,Y ) = i=k j=l Xi k Y j l a i,j = 0 for all k,l 0 such that k + l < m. Factorization: Given the bivariate polynomial Q(x,y), identify all the factors of Q(x,y) of the form (y f(x)) where the degree of f(x) is smaller than k. Each of the polynomials f(x) is a candidate for a valid evaluation polynomial. The asymptotic correction bound of the GS algorithm with infinite multiplicity is known to be n nk, which means that this algorithm does not provide any gain for high rate codes. While the interpolation points used in the GS algorithm are hard-decided n symbols of (x i,r i ) pairs and have the same multiplicities, the KV algorithm assigns different multiplicities to each interpolation point according to the soft information and the number of interpolation points may not be n [8]. A simple example shows the procedure of the KV algorithm. Consider the (7,5,3) RS code over GF(2 3 ). The input to the KV decoder is a reliability matrix Π. A (q n)

42 22 CHAPTER 2. REED-SOLOMON CODES reliability matrix Π = [π j,i ] is defined as π j,i = Pr(c i = a j y i ) where a j = 0 if j = 0, a j = α j 1 for j = 1, 2,,q 1 and i = 0, 1,,n 1. Accordingly, the sum of each column is one. As one example, assume that the following reliability matrix is given by using soft information. Π = For example, at the 4th row and the 3th column means that the probability of the third symbol in the transmitted codeword being α 2 is according to soft information. If we follow the largest value at each column, the received sequence is r = [α 6, 1,α,α 6,α 3,α 3, 1]. The reliability matrix Π is converted to the multiplicity matrix M by predefined rules. In this example, the multiplicity matrix is generated with a parameter λ of 2.99 by the method in [45]. Each multiplicity m j,i is computed as λπ j,i, which results in maximum multiplicity of 2.

43 2.4. SOFT-DECISION DECODING ALGORITHMS OF RS CODES 23 M = In a similar way as the reliability matrix, each row of the multiplicity matrix indicates a symbol value and each column indicates an evaluation point. From the multiplicity matrix M, interpolation points are (1,α 6 ), (α, 1), (α 2,α), (α 3,α 6 ), (α 4,α 3 ), (α 5,α 3 ), and (α 6, 1) with multiplicities of 2, 2, 2, 1, 1, 2, and 2, respectively. The interpolation step builds the following bivariate polynomial which passes all interpolation points with corresponding multiplicities: Q(x,y) = α 5 + α 3 x + α 3 x 2 + x 3 +α 6 x 4 +αx 5 +α 6 x 6 +α 2 x 7 +α 3 x 8 +x 9 +y+α 6 xy+α 4 x 2 y+α 4 x 3 y+x 5 y+α 6 y 2 +α 4 xy 2. The factorization step reveals factors of Q(x,y) with y f(x) form: f 1 (x) = α 2 + α 3 x+α 6 x 2 +x 3 +α 4 x 4 and f 2 (x) = α 4 +α 5 x+α 3 x 2 +αx 3 +α 6 x 4. By Definition D, where c i = f(α i ), we obtain ĉ 1 = (α 6, 1,α,α 4,α 4,α 3, 1) and ĉ 2 = (α 5, 1,α 4,α 6,α 3,α 3, 1). Assuming each received symbol is independent, the probability of each decoded codeword ĉ can be computed as product of corresponding symbol probabilities in the reliability matrix as follows. n 1 Pr(c = ĉ y) = Pr(c i = ĉ i y i ). (2.11) i=1

44 24 CHAPTER 2. REED-SOLOMON CODES Finally, ĉ 1 is chosen as the more probable codeword. Even though the KV algorithm generated significant interest because of its totally new algebraic decoding method, its computational complexity is high with large memory requirement in the interpolation step and its performance gain is limited for high-rate codes even with infinite multiplicity Adaptive belief propagation algorithm (ABP) RS codes have very dense parity check matrices, which makes RS codes not attractive for the belief propagation algorithm [25] used for LDPC codes. For example, the parity check matrix of the (7,5,3) narrow-sense RS code over GF(2 3 ) is given by H = 1 α α2 α 3 α 4 α 5 α 6 1 α 2 α 4 α 6 α α 3 α 5. (2.12) The parity check matrix H can be represented by its binary image as follows. H b = (2.13) As we can see, the parity check matrix is not sparse at all. In particular, the denseness of the part of the parity check matrix corresponding to the least reliable bits (LRBs) may result in the iterative decoding algorithm getting stuck at a not-valid codeword during iteration. Even though it is not possible to make the whole parity check

