Decoding scheme using multiple hypotheses about transmitted messages

ABSTRACT

A method and apparatus for decoding encoded data bits of a wireless communication transmission are provided. A set of a-priori bit values corresponding to known bit values of the encoded data bits may be generated. Decoding paths that correspond to decoded data bits that are inconsistent with the a-priori bit values may be removed from the possible decoding paths to consider, and decoding the encoded data bits by selecting a decoding path from remaining decoding paths of the possible decoding paths that were not removed. Multiple hypotheses, each corresponding to a different set of a-prior bit values may be evaluated, with the decoded data for a hypothesis selected based on the evaluation output for further processing.

BACKGROUND

1. Field

Embodiments of the present invention generally relate to wireless communications and, more particularly, to decoding wireless transmissions.

2. Description of the Related Art

The rapid growth in wireless communications services, such as broadband Internet access and streaming media applications, leads to an increasing demand for higher data rates. Advancements in multiplexing schemes, such as Orthogonal Frequency Division Multiplexing (OFDM) and Orthogonal Frequency Division Multiple Access (OFDMA), are important for next generation wireless communications systems. This is due to the fact that such schemes can provide many advantages including modulation efficiency, spectrum efficiency, flexibility (e.g., allowing differentiated quality of service), and strong multi-path immunity over conventional single carrier modulation schemes.

OFDM and OFDMA systems often utilize convolutional encoders at the transmitter to provide for error correction. Using a convolutional code, an m-bit string of data is transformed into n-bits, where m/n is a coding rate. Decoders, such as Viterbi decoders, are used at the receiver to decode the received encoded n-bits to recover the original m-bit sequence. This scheme often allows the original m-bit sequence to be decoded correctly, even if one or more of the encoded n-bits is not received correctly, thus resulting in reductions in bit error rate.

However, with the ever increasing reliability and performance demands of wireless services, there is an ongoing need to continuously reduce bit error rates.

SUMMARY

One embodiment provides a method for decoding encoded data bits of a wireless communication transmission. The method generally includes generating multiple hypotheses, each hypothesis specifying a set of bit values of the encoded data bits that are known or predicted based on a-priori information regarding the transmission or a related transmission, evaluating the multiple hypotheses by performing decoding for the encoded data bits, wherein the decoding involves eliminating sets of decoded bits that are inconsistent with the bit values specified by the hypotheses, and selecting, as output, decoded bits corresponding to one of the hypotheses.

One embodiment provides a receiver for wireless communication. The receiver generally includes a receiver front end for receiving a wireless transmission and generating a set of encoded bits, a hypothesis engine for generating multiple hypotheses, each hypothesis specifying a set of bit values of the encoded data bits that are known or predicted based on a-priori information regarding the transmission or a related transmission, and a decoder configured to evaluate the hypotheses by performing decoding operations that involve eliminating sets of decoded bits that are inconsistent with the bit values specified by the hypotheses and selecting, as output, decoded bits corresponding to one of the hypotheses.

One embodiment provides an apparatus for wireless communications. The apparatus generally includes means for receiving a wireless transmission and generating a set of encoded bits, means for generating multiple hypotheses, each hypothesis specifying a set of bit values of the encoded data bits that are known or predicted based on a-priori information regarding the transmission or a related transmission, and means for evaluating the hypotheses by performing decoding operations that involve eliminating sets of decoded bits that are inconsistent with the bit values specified by the hypotheses and selecting, as output, decoded bits corresponding to one of the hypotheses.

BRIEF DESCRIPTION OF THE DRAWINGS

So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.

FIG. 1 illustrates an example system in accordance with an embodiment of the present invention.

FIG. 2 is a block diagram of a receiver capable of a-priori decoding in accordance with an embodiment of the present invention.

FIG. 3 is a block diagram of an a-priori decoder in accordance with an embodiment of the present invention.

FIG. 4 is a block diagram of an a-priori decoder illustrating an example of a-priori information (API) bits in accordance with an embodiment of the present invention.

FIG. 5 illustrates an example of a state transition of a trellis diagram in accordance with an embodiment of the present invention.

FIG. 6 is a flow diagram of example operations for a-priori decoding in accordance with an embodiment of the present invention.

FIG. 7 illustrates the decoder of FIG. 5 with example values of a-priori information bits.

FIG. 8 illustrates an example of a Trellis diagram with a full set of decoding paths and a set of decoding paths that has been reduced based on a-priori information bits, in accordance with an embodiment of the present invention.

FIG. 9 illustrates example results of decoding considering a first set of a-priori information, in accordance with an embodiment of the present invention.

FIG. 10 illustrates example results of decoding considering a first set of a-priori information, in accordance with an embodiment of the present invention.

FIG. 11 is a block diagram of a receiver with an a-priori decoder and hypothesis engine in accordance with an embodiment of the present invention.

FIG. 12 is a block diagram of a hypothesis engine in accordance with an embodiment of the present invention.

FIG. 13 illustrates an example message format that may be used to generate decoding hypotheses based on a-priori information bits.

FIGS. 14A-14G illustrate different decoding hypotheses based on a-priori information bits.

FIG. 15 illustrates example results of decoding for different API hypotheses, in accordance with an embodiment of the present invention.

FIG. 16 illustrate example results of decoding for different API hypotheses, in accordance with an embodiment of the present invention.

FIG. 17 illustrate example results of decoding for different API hypotheses, in accordance with an embodiment of the present invention.

FIG. 18 illustrates an example receiver capable of evaluating multiple decoding hypotheses in parallel.

FIG. 19 illustrates example operations for evaluating multiple decoding hypotheses in parallel.

FIG. 20 illustrates an example decoder capable of evaluating multiple decoding hypotheses in parallel.

FIG. 21 illustrates an example receiver capable of evaluating multiple decoding hypotheses in a sequential manner.

