Decoder for iterative decoding of binary cyclic codes

ABSTRACT

A decoder for performing soft decision iterative decoding of a cyclic code based on belief propagation, includes an information exchange control unit, an X processor, and a Z processor. The information exchange control unit takes π x -metrics that were calculated by the X processor for nonzero elements in each of n-cyclic shifts of the parity-check polynomial of the code, and distributes the π x -metrics to the Z processor as the π z -metrics for a corresponding check node. The information exchange control unit takes λ z -metrics that were calculated by the Z processor for nonzero elements in each of n-cyclic shifts in a reverse order of the parity-check polynomial, and distributes them to the X processor as λ x -metrics for the corresponding code node. The operation of the information exchange control unit can be represented by the Tanner graph associated with an extended parity-check matrix, which is produced by adding k rows to the parity-check matrix of the cyclic code, wherein the X processor functions as the code nodes and the Z processor functions as the check nodes.

BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention

[0002] The present invention relates to a decoder for performing iterative decoding of binary cyclic codes.

[0003] 2. Description of the Related Art

[0004] Cyclic codes are attractive because encoding can be performed systematically and can also be easily implemented using shift-registers with feedback connections.

[0005] Iterative soft-decision decoders use the values of the matched filter outputs in a digital receiver. This contrasts with hard-decision decoders, which use bits based on the sign of the matched filter outputs. Soft decision decoders have better performance than hard-decision decoders, of about 2 dB improvement in bit signal-to-noise ratio. A soft-decision decoder for a binary cyclic code uses the Viterbi algorithm applied to a trellis.

SUMMARY OF THE INVENTION

[0006] It is conceivable to make a soft-decision decoder for decoding many different binary cyclic codes. However, such a conceivable decoder would require a different trellis structure for each cyclic code. This would require a great deal of memory and hardware, because different trellises have different sizes, that is, the number of states and number of branches, and also different structures.

[0007] It is desirable if a single decoder configuration could be used for decoding more than a specific family of binary cyclic codes.

[0008] The present inventor has discovered that iterative decoding of (n,k) binary cyclic codes based on belief propagation produces only poor results. These poor results are thought to be because an (n-k)-by-n parity-check matrix of an (n,k) binary cyclic code has columns with very low Hamming weights, that is, with only one nonzero element.

[0009] It is also desirable to produce a decoder that can decode binary cyclic codes using iterative decoding based on belief propagation with good results and using a simple configuration.

[0010] It is an objective of the present invention to provide a decoder capable of decoding many different families of cyclic codes.

[0011] It is another objective of the present invention to produce a decoder that can decode binary cyclic codes using iterative decoding based on belief propagation with good results.

[0012] A decoder according to the present invention is for decoding a data stream from a noisy channel into estimated bits. Before the data stream was transmitted across the noisy channel, it was encoded by an encoder according to a cyclic code into a plurality of code words in sequence.

[0013] In order to achieve the above-described objectives, the decoder according to the present invention includes an input means, a scaler, a Z processor, an X processor, and an information exchange control unit.

[0014] The input means receives input of a vector of noisy received values r(i) (where 0≦i≦n−1) of the data stream, a code length n of the code words, and a parity-check polynomial h(x) corresponding to the cyclic code. The parity-check polynomial h(x) has J-number of nonzero coefficients.

[0015] The scaler multiplies each noisy received value r(i) by a constant, and outputs each product as a log-likelihood ratio LLR(i).

[0016] The Z processor receives n-sets of πz(i,j) metrics (where 0≦j≦J−1), each set including J-number of πz(i,j) metrics. The Z processor calculates n-sets of λz(i,j) metrics based on the πz(i,j) metrics, each set including J-number of λz(i,j) metrics.

[0017] The X processor receives n-sets of λx(i,j) metrics, each set including J-number of λx(i,j) metrics. The X processor calculates n-number of a-posteriori values q(i) based on the λx(i,j) metrics and the log-likelihood ratios LLR(i). The X processor calculates n-sets of πx(i,j) metrics based on the λx(i,j) metrics and the a-posteriori values q(i), each set including J-number of πx(i,j) metrics. The X processor determines n-number of estimated code bits

_(i) based on the a-posteriori values q(i).

[0018] The information exchange control unit distributes the πx(i,j) metrics based on a cyclic shift of the parity-check polynomial h(x) to produce the πz(i,j) metrics. The information exchange control unit distributes the λz(i,j) metrics based on a reverse order of the cyclic shift of the parity-check polynomial h(x) to produce the λx(i,j) metrics.

[0019] With this configuration, iterative soft decision decoding can be performed using the same simple configuration to decode cyclic codes from many different families of cyclic codes. Binary cyclic codes can be iteratively decoded based on belief propagation with good results.

[0020] It is desirable that the decoder further include a π RAM and a λRAM. The π RAM is connected to an output of the X processor and an input of the Z processor. The λRAM is connected to an output of the Z processor and an input of the X processor.

[0021] The information exchange control unit organizes the π RAM into a J-by-n array with J columns and n rows based on the inputted code length n and the inputted parity-check polynomial h(x). The information exchange control unit distributes the πx(i,j) metrics from the X processor into the π RAM based on the cyclic shift of the parity-check polynomial h(x), and transfers to the Z processor the J-number of πx(i,j) metrics in each column of the π RAM as one of the n-sets of πz(i,j) metrics.

[0022] The information exchange control unit organizes the λRAM into a J-by-n array with J columns and n rows based on the inputted code length n and the inputted parity-check polynomial h(x). The information exchange control unit distributes the λz(i,j) metrics from the Z processor into the λRAM based on the reverse order of the cyclic shift of the parity-check polynomial h(x), and transfers to the X processor the J-number of λz(i,j) metrics in each column of the λRAM as one of the n-sets of λx(i,j) metrics.

[0023] With this configuration, the decoder according to the present invention can be realized in a serial configuration, using a minimal of hardware.

[0024] Alternatively, it is desirable that the decoder further includes a bus connecting the Z processor, the X processor, and the information exchange control unit to each other. In this case, the Z processor includes n-number of Z_(i) processors each connected to the bus with an individual address, and the X processor includes n-number of X_(i) processors each connected to the bus with an individual address. The information exchange control unit includes an address computation unit for transferring, across the bus, the πx(i,j) metrics from the X_(i) processors as πz(i,j) metrics to Z_(i) processors determined based on the cyclic shift of the parity-check polynomial h(x) and the λz(i,j) metrics from the Z_(i) processors as λx(i,j) metrics to X_(i) processors determined based on the reverse order of the cyclic shift of the parity-check polynomial h(x).

[0025] With this configuration, the decoder according to the present invention can be realized in a fast parallel configuration.

[0026] It is desirable that the Z processor compute the λz(i,j) metrics based on:

λ_(z)(i, j)=(−1)^(δ⊕sgn (π) ^(_(z)) ^((i, j)))(S−F _(Q)(|π_(z)(i, j)|))

[0027] wherein: ${S = {\left( {- 1} \right)^{\delta}{\sum\limits_{j = 0}^{J - 1}{F_{Q}\left( \left| {\pi_{z}\left( {i,j} \right)} \right| \right)}}}},$

[0028] δ=(−1)^(⊕) ^(_(j=0)) ^(j−1) ^(sgn (π) ^((i,j))), and p1 F_(Q) (x) denotes a quantized version of the function F(x)=log[(e_(x)+1)/(e^(x)−1)].