45 2.4. SOFT-DECISION DECODING ALGORITHMS OF RS CODES 25 matrix of RS codes sparse, the ABP tries to make the part of the parity check matrix corresponding to the LRBs sparse. The ABP converts the sub-matrix of the parity check matrix corresponding to m(n k) LRBs into an identity matrix using Gaussian elimination [9]. Assuming that the first 6 bits are LRBs, (2.13) is adapted (using elementary row operations) into H b = (2.14) The belief propagation algorithm is applied with the adapted parity check matrix H b and the hard-decision RS decoder follows to get a valid codeword. The iteration is repeated until a valid codeword is found or the maximum number of iterations is reached. While the LDPC decoder relies on only the belief propagation algorithm to get a valid codeword, the ABP algorithm uses the conventional hard-decision decoder for RS codes instead of just hard-decision. This scheme provides an effect similar to the concatenation of LDPC codes with RS codes, without code rate loss. Even though the adapted parity check matrix is still not very good for the belief propagation algorithm, the hard-decision decoding at each iteration compensates for that to a certain extent. However, the ABP algorithm has additional complexity for the Gaussian elimination and the hard-decision RS decoding in addition to that for the belief propagation

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Algebraic Soft-Decision Decoding of Reed-Solomon Codes Using Bit-level Soft Information

Algebraic Soft-Decision Decoding of Reed-Solomon Codes Using Bit-level Soft Information 1 Algebraic Soft-Decision Decoding of Reed-Solomon Codes Using Bit-level Soft Information arxiv:cs/0611090v [cs.it] 4 Aug 008 Jing Jiang and Krishna R. Narayanan Department of Electrical and Computer Engineering,

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Coding Techniques for Data Storage Systems

Coding Techniques for Data Storage Systems Coding Techniques for Data Storage Systems Thomas Mittelholzer IBM Zurich Research Laboratory /8 Göttingen Agenda. Channel Coding and Practical Coding Constraints. Linear Codes 3. Weight Enumerators and

More information

Making Error Correcting Codes Work for Flash Memory

Making Error Correcting Codes Work for Flash Memory Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

Structured Low-Density Parity-Check Codes: Algebraic Constructions

Structured Low-Density Parity-Check Codes: Algebraic Constructions Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu

More information

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems Prof. Shu Lin Dr. Cathy Liu Dr. Michael Steinberger U.C.Davis Avago SiSoft A Brief Tour of FEC for Serial Link Systems Outline Introduction Finite Fields and Vector Spaces Linear Block Codes Cyclic Codes

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

Algebraic Soft-Decision Decoding of Reed Solomon Codes

Algebraic Soft-Decision Decoding of Reed Solomon Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 11, NOVEMBER 2003 2809 Algebraic Soft-Decision Decoding of Reed Solomon Codes Ralf Koetter, Member, IEEE, Alexer Vardy, Fellow, IEEE Abstract A polynomial-time

More information

Utilizing Correct Prior Probability Calculation to Improve Performance of Low-Density Parity- Check Codes in the Presence of Burst Noise

Utilizing Correct Prior Probability Calculation to Improve Performance of Low-Density Parity- Check Codes in the Presence of Burst Noise Utah State University DigitalCommons@USU All Graduate Theses and Dissertations Graduate Studies 5-2012 Utilizing Correct Prior Probability Calculation to Improve Performance of Low-Density Parity- Check

More information

Error Correction Review

Error Correction Review Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols

More information

Advanced Hardware Architecture for Soft Decoding Reed-Solomon Codes

Advanced Hardware Architecture for Soft Decoding Reed-Solomon Codes Advanced Hardware Architecture for Soft Decoding Reed-Solomon Codes Stefan Scholl, Norbert Wehn Microelectronic Systems Design Research Group TU Kaiserslautern, Germany Overview Soft decoding decoding