FIG. 22 illustrates example operations for evaluating multiple decoding hypotheses in a sequential manner.

FIG. 23 illustrates an example decoder capable of evaluating multiple decoding hypotheses in a sequential manner.

FIG. 24 illustrates an example receiver capable of evaluating multiple decoding hypotheses in an iterative manner.

FIG. 25 illustrates example operations for evaluating multiple decoding hypotheses in an iterative manner.

DETAILED DESCRIPTION

The present invention generally provides techniques and apparatus for decoding convolutionally encoded wireless transmissions using a-priori information regarding a transmission. The a-priori information may be used to effectively reduce the population of possible decoded bit streams by eliminating those that include bits that are not consistent with the a-priori information. By removing these “known wrong” paths that lead to erroneous data, decoded bit error rates may be improved in some situations.

As used herein, the term a-priori information generally refers to information known beforehand, such as, information proceeding from a known or assumed cause to a necessarily related effect. As will be described in greater detail below, examples of a-priori information related to a transmission include known information bits in certain messages. Examples of such known information bits include reserved bits with values, as specified by a standard, or bits that have known or predictable values based on their value in previous transmissions. These known bit positions and bit values (herein referred to as “API values”) may be used in decoding process to improve decoding performance by excluding paths that correspond to values that are in contrast to the API values.

An Example Environment

FIG. 1 illustrates an example system in which embodiments of the present invention may be utilized to process a wireless signal from a base station 110 to a mobile station 120. The base station 110 may be a wireless communications station installed at a fixed location, such as a cellular telephone tower. The mobile station 120 may be any suitable type user equipment (UE) capable of communicating with the base station 110, such as a cellular handset or other type mobile device.

The base station 110 and mobile station 120 may communicate using one or more antenna 112, 122, each, and using any suitable wireless communication technology employing modulation schemes, such as orthogonal frequency-division multiplexing (OFDM) and orthogonal frequency division multiple access (OFDMA). For some embodiments, the communications between the base station and mobile station may be partially or fully compliant with a variety of Institute of Electrical and Electronics Engineers (IEEE) standards, such as IEEE 802.16 (Worldwide Interoperability for Microwave Access-WiMAX) and 802.20 (Mobile Broadband Wireless Access-MBWA) family of standards.

In some applications, the base station 110 may transmit data to the mobile station over what is commonly referred to as a forward link, while the mobile station 120 transmits data to the base station 120 over a reverse link. As will be described in greater detail below, different types of a-priori information may be available for forward and reverse link transmissions. This a-priori information may include information regarding the timing and content of certain messages between the base station 110 and mobile station 120, which may result in the value of one or more bits in a transmission being known.

The techniques described herein may be utilized in decoding performed at the base station 110, mobile station 120, or both. As will be described in greater detail below, a-priori information about different types of messages transmitted between the base station 110 and 120 may be used to determine the value of particular bit locations with in a transmission.

FIG. 2 illustrates a block diagram of example components for one embodiment of a receiver capable of receiving the transmitted signals. An antenna 202 may receive transmitted signals from a transmitter and send them to a radio frequency (RF) front end 210. The RF front end 210 may include any suitable circuits for receiving the transmitted signals and preparing them for digital signal processing, such as automatic gain control (AGC), a fast Fourier transform (FFT) block, a channel estimator, and a carrier-to-interference-and-noise ratio (CINR) estimator.

Signals from the RF front end 210 may then be sent to a signal processing block 220, which may contain any suitable circuits for subcarrier deallocation, signal demapping, and the like. The output of the signal processing block 220 is a set of encoded bits. The encoded bits are forwarded to a channel decoder 230, which may decode the encoded bits using a-priori information about the corresponding transmission.

A-Priori Decoding

FIG. 3 is a block diagram of a decoder 230 capable of performing decoder operations based on a-priori information in accordance with an embodiment of the present invention. While the illustrated example shows a Viterbi decoding scheme as an example, the a-priori decoding techniques presented herein may also be applied to other type of decoding schemes, such as Turbo coding/decoding, low-density parity-check (LDPC) coding/decoding, RS coding/decoding, BCH coding/decoding, and various other schemes.

In the case of schemes that utilize systematic codes, coded bits may include systematic bits (information before encoding) and parity bits (redundancy bits resulting from encoding). API decoding scheme may be applied to the systematic bits. In other words, API bit values may include known values of the systematic bits based on the particular systematic codes used. To apply API for systems utilizing systematic codes, bits of received data may be replaced with (known/predicted) API bit values at the front end of the decoder. In this manner, the probability of successful decoding may be increased using API for systematic decoders.

The decoder 230 includes a branch metric unit 232, add compare select (ACS) logic 234, and a traceback (TB) unit 236 to generate a set of decoded bits 246 from a set of “soft (or hard)” received/encoded bits 240. The branch metric unit generally functions to calculate branch metrics, which represent normalized distances between a received symbol (set of bits) and symbols in a code alphabet. The ACS unit 234 generally compiles branch metric data to generate metrics for decoding paths (2^(K)−1 paths, assuming a constraint length of K) and selects one of these decoding paths as optimal. The results of these selections are written to memory of a traceback unit 236, which restores a path from the stored decisions. A set of decoded bits can then be generated based on the transitions of the restored path.

One or more of the decoder components may be controlled by a set of API bits 250 in order to prevent the selection of decoding paths that correspond to bit values that are inconsistent with the a-priori information. In other words, the API bits 250 may contain sufficient information to indicate particular values (“0” or “1”) that are known for certain bit locations in a sequence of bits being decoded. Any bit string that has a value other than the value specified in the API bits 250 is not a valid decoded bit string. Thus, the decoder may remove decoding paths corresponding to these invalid bit strings from consideration during path selection.