[0029] With this configuration, the λz(i,j) metrics can be reliably computed. In this case, it is desirable that the Z processor computes the λz(i,j) metrics using the following quantized version F_(Q) (x) of the function F(X)=log[(e^(x)+1)/(e^(x)−1)], because almost the same results can be obtained as with no quantization, but with much simpler computations: ${F_{Q}(x)} = \left\{ \begin{matrix} {5.00,} & {\quad {{0 \leq x \leq 0.10};}} \\ {2.25,} & {\quad {{0.10 \leq x \leq 0.35};}} \\ {1.50,} & {\quad {{0.35 \leq x \leq 0.60};}} \\ {1.00,} & {\quad {{0.60 \leq x \leq 0.90};}} \\ {0.75,} & {\quad {{0.90 \leq x \leq 1.20};}} \\ {0.50,} & {\quad {{1.20 \leq x \leq 1.60};}} \\ {0.30,} & {\quad {1.60 \leq x \leq 2.30}} \\ {0.10,} & {\quad {2.30 \leq {x.}}} \end{matrix} \right.$

[0030] It is desirable that the X processor calculate the a-posteriori values q(i) based on ${{q(i)} = {{\sum\limits_{j = 0}^{J - 1}{\lambda_{x}\left( {i,j} \right)}} + {L\quad L\quad {R(i)}}}},$

[0031] calculate the πx(i,j) metrics based on π_(x)(i,j)=q(i)−λ_(x)(i, j), and determine the n-number of estimated code bits based on

_(i)=sgn (q(i)). With this configuration, the a-posteriori values q(i) can be reliably calculated.

[0032] It is desirable that the constant used by the scaler equals 4/spectral density No of the noisy channel. With this configuration, overflow, which occurs when probabilities of a “0” or a “1” are too close to 1 or 0, can be reliably prevented from occurring.

[0033] It is desirable that the input means further receives input of a fixed number of iterations. In this case, the X processor determines the n-number of estimated code bits

_(i) after the fixed number of iterations. With this configuration, decoding delay is fixed. As a result, no buffers are required when data is delivered to its destination, so that hardware configuration is simpler.

[0034] It is desirable that the information exchange control unit perform the cyclic shifts of the parity-check polynomial h(x) by multiplying successive ones of x⁰ to x^(n−1) times the parity-check polynomial h(x) and performs the reverse order of the cyclic shifts of the parity-check polynomial h(x) by multiplying successive ones of x⁰ to x^(n−1) times the reciprocal h⁻¹(x) (x^(n) h(x⁻¹)) of the parity-check polynomial h(x) . With this configuration, there is no need to store the entire parity-check matrix; the parity-check polynomial and the code length are all that need to be inputted.

[0035] It is desirable that, in a first iteration, the X processor makes preliminary hard decisions on the a-posteriori values q(i) to produce hard decision values for highly reliable positions. In this case, the information exchange control unit uses the hard decisions when distributing the πx(i,j) metrics and the λz(i,j) metrics. With this configuration, decoding can be performed much more easily without any significant increase in decoding errors. In this case, it is desirable that the Z processor makes the preliminary hard decisions based on whether a a-posteriori value q(i) exceeds a threshold T, because this enables designating highly reliable positions with a simple configuration.

BRIEF DESCRIPTION OF THE DRAWINGS

[0036] The above and other objects, features and advantages of the invention will become more apparent from reading the following description of the embodiment taken in connection with the accompanying drawings in which:

[0037]FIG. 1 is a block diagram showing functional components of a decoder according to an embodiment of the present invention;

[0038]FIG. 2 is the Tanner graph of the binary cyclic (7,4) code;

[0039]FIG. 3(a) is a schematic view showing connections between a generic check node and its parent code nodes in the Tanner graph associated with an extended parity-check matrix H_(e);

[0040]FIG. 3(b) is a schematic view showing connections between a generic code node and its children check nodes in the Tanner graph associated with the extended parity-check matrix H_(e);

[0041]FIG. 4 shows the Tanner graph associated with the extended parity-check matrix H_(e) for the binary cyclic (7,4) Hamming code;

[0042]FIG. 5 is a graph comparing a function F(x) with z quantized version FQ (x);

[0043]FIG. 6 is a block diagram showing components of an X processor of the decoder shown in FIG. 1;

[0044]FIG. 7 is a graph showing simulation results of iterative decoding of the (7,4) Hamming code, with 4 iterations, when decoding is performed according to the present invention;

[0045]FIG. 8 is a graph showing simulation results for when a binary BCH (15,11) code is decoded according to the present invention;

[0046]FIG. 9 is a graph showing simulation results for when a binary BCH (15,7,5) code is decoded according to the present invention;

[0047]FIG. 10 is a graph showing simulation results for when a binary BCH (15,5,7) code is decoded according to the present invention;

[0048]FIG. 11 is a graph showing simulation results for when a binary (273,191) difference-set (DS) code is decoded according to the present invention;

[0049]FIG. 12 is a block diagram showing a serial decoder according to a first example of the embodiment;

[0050]FIG. 13 is a block diagram showing an X processor of the serial decoder of FIG. 12;

[0051]FIG. 14 is a block diagram showing an Z processor of the serial decoder of FIG. 12;

[0052]FIG. 15(a) is a schematic view representing address generation in an X-to-Z address generator of an X-to-Z propagation unit of the serial decoder shown in FIG. 12;

[0053]FIG. 15(b) is a schematic view representing address generation in a Z-to-X address generator of a Z-to-X propagation unit of the serial decoder shown in FIG. 12;

[0054]FIG. 16 is a schematic view showing a π RAM of the X-to-Z propagation unit shown in FIG. 12, stored with the metrics πx(i,j);

[0055]FIG. 17 is a schematic view showing a λ RAM of the Z-to-X propagation unit shown in FIG. 12, stored with metrics λz(i, i);

[0056]FIG. 18 is a block diagram showing a parallel decoder according to a second example of the embodiment;

[0057]FIG. 19 is a graph showing how different thresholds for indicating highly reliable positions affects error performance; and

[0058]FIG. 20 is a graph showing how different thresholds influence the average percentage of positions judged to be highly reliable positions.

DETAILED DESCRIPTION OF THE EMBODIMENT

[0059] Next, a decoder according to the embodiment of the present invention will be described while referring to the accompanying drawings.

[0060]FIG. 1 is a block diagram showing functional components of a decoder 1 according to the embodiment of the present invention. The decoder 1 includes an input unit 2, a scaler 3, an X processor 4, an information exchange control unit 5, and a Z processor 6.

[0061] The decoder 1 is for decoding a binary transmission of a data stream, which was transmitted across a noisy channel, into n-number of estimated bits

_(i). In the embodiment, it is assumed that binary transmission with energy per symbol Es (i.e., “0” and “1” are transmitted as +{square root}{square root over (E_(s))}and −{square root}{square root over (E_(s))}respectively) takes place over an additive white Gaussian noise (AWGN) channel with one-sided spectral density N₀.

[0062] Before the data stream is transmitted across the noisy channel, an encoder follows the conventional manner of encoding to encode the data stream according to a binary cyclic (n,k) code C, into a plurality of code words in sequence. Here, processes performed by the encoder to encode the data stream according to a cyclic (n,k) code C will be briefly explained.