More information

Progressive algebraic Chase decoding algorithms for Reed Solomon codes

Progressive algebraic Chase decoding algorithms for Reed Solomon codes IET Communications Research Article Progressive algebraic Chase decoding algorithms for Reed Solomon codes ISSN 1751-8628 Received on 7th September 2015 Revised on 13th December 2015 Accepted on 27th February

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan ICC 2011 IEEE International Conference on Communications

More information

R. A. Carrasco and M. Johnston, Non-Binary Error Control Coding Cork 2009

R. A. Carrasco and M. Johnston, Non-Binary Error Control Coding Cork 2009 Design of Non-Binary Error-Correction Codes and their Applications R. A. Carrasco and. Johnston, Non-Binary Error Control Coding for Wireless Communication and Data Storage, Wiley, SBN 978-- 7-89-9 Prof.

More information

Error Correction Methods

Error Correction Methods Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.

More information

VHDL Implementation of Reed Solomon Improved Encoding Algorithm

VHDL Implementation of Reed Solomon Improved Encoding Algorithm VHDL Implementation of Reed Solomon Improved Encoding Algorithm P.Ravi Tej 1, Smt.K.Jhansi Rani 2 1 Project Associate, Department of ECE, UCEK, JNTUK, Kakinada A.P. 2 Assistant Professor, Department of

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Optical Storage Technology. Error Correction

Optical Storage Technology. Error Correction Optical Storage Technology Error Correction Introduction With analog audio, there is no opportunity for error correction. With digital audio, the nature of binary data lends itself to recovery in the event

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

Error Correcting Codes Questions Pool

Error Correcting Codes Questions Pool Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to

More information

Physical Layer and Coding

Physical Layer and Coding Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

An Introduction to Algorithmic Coding Theory

An Introduction to Algorithmic Coding Theory An Introduction to Algorithmic Coding Theory M. Amin Shokrollahi Bell Laboratories Part : Codes - A puzzle What do the following problems have in common? 2 Problem : Information Transmission MESSAGE G

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight

More information

Information Theoretic Imaging

Information Theoretic Imaging Information Theoretic Imaging WU Faculty: J. A. O Sullivan WU Doctoral Student: Naveen Singla Boeing Engineer: James Meany First Year Focus: Imaging for Data Storage Image Reconstruction Data Retrieval

More information

THIS paper is aimed at designing efficient decoding algorithms

THIS paper is aimed at designing efficient decoding algorithms IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used

More information

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,

More information

Cyclic codes. Vahid Meghdadi Reference: Error Correction Coding by Todd K. Moon. February 2008

Cyclic codes. Vahid Meghdadi Reference: Error Correction Coding by Todd K. Moon. February 2008 Cyclic codes Vahid Meghdadi Reference: Error Correction Coding by Todd K. Moon February 2008 1 Definitions Definition 1. A ring < R, +,. > is a set R with two binary operation + (addition) and. (multiplication)

More information

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Agenda NAND ECC History Soft Information What is soft information How do we obtain

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

Roll No. :... Invigilator's Signature :.. CS/B.TECH(ECE)/SEM-7/EC-703/ CODING & INFORMATION THEORY. Time Allotted : 3 Hours Full Marks : 70

Roll No. :... Invigilator's Signature :.. CS/B.TECH(ECE)/SEM-7/EC-703/ CODING & INFORMATION THEORY. Time Allotted : 3 Hours Full Marks : 70 Name : Roll No. :.... Invigilator's Signature :.. CS/B.TECH(ECE)/SEM-7/EC-703/2011-12 2011 CODING & INFORMATION THEORY Time Allotted : 3 Hours Full Marks : 70 The figures in the margin indicate full marks

More information

Decoding Reed-Muller codes over product sets

Decoding Reed-Muller codes over product sets Rutgers University May 30, 2016 Overview Error-correcting codes 1 Error-correcting codes Motivation 2 Reed-Solomon codes Reed-Muller codes 3 Error-correcting codes Motivation Goal: Send a message Don t