As illustrated in FIG. 4, for some embodiments, the ACS unit 234 may be controlled by API bits 250 in order to exclude decoding paths that correspond to invalid decoded bit strings. During ACS operation, the API bits 250 may be used to reduce particular decoding path transitions that correspond to encoded bit values that are inconsistent with the API values.

The API bits 250 generally include sufficient information to identify one or more bits in a decoded bit string that have bit values that are known (or predictable) based on a-priori information and, additionally, what those bit values are. The actual format in which this information is conveyed may vary with different embodiments and according to actual implementation schemes.

For example, for some embodiments, the API bits 250 may include three types of information: an indication of bit positions 252, bit values 254, and, optionally, API mask bits 256. The bit positions 252 may provide an indication of bit locations (within an encoded sequence) that have known values, while the bit values 254 provide the actual known values (“0” or “1”) of an encoded bit. FIG. 7, described in detail below, provides an illustration with example values for bit positions, bit values, and mask bits according to this format.

The API bit positions 252 may identify bit positions correspond to the position of a known/predicted encoded bit in trellis structure. According to one embodiment, the API bit positions 252 may explicitly identify bit positions that have known values, while all other bit positions are considered “unknown.” The corresponding bit value of “0” or “1” in the bit values 254 may thus be used to identify valid transitions in the trellis structure and effectively remove decoding paths involving invalid transitions.

For example, FIG. 5 illustrates an example of a state transition of a trellis structure with 3-bit states. The illustrated example assumes a coding rate of ½ and a K=4 (with a 3-bit, K−1, state register). Solid arrows indicate state transitions corresponding to a “0” input bit, while dashed arrows indicate state transitions corresponding to a “1” input bit. According to API decoding, state transitions that correspond to input bits that are inconsistent with known values may be eliminated from consideration, thereby effectively eliminating any paths including these transitions from the final selection.

As an example, if a known API bit value for this state were a “0,” the state transitions with solid lines will be evaluated, while the state transitions with dashed lines do not need to be calculated because they are part of invalid paths that should not be considered for selection. As described above, these transitions may be effectively eliminated at the next transition by setting the value of a state metric to a worst case value. In addition to reducing bit error rate by eliminating invalid paths from selection, eliminating the number of transitions based on API bit values can also reduce the number of computations in the ACS unit.

For some embodiments, a mask function may be realized by utilizing the API mask bits 256 to identify bit positions whose API bit value should be ignored. Such a mask function may be useful and add flexibility, for example, when a standard changes causing a previously known bit value to become unknown. Setting the mask bit may provide a simple mechanism to efficiently accommodate such changes. A mask function may also be realized by manipulating the API bit positions 252 to remove the identification of a bit position that no longer has a known value, thus providing an alternative to changing a value in the bit mask value and/or eliminating the need for the bit mask value at all.

FIG. 6 illustrates example operations 600 for API decoding. The operations begin, at 602, by generating a hypothesis based on a-priori information. At 604, decoding paths that result in bit values inconsistent with the API bit values of the hypothesis are removed. Finally, at 606, decoding is performed based on a selection of one of the remaining paths.

As used herein, the term hypothesis generally refers to a particular set of API bits, for example, indicating bit positions with known values and specifying the values for those bits. As will be described in greater detail below, for some embodiments, separate logic (referred to herein as a “hypothesis engine”) may be provided to generate one or more hypotheses, for example, based on message information from a MAC processor.

FIG. 7 illustrates one example of a hypothesis for a 6-bit stream applied to an API decoder. The illustrated hypothesis indicates, via API bit position values [1 2 3 5], that API bit values are present at bit positions 1, 2, 3, and 5 for use in decoding. According to the illustrated scheme, the corresponding API bit values [1 0 1 1] indicate the bit values for bits at these positions are: bit1=1, bit2=0, bit3=1, and bit5=1. For some embodiments, API mask bit values of [0 0 0 0] may be used indicate that no masking function is applied to any of the bits. On the other hand, to exclude a bit from the API decoding, a mask bit could be set, for example to [0 0 0 1] to mask bit position 5, resulting in effective bit values of [1 0 1 X].

Of course, API mask functionality may be realized by controlling the API bit position values, as well. As an example, bit position 5 may also be effectively masked out by removing 5 from the bit position values, resulting in bit position values of [1 2 3], with corresponding API bit values [1 0 1]. In this scheme, API bit positions may be effectively masked without the need for a separate mask value data structure.

In an alternative scheme, only the API bit values and corresponding API mask values may be used. As an example, it may be assumed that all positions in a bit sequence are used for API decoding, for example, by default or by express indication of all bit positions in the API position value (e.g., [1 2 3 4 5 6]). In either case, the API mask values may be used to identify bit positions that have no corresponding API bit values. For example, the API mask value of [0 0 0 1 0 1] may be used with the “1” values indicating the API bit values corresponding to bit positions 4 and 6 should be ignored, resulting in corresponding API bit values of [1 0 1 X 1 X].

FIG. 8 illustrates how the API bit values of the hypothesis shown in FIG. 7 may be applied to reduce the number of decoding paths considered during decoding. The top diagram 810 shows all possible paths through the diagram that would be considered in a conventional decoding scheme that assumes all input bits are unknown. As illustrated by the bottom diagram 820, however, an API decoding scheme searches a greatly reduced number of paths, having eliminated a number of path transitions based using the known API bit values.

The reduction in paths based on the API bit values may be explained by traversing the diagram 820 from left to right. The known API values for the corresponding transitions are listed across the top. For the first transition, the bit value is a known “1” resulting in removal of the solid line path transitions corresponding to a zero input bit. This results in transitions to state nodes 100b, 101b, 110b and 111b.

The second transition corresponds to a known bit value of “0” resulting in removal of the dashed line path transitions. This results in transitions to state nodes 010b and 011b. The third transition corresponds to a known bit value of “1” resulting in removal of the solid line path transitions. This results in transitions to a single state node 101b.