[0063] A cyclic (n,k) code C has a code length n and a message (information sequence) length k. The cyclic code C is associated with a generator polynomial g(x) and a parity-check polynomial h(x)=(x^(n)−1)/g(x)=h₀+h₁x+. . . +h_(k)x^(k). The parity-check polynomial h(x) can be represented by the parity-check matrix H of the following equation: $\begin{matrix} {H = \begin{pmatrix} h_{0} & h_{1} & \Lambda & \quad & h_{k} & 0 & 0 & \Lambda & 0 \\ 0 & h_{0} & h_{1} & h_{2} & \Lambda & h_{k} & 0 & \Lambda & 0 \\ 0 & 0 & h_{0} & h_{1} & h_{2} & \Lambda & h_{k} & \Lambda & 0 \\ 0 & 0 & 0 & Ο & 0 & Ο & Ο & Ο & M \\ 0 & 0 & 0 & 0 & 0 & \Lambda & \Lambda & \Lambda & h_{k} \end{pmatrix}} & (1) \end{matrix}$

[0064] Each row of the parity-check matrix H of equation (1) has j-number of nonzero elements. The elements in the j-th row of the parity-check matrix H of equation (1) are the coefficients of the cyclic shift x^(j)h(x)mod (x^(n)−1), j=0, 1, . . . , n-k−1.

[0065] The encoder encodes the data stream in a systematic manner as follows. Message symbols to be encoded are the coefficients mλ ε GF(q), λ=0, 1, . . . , k−1 of an information polynomial m(x)=m₀+m₁x+. . . +m_(k−1) of degree k−1. A code polynomial c(x) in the cyclic code C corresponds to the information polynomial m(x).

[0066] During the first step, code symbols cλ are the same as the coefficients mλ, for λ=0, 1, . . . , k−1. Because the code has a cyclic structure, during subsequent steps, (n-k) redundant symbols cλ, λ=k, k+1, . . . , n−1 are obtained recursively via the parity-check relations: ${C_{\lambda} = {\sum\limits_{j = 0}^{\lambda - 1}{C_{j} \otimes H_{j}^{({\lambda - k})}}}},{\lambda = k},{k + 1},\ldots \quad,{n - 1}$

[0067] where addition is over GF(q); {circle over (x)} denotes multiplication over GF(q); and H_(j) ^((λ−k)) denotes the j-th entry in the (λ-k)-th row of parity-check matrix H.

[0068] The above-described example of systematic encoding with a cyclic code C assumes a code rate k/n of less than or equal to 0.5, so encoding is performed by recursion with the parity-check polynomial h(x). For cyclic (n,k) codes with a code rate k/n greater than 0.5, encoding is more efficient by dividing x^(n-k)m(x) by the generator polynomial g(x).

[0069] Either way, that is, by recursion with the parity-check polynomial h(x) or division by the generator polynomial g(x), the coefficients of the code polynomials are in systematic form, so that the first k coefficients are the message symbols, and the remaining n-k coefficients constitute the redundant symbols.

[0070] For example, consider the binary cyclic (7,4) Hamming code with parity-check polynomial h(x)=1+x+x²+x⁴, and parity-check matrix H in the following equation: $\begin{matrix} {H = \begin{pmatrix} 1 & 1 & 1 & 0 & 1 & 0 & 0 \\ 0 & 1 & 1 & 1 & 0 & 1 & 0 \\ 0 & 0 & 1 & 1 & 1 & 0 & 1 \end{pmatrix}} & (2) \end{matrix}$

[0071] A message {overscore (m)}=(m₀, m₁, m₂, m₃) is encoded as a codeword {overscore (C)}=(C₀, C₁, . . . , C₆), by first letting c_(λ)=m_(λ), λ=0, 1, 2, 3, and then solving the redundant positions:

[0072] C₄=C₀⊕C₁⊕C₂

[0073] C₅=C₁⊕C₂⊕C₃

[0074] C₆=C₂⊕C₃⊕C₄

[0075] With respect to its encoding process, the encoder is the same as a conventional encoder for encoding a binary cyclic code. However, according to the embodiment, the transmitter that includes the encoder also transmits, for example in a header, information relating to the binary cyclic (n,k) code C, such as the parity-check polynomial h(x) associated with the code, the code length, positions of the coefficients of the parity-check polynomial, and optionally the Hamming weights J of the parity-check polynomial.

[0076] The input unit 2 of the decoder 1 receives the data stream encoded in this manner as a vector of noisy received (soft) symbol values r(i) (where 0≦i≦n−1) that have received influence of the noisy channel. The input unit 2 is also input with the parameters of the code length n of the code words and the positions of the coefficients of the parity-check polynomial h(x) of the binary cyclic code C. The total number of input parameters is J+2 integers, or approximately (J+2) log₂ n bits. The parity-check polynomial h(x) has a Hamming weight J, and this value J can be input optionally. The input unit 2 can also be input with a fixed number of iterations N_(iter), which sets how many iterations are to be performed.

[0077] The input unit 2 passes the received values r(i), i ε {0, 1, . . . , n−1} to the scaler 3, and the parity-check polynomial h(x) to the information exchange control unit 5. Although not shown in FIG. 1, the input unit 2 also passes the code length n and the fixed number of iterations Niter to the scaler 3, the X processor 4, the information exchange control unit 5, and the Z processor 6.

[0078] The scaler 3 receives the noisy received values r(i) and the code length n from the input unit 2, and for ε {0, 1, . . . , n−1} multiplies each noisy received value r(i) by a constant 4/N₀ (=2/σ²), which is inversely proportional to the noise variance N₀/2 (=σ²) . The scaler 3 outputs each product as the logarithm of the likelihood ratio, that is, the log-likelihood ratio LLR(i), of each received symbol r(i). The operation of the scaler 3 can be represented by the following formula: ${{LLR}(i)} = {r_{i}^{*}\frac{4}{N_{0}}}$

[0079] The X processor 4 calculates ^(π)x-metrics based on the LLR (i) from the scaler 3 and ^(λ)x-metrics from the information exchange control unit 5. The Z processor 6 produces ^(λ)z-metrics based on ^(π)z-metrics from the information exchange control unit 5. The information exchange control unit 5 distributes the ^(π)x-metrics from the X processor 4 to the Z processor 6 as the ^(π)z-metrics, and distributes the ^(λ)z-metrics from the Z processor 6 to the X processor 4 as the ^(π)x-metrics, based on the parity-check polynomial h(x) and the code length n received from the input unit 2

[0080] The manner in which the information exchange control unit 5 exchanges the metrics can be more easily understood if represented by an extended parity-check matrix H_(e) of the cyclic code C and the associated Tanner graph. The parity-check matrix that represents the operations of the information exchange control unit 5 is produced by extending the parity-check matrix H of the cyclic (n,k) code C by k rows to produce an n-by-n matrix over GF(q), referred to as the extended parity-check matrix H_(e), hereinafter.

[0081] As an example, the extended parity-check matrix H_(e) for the binary cyclic (7,4) Hamming code is indicated in the following equation: $\begin{matrix} {H_{e} = \begin{pmatrix} 1 & 1 & 1 & 0 & 1 & 0 & 0 \\ 0 & 1 & 1 & 1 & 0 & 1 & 0 \\ 0 & 0 & 1 & 1 & 1 & 0 & 1 \\ 1 & 0 & 0 & 1 & 1 & 1 & 0 \\ 0 & 1 & 0 & 0 & 1 & 1 & 1 \\ 1 & 0 & 1 & 0 & 0 & 1 & 1 \\ 1 & 1 & 0 & 1 & 0 & 0 & 1 \end{pmatrix}} & (3) \end{matrix}$

[0082] As can be seen, the entries of each additional row are the coefficient of the following cyclic shifts of the parity-check polynomial:

[0083] x^(n-k)h(x), x^(n-k+1)h(x), . . . , x^(n−1)h(x). The n rows of extended parity-check matrix H_(e) have as entries the coefficients of all the n distinct cyclic shifts of h(x)modulo (x^(n−1)). Said differently, the rows of the extended parity-check matrix H_(e) are produced from successive cyclic shifts x^(i) h(x), wherein i represents individual positions in a code word.