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Belief propagation decoding of quantum channels by passing quantum messages

Belief propagation decoding of quantum channels by passing quantum messages Belief propagation decoding of quantum channels by passing quantum messages arxiv:67.4833 QIP 27 Joseph M. Renes lempelziv@flickr To do research in quantum information theory, pick a favorite text on classical

More information

ECEN 655: Advanced Channel Coding

ECEN 655: Advanced Channel Coding ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History

More information

Performance Study of Non-Binary Belief Propagation for Decoding Reed-Solomon Codes

Performance Study of Non-Binary Belief Propagation for Decoding Reed-Solomon Codes Performance Study of Non-Binary Belief Propagation for Decoding Reed-Solomon Codes Bimberg, Marcel; Lentmaier, Michael; Fettweis, Gerhard Published in: [Host publication title missing] Published: 2010-01-01

More information

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The

More information

Information redundancy

Information redundancy Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

Chapter 7: Channel coding:convolutional codes

Chapter 7: Channel coding:convolutional codes Chapter 7: : Convolutional codes University of Limoges meghdadi@ensil.unilim.fr Reference : Digital communications by John Proakis; Wireless communication by Andreas Goldsmith Encoder representation Communication

More information

Design and Implementation of Reed-Solomon Decoder using Decomposed Inversion less Berlekamp-Massey Algorithm by

Design and Implementation of Reed-Solomon Decoder using Decomposed Inversion less Berlekamp-Massey Algorithm by Design and Implementation of Reed-Solomon Decoder using Decomposed Inversion less Berlekamp-Massey Algorithm by Hazem Abd Elall Ahmed Elsaid A Thesis Submitted to the Faculty of Engineering at Cairo University

More information

Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system

Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Steve Baker December 6, 2011 Abstract. The evaluation of various error detection and correction algorithms and

More information

Amitkumar Mahadevan, Doctor of Philosophy, 2005

Amitkumar Mahadevan, Doctor of Philosophy, 2005 Amitkumar Mahadevan, Doctor of Philosophy, 2005 Abstract Title of Dissertation: On RCD Codes as a Class of LDPC Codes: Properties, Decoding, and Performance Evaluation Amitkumar Mahadevan, Ph.D., 2005

More information

Quasi-cyclic Low Density Parity Check codes with high girth

Quasi-cyclic Low Density Parity Check codes with high girth Quasi-cyclic Low Density Parity Check codes with high girth, a work with Marta Rossi, Richard Bresnan, Massimilliano Sala Summer Doctoral School 2009 Groebner bases, Geometric codes and Order Domains Dept

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

Progressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes

Progressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes Progressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes Li Chen ( 陈立 ), PhD, MIEEE Associate Professor, School of Information Science and Technology Sun Yat-sen University, China Joint work

More information

Section 3 Error Correcting Codes (ECC): Fundamentals

Section 3 Error Correcting Codes (ECC): Fundamentals Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

Error Correction and Trellis Coding

Error Correction and Trellis Coding Advanced Signal Processing Winter Term 2001/2002 Digital Subscriber Lines (xdsl): Broadband Communication over Twisted Wire Pairs Error Correction and Trellis Coding Thomas Brandtner brandt@sbox.tugraz.at

More information

ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES

ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES Journal of ELECTRICAL ENGINEERING, VOL. 54, NO. -2, 2003, 305 30 ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES Sergey Egorov Garik Markarian A modification of Blahut procedure

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

A Simplified Min-Sum Decoding Algorithm. for Non-Binary LDPC Codes

A Simplified Min-Sum Decoding Algorithm. for Non-Binary LDPC Codes IEEE TRANSACTIONS ON COMMUNICATIONS 1 A Simplified Min-Sum Decoding Algorithm for Non-Binary LDPC Codes Chung-Li (Jason) Wang, Xiaoheng Chen, Zongwang Li, and Shaohua Yang arxiv:1207.5555v1 [cs.it] 23