The bit value for the fourth transition, however, is unknown. Therefore, both possible transition paths are evaluated. This results in transitions to state nodes 010b and 110b. The fifth transition corresponds to a known bit value of “1” resulting in removal of the solid line path transitions. This results in transitions to state nodes 101b and 111b. The bit value for the sixth transition is again unknown. Therefore, both possible transition paths are evaluated, resulting in transitions to state nodes 010b and 110b from state node 101b and transitions to state nodes 011b and 111b from state node 111b.

Branch metrics for these remaining paths can be evaluated to select an optimal path and generate the corresponding set of decoded bits. By eliminating decoding paths that correspond to invalid bit sequences, bit/packet error rates may be improved using API decoding, with greater improvements expected in noisier environments.

FIG. 9 is an example graph of packet error rate (PER) versus signal to noise ratio (SNR) for simulated decoding a frame control header (FCH)/downlink frame prefix (DLFP) message of IEEE 802.16e standard. This type of message contains 24 bits information. Of these, 5 bits are reserved bits that are to be set to zero per the standard. In the simulated example, these 5 reserved bits are used as a-priori information, with known bit values of “0” at the corresponding locations in the 24 bit string. The simulation also assumes modulation and coding as follows: QPSK, TBCC(r=1/2), with a repetition factor of 4 and a duplication factor of 2, and assumes repetition Maximum Ratio Combining (MRC) on the receive side (RX).

As illustrated, the API decoding scheme shows improved performance relative to the conventional decoding scheme in AWGN environments. For example, the API decoding scheme shows about a 0.6 dB gain in PER 10⁻² in AWGN channel when compared with conventional decoding (without considering API).

FIG. 10 is a similar diagram to FIG. 9, but the corresponding simulation assumes both repetition Maximum Ratio Combining (MRC) and duplication on the receive side (RX). As illustrated, in this example, an API decoding scheme shows an approximate 0.75 dB gain at PER 10⁻² in AWGN channel compared to without API decoding scheme.

Hypothesis Engine

As described above, for some embodiments, a hypothesis engine may be provided to generate “hypotheses” that each includes a set of API bit values to use in performing API decoding. Depending on a particular implementation, a hypothesis engine may generate a single hypothesis or multiple hypotheses that may differ in which bits have known values and what those bit known values are. Evaluating multiple hypotheses may be useful, for example, when there are only a limited number of valid bit combinations, for a given sequence.

FIG. 11 illustrates a receiver circuit 1100 that includes an API decoder 230 and a hypothesis engine 1110. As illustrated, the hypothesis engine 1110 may receive information regarding a message from a medium access control (MAC) processor 1120 and generates API bit values (a hypothesis) for use by the API decoder 230. The API decoder 230 starts to decode received soft (or hard) bits Rs using the API bit values provided by the hypothesis engine 1110. The API decoder 230 outputs decoded data bits Rd, which are delivered to a message parser 1130.

If the message parser 1130 detects that the decoded bits are for a kind of message, the message is parsed and delivered to a MAC (medium access control) processor 1120. The MAC processor 1120 may function as a type of protocol analyzer, analyzing the received data, for example, in an effort to determine what the next possible message type(s) are and what the timing will be.

As an example, the MAC processor 1120 may recognize the first incoming message (or data) will be FCH/DLFP message, which is followed by a downlink preamble. In some cases, the MAC processor 1120 may use some information from a previous frame, for example, to determine a coding rate, message length, or some other parameter. The MAC processor 1120 may provide this information to the hypothesis engine 1110 that will use it to extract known bit values (or predict bit values) for particular bit locations and generate API information to forward to the API decoder.

FIG. 12 illustrates an example hypothesis engine 1110 that may be used to generate decoding hypotheses based on a-priori information and message information provided by the MAC processor 1120. As illustrated, the hypothesis engine receives an indication of a message type and includes logic 1210 to retrieve the corresponding message(s) designated by the message type and the format of the message(s) are analyzed by format logic 1220.

For some embodiments, in addition to bit locations with fixed/known bit values (such as reserved bits set to a known value according to a standard), hypotheses may be generated with information that is predictable. As an example, bit information may be predictable based on a value from a previously received message (e.g., a coding type may not likely change from one message to the next).

Thus, classify logic 1230 may classify bit information in a given message into at least three categories: fixed information, predictable information, and variable information. The fixed (known) information generally refers to information that is fixed so that it is known 100% from initial stage or some bit values that are known under some conditions (e.g., after checking the decoding results of related messages). For example, the decoded results of messages relating to data to be decoded, such as messages or data that are known to be positioned before the data to be decoded, may be analyzed and API information may be extracted from the analyzed data.

The predictable information may include information that can be predictable under certain conditions or assumptions so it could provide different candidate values or bit combinations for a set of one or more bits. Different candidate values may be included in different hypotheses. For example, the predictable information may include some information predictable under certain conditions or assumptions or information that is predictable after checking decoding results of related messages.

Variable information generally includes information that is unknown or too difficult to predict so it is generally not used as API bit values (e.g., the API bit position values for these bit locations may be set to “0”). After classifying the information bits, Hypothesis API and Delivery logic 1240 of the hypotheses engine may generate a set or sets of API bit values (each set corresponding to a hypothesis) using the classified information. For example, the logic 1240 may construct the API bit location, bit value, and mask strings, to be output to the decoder 230.

The API decoding scheme presented herein may be applied to a variety of different types of messages. For example, API decoding may be applied to (FCH) Downlink Frame Prefix (DLFP) messages, as described below, Normal DL map messages, Compressed DL MAP messages, UL MAP messages, Bandwidth Request (BW-REQ) messages, Initial Ranging Request (IRNG-REQ) messages, and so on.