[0084] Tanner graphs and their association with parity check matrices are well known in the art and are described in detail in U.S. Pat. No. 4,295,218, incorporated herein by reference. A Tanner graph is a bipartite graph with a set of code nodes that represent codeword positions, and a set of check nodes that represent parity-check equations. Code nodes are connected to a check node if and only if they participate in the same parity-check equation. Connections between code nodes and check nodes are determined by locations of nonzero entries in the parity-check matrix of the code. For example, the Tanner graph of the binary cyclic (7,4) code is shown in FIG. 2. Connections between code nodes X₀ to X₆ and check nodes Z₀ to Z₂ are determined by positions of nonzero coefficients (ones) in the parity-check matrix H shown in equation (2).

[0085] The Tanner graph associated with the extended parity-check matrix H_(e) will be described while referring to FIGS. 3(a), 3(b), and 4. FIG. 3(a) shows connections between a generic check node and its parent code nodes, and FIG. 3(b) shows connections between a generic code node and its children check nodes, in the Tanner graph associated with the extended parity-check matrix H_(e) of a cyclic code (0≦m≦n), wherein the labels are modulo n. FIG. 4 shows the Tanner graph associated with the extended parity-check matrix H_(e) shown in equation (3) for the binary cyclic (7,4) Hamming code.

[0086] The connections between a particular check node z_(j) (j=0, 1, . . . , n−1) and its parent code nodes x_(i1), X_(i2), . . . , X_(iw) _(r) in the Tanner graph associated with the extended parity-check matrix H_(e) are denoted by z_(j)→{x_(i1), x_(i2),Λ, x_(iw) _(r) }. It follows from the cyclic structure of the extended parity-check matrix H_(e) that the connections for the next check node Z_(j+1) are denoted as z_(j+1)→{x_(i1+1),x_(i2+1), Λ, x_(iw) _(r) ₊₁}, where the labels are taken modulo n. Consequently, as shown in FIG. 3(a), generic connections between any check node Z_(j+)λ and its parent code nodes can be denoted by:

z _(j+λ) →{x _(i1+λ) ,x _(i2+λ) , Λ, x _(iw) _(r) _(+λ)}, for 0≦λ<n.

[0087] These connections between any check node (j) and its parent code nodes can be specified by the nonzero coefficients of the parity-check polynomial x^(j)h(x). Said differently, the connections from all check nodes to all code nodes are specified by the nonzero coefficients in the n-number of cyclic shifts of the parity-check polynomial h(x).

[0088] Similarly, connections between a particular code node x_(i) and its children check nodes z_(j1), z_(j2), . . . , z_(jw) _(c) are denoted by x_(i)→{z_(j1), z_(j2), Λ, z_(jw) _(c) }. As shown in FIG. 3(b), connections between any code node X_(i+λ)and its children check nodes are generically denoted by:

x _(i+λ) →{z _(j1+λ) , x _(j2+λ) , Λ, z _(jw) _(c) _(+λ)}, for 0≦λ<n.

[0089] This is because the extended parity-check matrix H_(e) has the special property that all the entries are the coefficients of all distinct cyclic shifts, that is, n-number of cyclic shifts, of the parity-check polynomial h(x) in reverse order. Therefore, connections from any code node (i) to its children check nodes can be specified by the nonzero coefficients of the parity-check polynomial x^(i+n−1) h(x⁻¹). Said differently, connections from all code nodes and check nodes can be specified by the nonzero coefficients of the n-number of cyclic shifts of the polynomial x^(n−1) h(x⁻¹).

[0090] The information exchange control unit 5 exchanges ^(π)z-, ^(π)x-, ^(λ)z-, and ^(λ)x-metrics between the X-processor 4 and the Z processor 6, in the manner described for exchanging information between code nodes and check nodes of the Tanner graph associated with the extended parity-check matrix H_(e), wherein the X-processor 4 functions as the code nodes and the Z processor 6 functions as the check nodes. That is, the information exchange control unit 5 takes the πx-metrics that were calculated by the X processor 4 for nonzero elements x_(i1+λ), x_(i2+λ), . . . , X_(iw) _(r) _(+λ) in each shiftλ:0≦λ≦n−1 of the n-cyclic shifts of the parity-check polynomial h(x), and distributes them to the Z processor 6 as the πz-metrics for a corresponding check node z_(j+λ). The information exchange control unit 5 takes the λz-metrics that were calculated by the z processor 6 for nonzero elements z_(j1+λ), z_(j2+λ), . . . , z_(jw) _(c) _(+λ) in each shift λ:0≦λ≦n−1 of n-cyclic shifts in a reverse order of the parity-check polynomial h(x), and distributes them to the X processor 4 as λx-metrics for the corresponding code node x_(i+λ).

[0091] The information exchange control unit 5 determines the n-cyclic shifts of the parity-check polynomial h(x) by multiplying successive ones of x⁰ to x^(n−1) times the parity-check polynomial h(x) and determines the n-cyclic shifts in the reverse order of the parity-check polynomial h(x) by multiplying successive ones of x⁰ to x^(n−1) times the reciprocal h⁻¹(x) (x^(n) h(x⁻¹)) of the parity-check polynomial h(x).

[0092] As noted previously, the (n-k)-by-n parity-check matrix of an (n,k) binary cyclic code has columns with very low Hamming weights, that is, with only one nonzero element. For example, the first and last two columns of the parity-check matrix H of the equation (2) have only one nonzero entry. This means that iterative decoding based on belief propagation will not work on the associated Tanner graph.

[0093] However, because the extended parity-check matrix H_(e) is produced by extending the parity-check matrix H by k rows, the Hamming weight of the columns is increased. That is, the extended parity-check matrix H_(e) of a cyclic code C has Hamming weights w_(c) in each column, and Hamming weights w_(r) in each row, that are equal to the Hamming weight w_(h) of the parity-check polynomial h(x) where:

[0094] w_(h)=|{i;h_(i)≠0,0≦i≦k}|, |S|=the number of elements in a set S. For example, the extended parity-check matrix H_(e) of equation 3 for the cyclic (7,4) Hamming code has Hamming weights w_(r)=w_(c)=w_(h)=4.

[0095] Increasing the weight of the columns in this way means that code symbols are involved in more check equations, so that iterative decoding based on belief propagation will perform better.

[0096] Moreover, the additional k rows of the extended parity-check matrix H_(e) are linearly dependent on the first n-k rows, so that the dimension of the code remains the same. That is, the Hamming weight of the columns is increased without increasing the density of the parity-check matrix. The density of a parity-check matrix is the number of nonzero entries divided by the total number of entries, and it is known that codes with low density parity-check matrices perform better in iterative decoding based on belief propagation. Because the column weights are increased without increasing the density, iterative decoding based on belief propagation will perform better on the Tanner graph associated with the extended parity-check matrix H_(e) than that associated with the parity-check matrix H.

[0097] Here, operation of the decoder 1 will be described in more detail. First, for i ε {0, 1, . . . , n−1} and j ε {0, 1, . . . , J−1}, the information exchange control unit 5 initializes metrics π_(x)(i,j) to the LLR(i) values from the scaler 3, and metrics λ_(z)(i,j) to zero. Then, for i ε {0, 1, . . . , n−1}, the information exchange control unit 5 initializes index sets I_(x)(i), I_(z)(i), which are used to determine destination nodes during information exchange, to zero.