More information

Coding theory: Applications

Coding theory: Applications INF 244 a) Textbook: Lin and Costello b) Lectures (Tu+Th 12.15-14) covering roughly Chapters 1,9-12, and 14-18 c) Weekly exercises: For your convenience d) Mandatory problem: Programming project (counts

More information

List Decoding of Reed Solomon Codes

List Decoding of Reed Solomon Codes List Decoding of Reed Solomon Codes p. 1/30 List Decoding of Reed Solomon Codes Madhu Sudan MIT CSAIL Background: Reliable Transmission of Information List Decoding of Reed Solomon Codes p. 2/30 List Decoding

More information

1 Vandermonde matrices

1 Vandermonde matrices ECE 771 Lecture 6 BCH and RS codes: Designer cyclic codes Objective: We will begin with a result from linear algebra regarding Vandermonde matrices This result is used to prove the BCH distance properties,

More information

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming

More information

Compressed Sensing Using Reed- Solomon and Q-Ary LDPC Codes

Compressed Sensing Using Reed- Solomon and Q-Ary LDPC Codes Compressed Sensing Using Reed- Solomon and Q-Ary LDPC Codes Item Type text; Proceedings Authors Jagiello, Kristin M. Publisher International Foundation for Telemetering Journal International Telemetering

More information

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Funded by: National Science Foundation (NSF) Seagate Technology Defense Advanced Research Projects

More information

Low-density parity-check (LDPC) codes

Low-density parity-check (LDPC) codes Low-density parity-check (LDPC) codes Performance similar to turbo codes Do not require long interleaver to achieve good performance Better block error performance Error floor occurs at lower BER Decoding

More information

Introduction to Convolutional Codes, Part 1

Introduction to Convolutional Codes, Part 1 Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes

More information

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes 359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm

More information

Constructing Polar Codes Using Iterative Bit-Channel Upgrading. Arash Ghayoori. B.Sc., Isfahan University of Technology, 2011

Constructing Polar Codes Using Iterative Bit-Channel Upgrading. Arash Ghayoori. B.Sc., Isfahan University of Technology, 2011 Constructing Polar Codes Using Iterative Bit-Channel Upgrading by Arash Ghayoori B.Sc., Isfahan University of Technology, 011 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree

More information

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2, 4-4 (29) VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code HUANG-CHI CHEN,2, YU-WEN CHANG 3 AND REY-CHUE HWANG Deaprtment of Electrical

More information

LDPC Codes. Intracom Telecom, Peania

LDPC Codes. Intracom Telecom, Peania LDPC Codes Alexios Balatsoukas-Stimming and Athanasios P. Liavas Technical University of Crete Dept. of Electronic and Computer Engineering Telecommunications Laboratory December 16, 2011 Intracom Telecom,

More information

REED-SOLOMON CODE SYMBOL AVOIDANCE

REED-SOLOMON CODE SYMBOL AVOIDANCE Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University

More information

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution CS 70 Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution 1. Polynomial intersections Find (and prove) an upper-bound on the number of times two distinct degree

More information

LDPC Codes. Slides originally from I. Land p.1

LDPC Codes. Slides originally from I. Land p.1 Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information

Reed-Solomon Error-correcting Codes

Reed-Solomon Error-correcting Codes The Deep Hole Problem Matt Keti (Advisor: Professor Daqing Wan) Department of Mathematics University of California, Irvine November 8, 2012 Humble Beginnings Preview of Topics 1 Humble Beginnings Problems

More information

A Mathematical Approach to Channel Codes with a Diagonal Matrix Structure

A Mathematical Approach to Channel Codes with a Diagonal Matrix Structure A Mathematical Approach to Channel Codes with a Diagonal Matrix Structure David G. M. Mitchell E H U N I V E R S I T Y T O H F R G E D I N B U A thesis submitted for the degree of Doctor of Philosophy.