A frame control header (FCH) Downlink Frame Prefix (DLFP) message 1300, as depicted in FIG. 13, provides a good example of various bits of information that may be classified as fixed, predictable, and variable. The format and content of a FCH message is defined in IEEE 802.16e OFDMA standard. The DLFP is the contents of an FCH channel. The DLFP is a data structure transmitted at the beginning of each frame and contains information regarding the current frame and is mapped to the FCH. Therefore, successful decoding of the DLFP is very important to process a whole frame. The classification of some bits may change over time, for example, after a transition from an initial acquisition state to detecting a first message frame.

As an example, a bitmap field 1310 includes 6 bits, with each bit indicating whether a corresponding message group is used by a segment. In an initial acquisition state, these bits are unknown. However, after initial decoding and identifying a message segment, at least one of the bits will be identified (e.g., assuming the first message group bit is used API bits=“1XXXXX”). Further, in a normal operation state, the mobile station can predict all 6 of the bits, assuming the base station sends the same bitmap as in the previous frame.

As described earlier, bits of the reserved fields 1320 and 1322 will remain fixed so long as the standard is not changed. In contrast, the 2 bits of the repetition type field 1330 are difficult to predict and can change from frame to frame.

The 3-bit coding type field 1340 may be classified in different ways and used to generate a number of different hypotheses. For example, without placing any conditions on the types of coding, the 3-bit field could be treated as variable. However, using a-priori information some of these bits may be treated as fixed. For example, if it is known that a current version of WiMAX supports only two types of coding, TBCC (0b000) and CTC (0b010), the first and third bits may be treated as known bit values of “0” (API bits=“0b0X0”).

While the 8-bit length field 1350 may vary from frame to frame, some of the bits may be classified in different manners. As an example, imposing no limitation on the length field all 8 bits would be variable. However, in most cases, a length of a DL-MAP will be less than 2̂7, such that the MSB may be predicted to be a “0” (API bits=“0b0XXXXXXX”). While this prediction may not be true, the improvement in bit error rate achieved may outweigh any performance penalty in having to re-decode using a different hypothesis. More aggressive hypotheses may also be generated in a similar manner, for example, assuming the length is less than 2̂6 (API bits=“0b00XXXXXX”) or less than 2̂4 (API bits =“0b0000XXXX”).

FIGS. 14A-14G illustrate multiple API decoding hypothesis examples for the FCH/DLFP message, based on the information and possible classifications and assumptions described above. The hypotheses are referred to as having different levels (L0-L6) that generally represent how “aggressive” the hypothesis is, based on the number of bits that are treated as having known bit values.

Referring first to FIG. 14A, the L0 hypothesis corresponds to the case of no API bit values (no hypothesis), as in the case of the first message in each frame. In other words, because a message has not been decoded, there is no message information that may be used to generate API values. FIG. 14B illustrates the first level (L1) hypothesis, with only the reserved bit values used in the hypothesis.

FIG. 14C illustrates the L2 hypothesis, which includes the reserved bit values plus a bitmap bit value (the message group indicated in the first frame) used in the hypothesis. FIG. 14D illustrates the L3 hypothesis which, relative to the L2 hypothesis, adds the remaining bitmap bit values that were used in the previous frame.

FIG. 14E illustrates the L4 hypothesis which, relative to the L3 hypothesis, adds coding field bit values that are common to the supported coding types TBCC and CTC. FIG. 14F illustrates the L5 hypothesis which, relative to the L4 hypothesis, adds the upper two bits of the length field based on the assumption the length is less than 2̂6. FIG. 14G illustrates the L6 hypothesis which, relative to the L5 hypothesis, adds two more bits of the length field, based on the assumption that the length is less than 2̂4.

The bit values for each of these hypotheses may be used by the API decoder to reduce a number of decoding paths that correspond to erroneous data, in the manner described above. Of course, the hypotheses shown in FIGS. 14B-14G are exemplary only. Further, while the illustrated hypotheses get progressively more aggressive, including more known bit values, those skilled in the art will recognize that other hypotheses may be generated using different combinations of the bit values shown in these examples.

As described above, the API bit values according to these different hypotheses may be used by the API decoder to remove decoding paths that correspond to erroneous data. Because the different hypotheses have different API bit values, the decoding performance may vary from hypothesis to hypothesis. FIGS. 15-17 show example graphs that illustrate the performance variations between the different hypotheses over different channels.

FIG. 15 shows simulation results of API decoding for different hypotheses L0-L6 in an additive white Gaussian noice (AWGN) channel. In the simulation, it is assumed that all hypotheses are correct (in other words, it is assumed that the API bit values match the actual encoded bit values).

As illustrated, hypotheses with more API bits yield better performance (reduced bit error rates). FIG. 16 show similar results, for API decoding using the different hypothesis for ITU Ped-A and Ped-B channels. FIG. 17 shows similar results, for API decoding using the different hypothesis for ITU Veh-A and Veh-B channels.

While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.

Methods of Processing Multiple Hypotheses

As discussed above, a hypothesis engine generates a hypothesis of bit values based on both fixed and predictable a-priori information. The hypothesis engine may use predictable information to generate Nc multiple hypotheses by assuming different combinations of bit values. To increase performance it may be desirable to process multiple hypotheses. Accordingly, the decoder may investigate multiple delivered hypotheses. Thus, the number of processed hypotheses may equal the number of delivered hypotheses, Nc. Where there are multiple processed hypotheses, only the most accurate hypothesis may be selected.

In some embodiments a received message may contain a cyclic redundancy check (CRC) field, or other similar type of check field. For messages that lack a CRC, the selection criteria may be based on an accumulated likelihood (or accumulated distance) at the final stage of decoding. For messages that have CRC, the selection criteria may be based on either the results of the CRC check or the accumulated likelihood.