[0098] Next, for i ε {0, 1, . . . , n−1}, the information exchange control unit 5 propagates the metrics in the following manner. Although not shown in FIG. 1, the information exchange control unit 5 includes a check node memory for holding π-metrics and a code node memory for holding λ-metrics.

[0099] For X (code node)-to-Z (check node) propagation, for j ε {0, 1, . . . , J−1} the information exchange control unit 5 loads π-metrics in the check node memory: π_(z)(Px(i,j), I_(x)(Px(i,j)))=π_(x)(i,j), I_(x)(Px(i,j))=I_(x)(Px(i,j))+1, wherein Px(i,j) is an integer representing a link from code node x_(i) to check node Px(i,j).

[0100] Px(i,j) represents the i-th cyclic shift (to the right) of the parity-check polynomial h(x). The value of j serves to index the nonzero coefficients of the parity-check polynomial, which in turn determine the connections between a code node i and a check node. There are J-number of check nodes connected to each code node, and consequently the value of j ranges from 0 to J−1. Also, equivalently, in terms of the extended parity-check matrix H_(e), i is the row index and j is an index to the j-th nonzero element in that row. For each code node i, the value of Px(i,j) ranges from 0 to n−1, and value of Px(i,j) is used to point to check nodes.

[0101] For Z (check node)-to Y (code node) propagation, for j ε {0, 1, . . . , J−1} the information exchange control unit 5 loads λ-metrics in the code node memory: λ_(x)(Pz(i,j),Iz(Pz(i,j)))=λ_(z)(i,j), I_(z)(Pz(i,j))=I_(z)(Pz(i,j))+1, wherein Pz(i,j) is an integer representing a link from check node z_(i) to code node Pz(i,j).

[0102] The value Pz(i,j) is defined similarly to the value Px(i,j). The value Pz(i,j) functions to determine connections between a check node i and the J code nodes it is connected to. In terms of the extended parity-check matrix H_(e), i is the column index and j is the index of the j-th nonzero element.

[0103] As a result, the Z processor 6 receives n-sets of metrics πz(i,j) (where 0≦j≦J−1), each set including J-number of metrics πz(i,j) (that is {overscore (π)}_(z)(i)Δ(π_(z)(i,0), . . . , π_(z)(i,J−1)), from the information exchange control unit 5. The Z processor 6 calculates n-sets of metrics λz(i,j), each set including J-number of metrics λz(i,j) (that is, {overscore (λ)}_(z)(i)Δ(λ_(z)(i,0), . . . , λ_(z)(i, J−1), based on the metrics πz(i,j).

[0104] The Z processor 6 computes for i ε {0, 1, . . . , n−1} the metrics λz(i,j) based on the following formula:

λ_(z)(i,j)=(−1)^(δ⊕sgn(π) ^(_(z)) ^((i,j)))(S−F _(Q)(|π_(z)(i,j)|))  (4)

[0105] wherein:

[0106] sgn(x)=1 if x<0, and equals 0 if x≧0;

[0107] |x| denotes the absolute value (or magnitude) of x; $\begin{matrix} {{S = {\left( {- 1} \right)^{\delta}{\sum\limits_{j = 0}^{J - 1}{F_{Q}\left( \left| {\pi_{z}\left( {i,j} \right)} \right| \right)}}}},} & (5) \end{matrix}$

[0108] δ=(−1)^(⊕) ^(_(j−c)) ^(J−1) ^(sgn(π) ^(_(z)) ^((i,j)), and

[0109] F_(Q) (x) denotes a quantized version of the function F(x)=log[(e^(x)+1)/(e^(x)−1)].

[0110] The decoder 1 can achieve practically the same error performance as with no quantization, much more easily when the Z processor 6 computes the metrics λz(i,j) using the quantized version F_(Q) (x) indicated below. FIG. 5 shows the function F(x) in comparison with the quantized version F_(Q) (x): ${F_{Q}(x)} = \left\{ \begin{matrix} {5.00,} & {\quad {{0 \leq x \leq 0.10};}} \\ {2.25,} & {\quad {{0.10 \leq x \leq 0.35};}} \\ {1.50,} & {\quad {{0.35 \leq x \leq 0.60};}} \\ {1.00,} & {\quad {{0.60 \leq x \leq 0.90};}} \\ {0.75,} & {\quad {{0.90 \leq x \leq 1.20};}} \\ {0.50,} & {\quad {{1.20 \leq x \leq 1.60};}} \\ {0.30,} & {\quad {1.60 \leq x \leq 2.30}} \\ {0.10,} & {\quad {2.30 \leq {x.}}} \end{matrix} \right.$

[0111] The X processor 4 receives the log-likelihood ratios LLR(i) from the scaler 3, and uses them and λx(i,j) metrics (wherein {overscore (λ)}_(x)(i)Δ(λ_(x)(i,0), . . . , λ_(x)(i,J−1)) from the information exchange control unit 5 to compute, for i ε {0, 1, . . . , n−1}, metrics πx(i,j) (wherein{overscore (π)}_(x)(i)Δ(π_(x)(i,0), . . . , π_(x)(i,J'1)) and the n-number of estimated code bits

_(i). The X processor determines the n-number of estimated code bits

_(i) after the fixed number of iterations received from the input unit 2.

[0112] As shown in FIG. 6, the X processor 4 includes an a-posteriori values q (i) calculator 10, a metrics πx(i,j) calculator 11, and an estimated code bit

_(i) determiner 12. The a-posteriori values q (i) calculator 10 receives n-sets of metrics λx(i,j), each set including J-number of metrics λx(i,j), from the information exchange control unit 5, and calculates n-number of a-posteriori values q(i), which are the posteriori log-likelihood ratio of a code symbol (“soft output”). The a-posteriori values q (i) calculator 10 calculates the a-posteriori values q(i) based on the metrics λx(i,j) and the log-likelihood ratios LLR(i) from the scaler 3, as represented by the following formula: $\begin{matrix} {{q(i)} = {{\sum\limits_{j = 0}^{J - 1}{\lambda_{x}\left( {i,j} \right)}} + {{LLR}(i)}}} & (6) \end{matrix}$

[0113] The πx(i,j) metrics calculator 11 calculates n-sets of metrics πx(i,j), each set including J-number of metrics πx(i,j), based on the metrics λx(i,j) and the a-posteriori values q(i). In particular, the πx(i,j) metrics calculator 11 calculates the metrics πx(i,j) based on the following formula:

π_(x)t(i, j)=q(i)−λ_(x)(i, j)  (7)

[0114] The X and Y processors 4, 6 calculate the metrics, and the information exchange control unit 5 distributes the metrics, for the fixed number of iterations N_(iter). Because the number of iterations is fixed, decoding delay is constant. This facilitates hardware implementation, because no buffers are needed when data is delivered to the destination (or to the source decoder) at a constant rate. Alternatively, iterations can be stopped when a maximum number of iterations is reached, instead of according to an input fixed number. However, in this case, the decoding delay is variable and also a set of stopping rules are needed.

[0115] Once the number of iterations have been performed, for i ε {0, 1, . . . , n−1} the estimated code bit

_(i) determiner 12 determines n-number of estimated code bits

_(i) based on the a-posteriori values q(i) from the a-posteriori values q (i) calculator 10. In particular, the estimated code bit

_(i) determiner 12 determines the n-number of estimated code bits as the sign bit of the LLRs based on the following formula:

_(i) =sgn(q(i))  (8)

[0116]FIG. 7 shows simulation results of iterative decoding of the (7,4) Hamming code, with 4 iterations, when decoding is performed in the manner of the decoder 1, indicated as H_(e), compared to decoding performed in the manner represented by the Tanner graphs associated with the parity-check matrix H. As a reference, FIG. 7 also shows the union bound (UB) on the bit error rate of this code with maximum-likelihood decoding (MLD).