More information

On Irreducible Polynomial Remainder Codes

On Irreducible Polynomial Remainder Codes 2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering

More information

CONSTRUCTION OF QUASI-CYCLIC CODES

CONSTRUCTION OF QUASI-CYCLIC CODES CONSTRUCTION OF QUASI-CYCLIC CODES by Thomas Aaron Gulliver B.Sc., 1982 and M.Sc., 1984 University of New Brunswick A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF

More information

Error Detection & Correction

Error Detection & Correction Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy

More information

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1 Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation

More information

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes BCH Codes Wireless Information Transmission System Lab Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation

More information

Channel Coding I. Exercises SS 2017

Channel Coding I. Exercises SS 2017 Channel Coding I Exercises SS 2017 Lecturer: Dirk Wübben Tutor: Shayan Hassanpour NW1, Room N 2420, Tel.: 0421/218-62387 E-mail: {wuebben, hassanpour}@ant.uni-bremen.de Universität Bremen, FB1 Institut

More information

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering

More information

2013/Fall-Winter Term Monday 12:50 Room# or 5F Meeting Room Instructor: Fire Tom Wada, Professor

2013/Fall-Winter Term Monday 12:50 Room# or 5F Meeting Room Instructor: Fire Tom Wada, Professor SYSTEM ARCHITECTURE ADVANCED SYSTEM ARCHITECTURE Error Correction Code 1 01/Fall-Winter Term Monday 1:50 Room# 1- or 5F Meeting Room Instructor: Fire Tom Wada, Professor 014/1/0 System Arch 1 Introduction

More information

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved. Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information

More information

Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey

Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 2014 IJEDR Volume 2, Issue 1 ISSN: 2321-9939 Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 1 Vivek Tilavat, 2 Dr.Yagnesh Shukla 1 PG Student,

More information

COMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei

COMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei COMPSCI 650 Applied Information Theory Apr 5, 2016 Lecture 18 Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei 1 Correcting Errors in Linear Codes Suppose someone is to send

More information

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores

More information

SOFT DECISION FANO DECODING OF BLOCK CODES OVER DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM

SOFT DECISION FANO DECODING OF BLOCK CODES OVER DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM Journal of ELECTRICAL ENGINEERING, VOL. 63, NO. 1, 2012, 59 64 SOFT DECISION FANO DECODING OF BLOCK CODES OVER DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM H. Prashantha Kumar Udupi Sripati K. Rajesh

More information

On the Construction and Decoding of Cyclic LDPC Codes

On the Construction and Decoding of Cyclic LDPC Codes On the Construction and Decoding of Cyclic LDPC Codes Chao Chen Joint work with Prof. Baoming Bai from Xidian University April 30, 2014 Outline 1. Introduction 2. Construction based on Idempotents and

More information

EXTENDING THE DORSCH DECODER FOR EFFICIENT SOFT DECISION DECODING OF LINEAR BLOCK CODES SEAN MICHAEL COLLISON

EXTENDING THE DORSCH DECODER FOR EFFICIENT SOFT DECISION DECODING OF LINEAR BLOCK CODES SEAN MICHAEL COLLISON EXTENDING THE DORSCH DECODER FOR EFFICIENT SOFT DECISION DECODING OF LINEAR BLOCK CODES By SEAN MICHAEL COLLISON A thesis submitted in partial fulfillment of the requirements for the degree of MASTER OF

More information

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Yingquan Wu and Christoforos N. Hadjicostis Coordinated Science Laboratory and Department of Electrical and Computer Engineering University

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold

More information

Part III. Cyclic codes

Part III. Cyclic codes Part III Cyclic codes CHAPTER 3: CYCLIC CODES, CHANNEL CODING, LIST DECODING Cyclic codes are very special linear codes. They are of large interest and importance for several reasons: They posses a rich

More information

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes.

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes. B. Cyclic Codes A cyclic code is a linear block code with the further property that a shift of a codeword results in another codeword. These are based on polynomials whose elements are coefficients from

More information

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT

More information

EE512: Error Control Coding

EE512: Error Control Coding EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to

More information

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego, La Jolla, CA 9093, U Email:{ericzhang, psiegel}@ucsd.edu

More information

Math 512 Syllabus Spring 2017, LIU Post

Math 512 Syllabus Spring 2017, LIU Post Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information