There are several methods that may be utilized to evaluate multiple hypotheses. These methods may include parallel, sequential and iterative evaluation. To implement a parallel evaluation method, a plurality of decoders is utilized with each decoder processing one or more of the Nc API hypotheses.

In contrast, the sequential and iterative decoding methods may utilize a single decoder to process a single hypothesis at a time. In the sequential method the decoder processes all hypotheses in a loop that is Nc long, while in the iterative method the decoder processes a series of hypotheses until it finds one hypothesis that meets a predetermined selection criteria threshold.

In some embodiments, the number of hypotheses may exceed the number of processors. In such embodiments, a hybrid method may be utilized in which each processor operates in parallel, but each processor evaluates more than one hypothesis in a sequential or iterative manner.

FIG. 18 illustrates a receiver circuit that includes a parallel API decoder 1830 and a hypothesis engine 1860 that generates multiple hypotheses.

As illustrated, the hypothesis engine 1860 may generate NC different hypotheses, each having a different set of API bit values API(1) to API(N_(C)), based on message information received from a MAC processor. The hypothesis engine may generate the multiple hypotheses, for example, based on different assumptions used to predict bit values. As described above, some of the hypotheses may be considered more aggressive than others, for example, based on the number of bit values that are predicted.

The decoder 1830 decodes received bits Rs using the API bit values of the different hypotheses, in effect, decoding the received bits multiple times in parallel by applying the different hypotheses. After evaluating the multiple hypotheses, the decoder 1830 may output decoded data bits R_(D) obtained using the hypothesis deemed to be the best based on some type of selection criteria.

FIG. 19 illustrates example operations 1900 for evaluating multiple hypotheses in parallel. The operations 1900 may be described with reference to FIG. 20, which illustrates an example embodiment of the parallel decoder 1830 having a plurality of API decoders 2000 arranged in parallel.

The operations begin, at 1902, by generating a plurality of hypotheses based on a-priori information. At 1904, each hypothesis may be sent to one of the decoders 2000. As illustrated in FIG. 20, each hypothesis may include the types of information described above (e.g., bit values, bit locations, and/or bit masks) to be used by the decoder in decoding the received bits R_(S).

Each decoder performs API decoding, at steps 1906 and 1908, removing decoding paths based on the API bit values of the corresponding hypothesis and selecting from remaining paths to generate a set of decoded bits RD. At 1910, each decoder may generate a quality metric (QA) that may be used to select a best hypothesis, for example, in the event the decoded message does not include a CRC. If the message does contain a CRC, a separate quality metric may or may not be generated. At 1912, the decoding results from each decoder are compared and, at step 1914, results obtained using the best hypothesis are selected.

As illustrated in FIG. 20, if the message being decoded contains a CRC, the decoding results may be compared by performing a CRC check with CRC logic 2020. The CRC logic 2020 may generate an output (S_(X)) identifying a hypothesis with decoded results that had a matching CRC. The output S_(X) may be used to control select logic 2030 that serves as a multiplexer, to output the corresponding decoded results.

As an alternative to a CRC check (e.g., if a decoded message does not have a CRC), the quality metric may be used to select a best hypothesis. The quality metric may be, for example, an accumulated distance or likelihood value. ML decision logic 2010 may evaluate the quality metric from each decoder, generating an output (S_(Y)) identifying a hypothesis with decoded results that had the best quality metric (e.g., the lowest accumulated distance or the highest likelihood). The output S_(Y) may be used to control the select logic 2030 to output the corresponding decoded results.

FIG. 21 illustrates a receiver circuit that includes a sequential API decoder 2130 and a hypothesis engine 2160 that generates multiple hypotheses.

As illustrated, the hypothesis engine 2160 may generate N_(C) different hypotheses, and output these hypotheses in a sequential manner to the decoder 2130. For example, as illustrated, the hypothesis engine 2160 may output the API bit values, API(c) to the decoder 2130, where c=1 to N_(C).

The decoder 2130 decodes received bits Rs using the API bit values of the different hypotheses, in effect, decoding the received bits multiple times in serial by applying the different hypotheses. After evaluating the multiple hypotheses, the decoder 2130 may output decoded data bits R_(D) obtained using the hypothesis deemed to be the best based on some type of selection criteria.

FIG. 22 illustrates example operations 2200 for evaluating multiple hypotheses in a sequential manner. The operations 2200 may be described with reference to FIG. 23, which illustrates an example embodiment of the sequential decoder 2130 having a single API decoder 2300 for decoding a set of received bits Rs multiple times sequentially, based on API bit values of different hypotheses.

The operations begin, at 2202, by generating a plurality of hypotheses based on a-priori information. At 2204, one of the hypotheses, with bit values API(c), is selected to be sent to the decoder 2130 for use in decoding the received bits.

The decoder performs API decoding, at steps 2206 and 2208, removing decoding paths based on the API bit values and selecting from remaining paths to generate a set of decoded bits R_(D). At 2210, the decoder may generate a quality metric (QA) that may be used to select a best hypothesis, for example, in the event the decoded message does not include a CRC. As described above, if the message does contain a CRC, a separate quality metric may or may not be generated. At 2212, the decoding results and quality score (if generated) are stored in memory 2340, for later evaluation.

If there are more hypotheses, as determined at 2214, operations 2204-2212 are repeated. Once the operations have been performed for each hypothesis, the results of the hypotheses are compared, at 2216, and the results obtained using the best hypothesis are selected, at 2218.

As illustrated in FIG. 23, the decoding results R_(D)(c) and quality metric QA(c), if generated, for each of the hypotheses may be retrieved from memory 2340 and evaluated to determine the best hypothesis. As illustrated, similar circuitry to that shown in FIG. 20 may be used to output an identification of a best hypothesis based on a CRC (S_(X)) 2320 and/or a quality 2310 metric (S_(Y)) to control selection logic 2330 to output the corresponding decoded results.