[0117] FIGS. 8 to 10 show results of computer simulations of decoding binary cyclic codes in the manner of the decoder 1. In all cases, metrics were distributed based on the cyclic shift, and the reverse order of the cyclic shift, of the parity-check polynomial. Iterative decoding based on Pearl's algorithm, using log-likelihood ratios and floating-point precision, was implemented as a C program.

[0118]FIG. 8 shows simulation results for the binary BCH (15,11) code, FIG. 9 shows simulation results for the binary BCH (15,7,5) code, and FIG. 10 shows simulation results for the binary BCH (15,5,7) code. As a reference, the union bounds on the bit error rate achieved by maximum-likelihood decoding (MLD), based on the weight distributions of the codes, are also shown for these codes.

[0119]FIG. 11 shows simulation results of iterative decoding of the binary (273,191) difference-set (DS) code. This is a binary projective geometry (PG) code introduced by Kou et al in a presentation entitled Low density parity Check Codes Based on Finite Geometries: A Rediscovery and More, presented at the AECC-13 Conference, Honolulu, Hawaii, November 1999. The binary (273,191) difference-set (DS) code has unknown weight distribution and thus no union bound is plotted in FIG. 11.

[0120] By comparing the results of FIGS. 8 to 11, it can be seen that the iterative procedure for the BCH (15,5,7) code of FIG. 10 converges very slowly. Extensive simulations of other cyclic codes revealed iterative decoding converges to maximum-likelihood decoding very fast, that is, in a few iterations, for high rate codes, but in many cases very slowly for medium to low rate codes.

[0121] Next, example configurations for the iterative decoder 1 based on belief propagation according to the embodiment will be described while referring to FIGS. 12 to 18. FIG. 12 shows a serial decoder 10 according to a first example of the embodiment. The decoder 10 includes a scaler 30, an LLR buffer 35, an X processor 40, a buffer 45, an X-to-Z propagation unit 50A, a Z processor 60, and a Z-to-X propagation unit 50B. FIG. 13 shows details of the configuration of the X processor 40, and FIG. 14 shows details of the configuration of the Z processor 60.

[0122] The X-to-Z propagation unit 50A includes a π RAM controller 51 and a π RAM 52. The π RAM controller 51 includes an X-to-Z address generator 51 a. According to the present embodiment, the X-to-Z address generator 51 a is a circular buffer as shown in FIG. 15(a).

[0123] The Z-to-X propagation unit 50B includes λ RAM controller 53 and a λ RAM 54. The λ RAM controller 53 includes a Z-to-X address generator 53 a. According to the present embodiment, the Z-to-X address generator 53 a is a circular buffer as shown in FIG. 15(b).

[0124] Next, an example will be provided for operations in the serial decoder 10. In this example, the decoder 10 receives, from across a noisy channel, a data stream encoded according to the binary cyclic (7,4) Hamming code, that is, encoded using the parity-check matrix H. Accordingly, the decoder 10 receives a vector of the noisy received values r0 . . . r6, and input of code length 7 and of the parity-check polynomial h(x)=1+x+x²+x⁴. The noisy received values r0 . . . r6 are input to the scaler 30, the parity-check polynomial h(x)=1+x+x²+x⁴ is input to the X-to-Z propagation unit 50A and the Z-to-X propagation unit 50B, and the code length 7 is input to all components.

[0125] During initialization the π RAM 52 and the λ RAM 54 are organized into a 4-by-7 array by the π RAM controller 51 and the λ RAM controller 53, respectively, because the parity-check polynomial h(x) has four (J=4) non-zero coefficients and because the code length is seven (n=7).

[0126] The scaler 30 multiplies each noisy received value r0 . . . r6 by the constant 4/No (=2/σ²), thereby obtaining log-likelihood ratios LLR(0)-LLR(6) (LLR(i), where i=0, . . . 6). The log-likelihood ratios LLR(0)-LLR(6) are stored in the LLR buffer 35.

[0127] Next, all the metrics πx(i,j) in the π RAM controller 51 are initialized to LLR(i). For example, when i=0, the four metrics πx(0,j: where j=0-3) are initialized to LLR(0). All the metrics λz(i,j) (where i=0-7, j=0-3) in the λ RAM controller 53 are initialized to zero.

[0128] After initialization, as shown at the top of FIG. 15(a), the X-to-Z address generator 51a of the π RAM controller 51 generates addresses for the π RAM 52 that correspond to the parity-check polynomial h(x)=1+x+x²+x⁴. The π RAM controller 51 distributes the metrics πx(0,j)-πx(6,j) (that is, LLR(0)-LLR(6)) in the π RAM 52 according to these addresses. That is, the first column (i=0) of the π RAM 52 corresponds to the parity-check polynomial h(x)=1+x+x²+x⁴, and therefore to the first row of the extended parity-check matrix H_(e) of equation (3). Non-zero coefficients appear in the positions of i=0, 1, 2, and 4 in the first row of the extended parity-check matrix H_(e) of equation (3) . Accordingly, the π RAM controller 51 stores metrics πx(0,0), πx(1,0), πx(2,0), πx(4,0) in this order in the first column of the π RAM 52, in association with indexes I of 0-3, respectively.

[0129] Next, as shown in the second portion of FIG. 15(a), the X-to-Z address generator 51 a generates addresses for the π RAM 52 that correspond to the parity-check polynomial xh(x), because the second column (i=1) of the π RAM 52 corresponds to the parity-check polynomial xh(x), which is represented by the second row of the extended parity-check matrix H_(e) of equation (3). Non-zero coefficients appear in the positions of i=1, 2, 3, and 5 in the second row of extended parity-check matrix H_(e) of equation (3). That is, the positions of the non-zero coefficients are cyclically shifted from the positions for the first row. Accordingly, the π RAM controller 51 stores the metrics πx(1,1), πx(2,1), πx(3,0), πx(5,0) in this order in the second column of the π RAM 52, with the indexes I of 0-3.

[0130] While the X-to-Z address generator 51 a generates address according to cyclical shifts in the parity-check polynomial h(x) as shown in FIG. 15(a), the π RAM controller 51 distributes the metrics πx(i,j) to third through sixth columns (i=2-6) of the π RAM 52 in the same manner as described above for the first and second columns. The operation of the X-to-Z address generator 51 a shown in FIG. 15(a) corresponds to changes in the value Px(i,j) . As a result, the 4-by-7 array of the π RAM is stored with the metrics πx(i,j) as shown in FIG. 16. The metrics πx(i,j) in the π RAM 52 are then sent to the Z processor 60 as metrics πz(i, j). Using the first column (i.e., i=0) of the π RAM 54 in FIG. 16 as an example, the metrics πx(0, 0), πx(1, 0), πx(2, 0), and πx(4, 0) are sent to the X processor 40 as metrics πz(0, 0), πz(0, 1), πz(0, 2), and πz(0, 3).

[0131] Next, the Z processor 60 uses the values (i, j) in the i-th column and on the j-th row of the π RAM 52 as π z(i,j; where i=0 to 6 and J=0 to 3) to compute λz(i,j) using the equation (4). For example, the Z processor 60 uses the four values in the first column i=0 in the π RAM 52 as πz(0, j; where j=0 to 3) to calculate λz(0, 0), λz(0, 1), λz(0, 2), and λz(0, 3).

[0132] As shown at the top of FIG. 15(b), the Z-to-X address generator 53 a of the λ RAM controller 53 generates addresses for the λ RAM 54 that correspond to the parity-check polynomial x⁷h(x⁻¹). The λ RAM controller 53 loads the λz(i, j) metrics (i=0-6, j=0-3) in the λ RAM 54 according to these addresses. That is, the first column (i=0) of the λ RAM 54 corresponds to the parity-check polynomial x⁷h(x⁻¹) and therefore to the first column of the extended parity-check matrix H_(e) of equation (3). Non-zero coefficients appear in the positions of i=0, 3, 5, and 6 in the first column of the extended parity-check matrix H_(e) of equation (3). Accordingly, the λ RAM controller 53 stores the λz(0,0), λz(3,0), λz(5,0), λz(6,0) in this order in the first column of the λ RAM 54, in association with the index I of (0)-(3).

[0133] Next, as shown in the second portion of FIG. 15(b), the X-to-Z address generator 53 a generates addresses for the λ RAM 54 that correspond to the parity-check polynomial x⁸h(x⁻¹), because the second column (i=1) of the λ RAM 54 corresponds to the parity-check polynomial x⁸h(x⁻¹), which is represented by the second column of the extended parity-check matrix H_(e) of equation (3). Non-zero coefficients appear in the positions of i=0, 1, 4, and 6 in the second column of the extended parity-check matrix H_(e) of equation (3). That is, the positions of the non-zero coefficients are cyclically shifted from the positions for the first column of the extended parity-check matrix H_(e) of equation (3) Accordingly, the λ RAM controller 53 stores the λz(0,1), λz(1,0), λz(4,0), λz(6,1) in this order in the second column of the λ RAM 54, with the index I of (0)-(3).

[0134] While the Z-to-X address generator 53 a generates addresses according to cyclic shifts in the parity-check polynomial x⁷h(x⁻¹) as shown in FIG. 15(b), the λ RAM controller 53 distributes the metrics λz(i, j) to other third through sixth columns (i=2-6) of the λ RAM 54 in the same manner as described above for the first and second columns. Operation of the Z-to-X address generator 53 a shown in FIG. 15(b) correspond to changes in the value Pz(i,j). As a result, the 4-by-7 array of the λ RAM 54 is stored with the metrics λz(i, j) as shown in FIG. 17. The metrics λz(i, j) in the λ RAM 54 are then sent to the X processor 40 as metrics λx(i, j). Using the first column (i.e., i=0) of the λ RAM 54 in FIG. 17 as an example, the metrics λz(0, 0), λz(3, 0), λz(5, 0), and λz(6, 0) are sent to the X processor 40 as metrics λx(0, 0), λx(0, 1), λx(0, 2), and λx(0, 3).

[0135] The decoder 10 performs second and subsequent iterative steps in the iterative process in the following manner. The X processor 40 uses the values in the i-th column and on the j-th row in the λ RAM 54 as metrics λx(i, j) where i=0-6, j=0-3 to compute a-posteriori values q(i) using the equation (6) and to compute the metrics πx(i, j) using the equation (7). For example, the X processor 40 uses the four values in the first column n=0 in the λ RAM 54 as metrics λx(0, j) where j=0-3 to compute a-posteriori value q(0) and to compute the metrics πx(0,j). The X-to-Z propagation unit 50A, the Z processor 60, and the Z-to-X propagation unit 50B all perform the same processes as described above in the first iterative step.

[0136] After iterations have been performed for the fixed number of iterations Niter, the X processor 40 determines estimated code bits ci (i=0-6) based on equation (8) and stores them in the buffer 45 for output. The X processor 40 also stores the soft output values q(i) in the buffer 45 for output. The soft output values q(i) indicate the reliability of decoded bits. That is, the larger the magnitude of the absolute value of q(i), the more reliable the bit is. The values of q(i) are used in feeding back information to a demodulator (not shown) of the decoder.

[0137]FIG. 18 shows a parallel decoder 100 according to a second example of the embodiment. The decoder 100 includes n-number of X-processors 400 ₀ to 400 _(n−1), n-number of Z-processors 600 ₀ to 600 _(n−1), and an address computation unit (ACU) 500, all connected to a λ bus 503 and a π bus 504. Registers 505 ₀ to 505 _(n−1) are provided, one in connection with each of the X-processors 400 ₀ to 400 _(n−1). The registers 505 ₀ to 505 _(n−1) correspond to the different columns of the λ RAM 54 of the serial decoder 10. Similarly, registers 506 ₀ to 506 _(n−1) are provided, one in connection with each of the Z-processors 600 ₀ to 600 _(n−1). The registers 506 ₀ to 506 _(n−1), correspond to the different columns of the π RAM 52. The ACU 500 includes an X-to-Z address generator 501 and a Z-to-X address generator 502, that function basically the same as the X-to-Z address generator 51 a and the Z-to-X address generator 53 a, respectively, of the first example. It can be readily understood that each of the X and Z processors correspond to one of the nodes in the Tanner graph associated with the extended parity check matrix H_(e) produced by the N-number of cyclic shifts of the inputted parity-check polynomial, with connections between the nodes determined by the ACU 500.

[0138] The serial decoder 10 requires less hardware than the parallel decoder 100, but the parallel decoder 100 is faster than the serial decoder 10. Table 1 summarizes the parameters of these two example configurations. TABLE 1 Cycles per Number of Number of Example Iteration Processors Memory Elements First Example 2n 2 (2n × J + 2n) × N_(q) (Serial) Second Example 2 2n (2n × J + 2n) × N_(q) (Parallel)

[0139] In Table 1, N_(q) denotes the number of quantization bits used for the metrics. In determining the required number of memory elements, it is assumed that all the metrics in the decoder, that is, the a-priori LLR from the channel, the a-posteriori LLR q(i), and the π and λ metrics, are represented with the same number of bits.

[0140] Next, a modification of the embodiment will be explained. According to this modification, preliminary hard decisions are made based upon the a-posteriori log-likelihood ratios q(i) of the incoming channel symbols. The hard decision values are kept fixed throughout the decoding process. This increases the throughput of the decoder, while reducing its complexity, without a significant increase in decoding errors.

[0141] Assume binary transmission over an AWGN channel. Then a received symbol is given by r_(i)=sgn(r_(i)) |r_(i)|. The reliability of a symbol r_(i) is defined as its magnitude rel_(z) Δ|r_(i)|. According to this modification, a received symbol whose reliability exceeds a given threshold T, that is, rel_(i)>T, is judged to be highly reliable, and the code node associated with the symbol is selected as a highly reliable position (HRP). Hard decisions are made on received symbols judged to be highly reliable. The hard decision of a symbol r_(i) is defined as

_(i)=sgn(r_(i)).

[0142] Once a set of highly reliable positions (code nodes) is selected and the corresponding received symbols are fixed to their hard decision (HD) values, then the maximum absolute value|π_(MAX)| of metrics π_(x)(i,j) (0≦j≦J−1) is outputted from the code node configuration (i.e., from the X processor 6), along with the sign of the received channel value as the estimated code bit

_(i)=sgn(LLR(i)). In other words, the configuration associated with the code node of highly reliable positions is not used in the decoding process. As a result, the check node configuration (i.e., the Z processor 6) performs fewer addition computations when adding F(||) values together to calculate the total sum S, because some of the inputted values are presumed to be highly reliable. This is because, from the definition of the F(x), we have that F(|π_(MAX)|)=0. In practice, with the quantized function, the value F_(Q)(|π_(MAX)|)=0.1 is fixed for the HRP and used throughout the iterative process.