FIG. 24 illustrates a receiver circuit that includes an iterative API decoder 2430 and a hypothesis engine 2460 that generates multiple hypotheses.

As with the hypothesis engine 2160 of FIG. 21, the hypothesis engine 2460 may generate N_(C) different hypotheses, and output these hypotheses in a sequential manner to the decoder 2430. As with the decoder 2130 of FIG. 21, the decoder 2430 may utilize a single decoder 2470 to decode received bits Rs using the API bit values API(c) of the different hypotheses, in effect, decoding the received bits multiple times in serial by applying different hypotheses.

However, rather than evaluating each of possible hypothesis and comparing the output results, the decoder 2430 may compare the results of each hypothesis against threshold selection criteria. Once a hypothesis is evaluated with results that satisfy the selection criteria, the corresponding decoded data bits may be output without evaluating any remaining hypotheses.

FIG. 25 illustrates example operations 2500 for evaluating multiple hypotheses in an iterative manner. The operations 2500 may be performed, for example, by components shown in FIG. 24.

The operations begin, at 2502, by generating a plurality of hypotheses based on a-priori information. At 2504, one of the hypotheses, with bit values API(c), is selected to be sent to the decoder 2430 for use in decoding the received bits. The decoder performs API decoding, at steps 2506 and 2508, removing decoding paths based on the API bit values and selecting from remaining paths to generate a set of decoded bits R_(D).

Rather than wait until all of the hypotheses are evaluated and comparing the results, as in FIG. 22, the results obtained for the selected hypothesis are evaluated (within the loop), at steps 2510-2512. As illustrated, the decoder 2430 may include logic 2480 to determine if a set of decoded bits satisfies the selection criteria. For example, logic 2480 may perform a CRC check and/or compare a quality metric to a predetermined threshold value.

If the selection criteria are not met (e.g., CRC check is not a match or the quality metric falls below the threshold), operations 2504-2512 may be repeated, to evaluate a different hypothesis. However, if the selection criteria are met, the results obtained using the current hypothesis is selected, at 2514.

The order in which different hypotheses are evaluated in this iterative approach may vary. For example, for some embodiments more aggressive hypotheses (with more known/predicted bit values) may be evaluated before less aggressive hypotheses. For some embodiments, less aggressive hypotheses may be evaluated before more aggressive hypotheses. For some embodiments, some other type of criteria may be used to determine the order in which the hypotheses are selected for evaluation.

Those skilled in the art will recognize that the various techniques for evaluating multiple hypotheses may be varied or, in some cases, combined. For example, as previously described, parallel and sequential techniques may be combined to evaluate a plurality of hypotheses in parallel, in the event that there are more hypotheses than parallel decoders.

As used herein, the term “determining” encompasses a wide variety of actions. For example, “determining” may include calculating, computing, processing, deriving, investigating, looking up (e.g., looking up in a table, a database or another data structure), ascertaining and the like, and vice versa. Also, “determining” may include receiving (e.g., receiving information), accessing (e.g., accessing data in a memory) and the like. Also, “determining” may include resolving, selecting, choosing, establishing and the like, and vice versa.

Information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals and the like that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles or any combination thereof.

The various illustrative logical blocks, modules and circuits described in connection with the present disclosure may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array signal (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any commercially available processor, controller, microcontroller or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core or any other such configuration.

The steps of a method or algorithm described in connection with the present disclosure may be embodied directly in hardware, in a software module executed by a processor or in a combination of the two. A software module may reside in any form of storage medium that is known in the art. Some examples of storage media that may be used include RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM and so forth. A software module may comprise a single instruction, or many instructions, and may be distributed over several different code segments, among different programs and across multiple storage media. A storage medium may be coupled to a processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.

The methods disclosed herein comprise one or more steps or actions for achieving the described method. The method steps and/or actions may be interchanged with one another without departing from the scope of the claims. In other words, unless a specific order of steps or actions is specified, the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims.

The functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored as one or more instructions on a computer-readable medium. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray® disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers.

Software or instructions may also be transmitted over a transmission medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of transmission medium.

Further, it should be appreciated that modules and/or other appropriate means for performing the methods and techniques described herein can be downloaded and/or otherwise obtained by a mobile device and/or base station as applicable. For example, such a device can be coupled to a server to facilitate the transfer of means for performing the methods described herein. Alternatively, various methods described herein can be provided via a storage means (e.g., random access memory (RAM), read only memory (ROM), a physical storage medium such as a compact disc (CD) or floppy disk, etc.), such that a mobile device and/or base station can obtain the various methods upon coupling or providing the storage means to the device. Moreover, any other suitable technique for providing the methods and techniques described herein to a device can be utilized.

It is to be understood that the claims are not limited to the precise configuration and components illustrated above. Various modifications, changes and variations may be made in the arrangement, operation and details of the methods and apparatus described above without departing from the scope of the claims.

While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow. 

1. A method for decoding encoded data bits of a wireless communication transmission, comprising: generating multiple hypotheses, each hypothesis specifying a set of bit values of the encoded data bits that are known or predicted based on a-priori information regarding the transmission or a related transmission; evaluating the multiple hypotheses by performing decoding for the encoded data bits, wherein the decoding involves eliminating sets of decoded bits that are inconsistent with the bit values specified by the hypotheses; and selecting, as output, decoded bits corresponding to one of the hypotheses.
 2. The method of claim 1, wherein evaluating the multiple hypotheses comprises: evaluating multiple hypotheses in parallel by performing decoding for the encoded data bits using multiple decoders, each utilizing bit values specified by a different hypothesis.
 3. The method of claim 1, wherein evaluating the multiple hypotheses comprises: evaluating multiple hypotheses in a sequential manner by performing decoding for the encoded data bits using a single decoder multiple times to decode the encoded bits bit values specified by a different hypothesis each time.
 4. The method of claim 1, wherein evaluating multiple hypotheses in a sequential manner comprises evaluating some, but not all, of the hypotheses.
 5. The method of claim 1, further comprising: comparing results obtained by decoding operations utilizing bit values specified by the different hypotheses; and selecting, as output, decoded bits corresponding to one of the hypotheses based on the comparison.
 6. The method of claim 5, wherein comparing results obtained by decoding operations utilizing bit values specified by the different hypotheses comprises: comparing at least one of accumulated distance values and likelihood values.
 7. The method of claim 5, wherein comparing results obtained by decoding operations utilizing bit values specified by the different hypotheses comprises a check field comparison.
 8. The method of claim 1, wherein eliminating sets of decoded bits that are inconsistent with the bit values specified by the hypotheses comprises removing, from a set of possible decoding paths, decoding paths that correspond to decoded data bits that are inconsistent with the bit values specified by the hypothesis.
 9. A receiver for wireless communication, comprising: a receiver front end for receiving a wireless transmission and generating a set of encoded bits; a hypothesis engine for generating multiple hypotheses, each hypothesis specifying a set of bit values of the encoded data bits that are known or predicted based on a-priori information regarding the transmission or a related transmission; and a decoder configured to evaluate the hypotheses by performing decoding operations that involve eliminating sets of decoded bits that are inconsistent with the bit values specified by the hypotheses and selecting, as output, decoded bits corresponding to one of the hypotheses.
 10. The receiver of claim 9, wherein the decoder is configured to decode the encoded bits by removing, from a collection of possible decoding paths, decoding paths that correspond to decoded data bits that are inconsistent with bit values specified by a hypothesis and select a decoding path from remaining decoding paths of the possible decoding paths that were not removed.
 11. The receiver of claim 9, wherein the decoder comprises a plurality of decoding circuits allowing multiple hypotheses to be evaluated in parallel.
 12. The receiver of claim 9, wherein the decoder is configured to evaluate multiple hypotheses in a sequential manner by performing decoding for the encoded data bits multiple times, wherein the decoding is performed utilizing bit values specified by a different hypothesis each time.
 13. The receiver of claim 9, further comprising memory for storing results of decoding utilizing bit values specified by different hypotheses.
 14. The receiver of claim 9, wherein the decoder evaluates multiple hypotheses in a sequential manner by evaluating hypotheses until decoding results are obtained that satisfy a specified criteria.
 15. The receiver of claim 9, further comprising: comparison logic for comparing results obtained by decoding operations utilizing bit values specified by the different hypotheses; and selection logic for selecting, as output, decoded bits corresponding to one of the hypotheses based on an output generated by the comparison logic.
 16. The receiver of claim 15, wherein the comparison logic compares at least one of accumulated distance values and likelihood values for results obtained by decoding operations utilizing bit values specified by the different hypotheses.
 17. An apparatus for wireless communications, comprising: means for receiving a wireless transmission and generating a set of encoded bits; means for generating multiple hypotheses, each hypothesis specifying a set of bit values of the encoded data bits that are known or predicted based on a-priori information regarding the transmission or a related transmission; and means for evaluating the hypotheses by performing decoding operations that involve eliminating sets of decoded bits that are inconsistent with the bit values specified by the hypotheses and selecting, as output, decoded bits corresponding to one of the hypotheses.
 18. The apparatus of claim 17, wherein the means for evaluating the hypotheses comprises multiple means for decoding allowing for the evaluation of multiple hypotheses in parallel.
 19. The apparatus of claim 17, wherein the means for evaluating the hypotheses comprises sequential decoding means for decoding multiple hypotheses in a sequential manner.
 20. The apparatus of claim 19, further comprising: means for storing quality parameters indicative of a quality of decoding results obtained using the different hypotheses; and means for selecting results corresponding to the highest decoding quality based on the stored quality parameters.
 21. The apparatus of claim 19, further comprising: means for comparing results obtained by decoding operations utilizing bit values specified by the different hypotheses; and means for selecting, as output, decoded bits corresponding to one of the hypotheses based on the comparison.
 22. The computer-program product of claim 21, wherein the means for comparing results obtained by decoding operations utilizing bit values specified by the different hypotheses comprises: means for comparing at least one of accumulated distance values and likelihood values.
 23. A computer-program product for decoding encoded data bits of a wireless communication transmission comprising a computer readable medium having a set of instructions stored thereon, the set of instructions being executable by one or more processors and the set of instructions comprising: instructions for generating a set of a-priori bit values corresponding to known bit values of the encoded data bits; instructions for removing, from a collection of possible decoding paths, decoding paths that correspond to decoded data bits that are inconsistent with the set of a-priori bit values; and instructions for decoding the encoded data bits by selecting a decoding path from remaining decoding paths of the possible decoding paths that were not removed.
 24. The computer-program product of claim 23, wherein the instructions for evaluating the hypotheses comprises multiple means for decoding allowing for the evaluation of multiple hypotheses in parallel.
 25. The computer-program product of claim 23, wherein the instructions for evaluating the hypotheses comprises sequential decoding means for decoding multiple hypotheses in a sequential manner.
 26. The computer-program product of claim 25, further comprising: instructions for storing quality parameters indicative of a quality of decoding results obtained using the different hypotheses; and instructions for selecting results corresponding to the highest decoding quality based on the stored quality parameters.
 27. The computer-program product of claim 23, further comprising: instructions for comparing results obtained by decoding operations utilizing bit values specified by the different hypotheses; and instructions for selecting, as output, decoded bits corresponding to one of the hypotheses based on the comparison.
 28. The computer-program product of claim 27, wherein the instructions for comparing results obtained by decoding operations utilizing bit values specified by the different hypotheses comprises: instructions for comparing at least one of accumulated distance values and likelihood values. 