[0143] Because the check node configuration (i.e., the Z processor 6) does not need to compute metrics associated with the highly reliable positions for input to the code node configuration, (i.e., the X-processor 4), fewer computations are required in terms of message passing and metric computation. With respect to message passing, there is no need to pass the metrics λ_(z) from the corresponding check node configuration, because the metrics λ_(x) for the code node configuration relating to the highly reliable positions are fixed. With respect to metric computation, there is no need to include their π-metrics in the computation of the λ-metrics in the check node configuration, because of the high reliability of the highly reliable positions in the code node configuration. Instead, in the λ-metric computation of equations (4) and (5), the smallest value of F_(Q)(x) is always used for the highly reliable positions.

[0144] As a result, operations relating to message passing and metric computation of the highly reliable positions can be greatly reduced. This is particularly true if the channel conditions are good, that is, if the noise power level N₀ is low. In message passing, the X-to-Z propagation for the code node configuration remains the same. However, as mentioned before, the Z-to-X propagation from check node configuration to code node configuration in highly reliable positions are not needed because their values have been decided in advance. This step, for i=0,1, . . . , n−1, is modified so that for j ε {0, 1, . . . , J−1}, and Pz(i,j) ∉ L, wherein L is the set of indices of highly reliable positions, λ-metrics are loaded in the code node memory in the following manner:

λ_(x)(Pz(i,j),I _(z)(Pz(i,j)))=λ_(z)(i,j), I _(z)(Pz(i,j))=I _(z)(Pz(i,j))+1

[0145] Using the example of FIG. 17, when n=0 is designated as a highly reliable position, then the metrics λz(0, 0), λz(3, 0), λz(5, 0), and λz(6, 0) will not be sent to the X processor 40 as metrics λx(0, 0), λx(0, 1), λx(0, 2), and λx(0, 3).

[0146]FIG. 19 shows how different thresholds T for indicating highly reliable positions affects the error performance of iterative decoding of the binary BCH (15,7,5) code with 4 iterations. As a comparison, the bit error rate with hard decision decoding using the well known Berlekamp-Massey (bm) algorithm, and the union bound (UB) are also shown. As can be seen, a threshold value T=1.0 achieves excellent performance, that is, a bit error rate of 10⁻⁴ at only 0.17 dB away from the performance of iterative decoding without highly reliable positions. In other words, on the average 50% of the positions can be designated as highly reliable, and still achieve excellent performance. In addition, note that a threshold value of T=1.5 results in practically the same performance as if no symbols are considered highly reliable and, depending on the noise power spectral density N₀, includes up to 30% of the positions as highly reliable.

[0147]FIG. 20 shows how different thresholds T influence the average percentage of positions judged to be highly reliable positions in a received word for the binary BCH(15,7,5) code.

[0148] Instead of using a threshold to judge whether positions are highly reliable, a predetermined number N_(hard) of the received symbols with the highest reliabilities can be judged as highly reliable. However, this requires “fine tuning” on a code-by-code basis, in order to determine the best values of N_(hard). For implementation purposes, the threshold method is preferred, because fixing the number of HRP implies an ordering of the received channel reliability values, which increases the complexity of the iterative decoder.

[0149] While the invention has been described in detail with reference to specific embodiments thereof, it would be apparent to those skilled in the art that various changes and modifications may be made therein without departing from the spirit of the invention, the scope of which is defined by the attached claims.

[0150] For example, instead of inputting the parity-check polynomial to the decoder, the structure of matrix H_(e) can be directly input to the decoder. However, this requires n×J integers, or n×J×log₂n bits.

[0151] Also, in the embodiment, decoding parameters such as the parity-check polynomial h(x), the code length, positions of the coefficients of the parity-check polynomial, and the Hamming weights of the parity-check polynomial are transmitted in a header from the transmitter that includes the encoder. However, the decoding parameters could be transmitted as side information in a secondary channel. Alternatively, a processor of the receiver that includes the decoder could try all possible decoding parameters until the number of decoded bit errors falls below a certain threshold.

[0152] The embodiment describes the invention applied to a decoder for decoding binary cyclic codes. However, the invention could be applied to a decoder for decoding nonbinary cyclic codes instead. Although, memory requirements would be substantially higher, an iterative decoder for nonbinary codes would be relatively simple to implement. 

What is claimed is:
 1. A decoder for decoding a data stream transmitted across a noisy channel into estimated bits, the data stream being encoded according to a cyclic code into a plurality of code words in sequence, the decoder comprising: input means for receiving input of a vector of noisy received values r(i) (where 0≦i≦n−1) of the data stream, a code length n of the code words, and a parity-check polynomial h(x) corresponding to the cyclic code, the parity-check polynomial h(x) having J-number of nonzero coefficients; a scaler for multiplying each noisy received value r(i) by a constant, and outputting each product as a log-likelihood ratio LLR(i); a Z processor for: receiving n-sets of πz(i,j) metrics (where 0≦j≦J−1), each set including J-number of πz(i,j) metrics; and calculating n-sets of λz(i,j) metrics based on the πz(i,j) metrics, each set including J-number of λz(i,j) metrics; an X processor for: receiving n-sets of λx(i,j) metrics, each set including J-number of λx(i,j) metrics, calculating n-number of a-posteriori values q(i) based on the λx(i,j) metrics and the log-likelihood ratios LLR(i); calculating n-sets of πx(i,j) metrics based on the λx(i,j) metrics and the a-posteriori values q(i), each set including J-number of πx(i,j) metrics; and determining n-number of estimated code bits

_(i) based on the a-posteriori values q(i); and an information exchange control unit for: distributing the πx(i,j) metrics based on a cyclic shift of the parity-check polynomial h(x) to produce the πz(i,j) metrics; and distributing the λz(i,j) metrics based on a reverse order of the cyclic shift of the parity-check polynomial h(x) to produce the λx(i,j) metrics.
 2. A decoder as claimed in claim 1, further comprising: a π RAM connected to an output of the X processor and an input of the Z processor, the information exchange control unit organizing the π RAM into a J-by-n array with J columns and n rows based on the inputted code length n and the inputted parity-check polynomial h(x), the information exchange control unit distributing the πx(i,j) metrics from the X processor into the π RAM based on the cyclic shift of the parity-check polynomial h(x) and transferring to the Z processor the J-number of πx(i,j) metrics in each column of the π RAM as one of the n-sets of πz(i,j) metrics; and a λRAM connected to an output of the Z processor and an input of the X processor, the information exchange control unit organizing the λRAM into a J-by-n array with J columns and n rows based on the inputted code length n and the inputted parity-check polynomial h(x), the information exchange control unit distributing the λz(i,j) metrics from the Z processor into the λRAM based on the reverse order of the cyclic shift of the parity-check polynomial h(x) and transferring to the X processor the J-number of λz(i,j) metrics in each column of the λRAM as one of the n-sets of λx(i,j) metrics.
 3. A decoder as claimed in claim 1, further comprising a bus connecting the Z processor, the X processor, and the information exchange control unit to each other, the Z processor including n-number of Z_(i) processors each connected to the bus with an individual address, the X processor including n-number of X_(i) processors each connected to the bus with an individual address, the information exchange control unit including an address computation unit for transferring, across the bus, the πx(i,j) metrics from the X_(i) processors as πz(i,j) metrics to Z_(i) processors determined based on the cyclic shift of the parity-check polynomial h(x) and the λz(i,j) metrics from the Z_(i) processors as λx(i,j) metrics to X_(i) processors determined based on the reverse order of the cyclic shift of the parity-check polynomial h(x).
 4. A decoder as claimed in claim 1, wherein the Z processor computes the λz(i,j) metrics based on: λ_(z)(i, j)=(−1)^(δ⊕Sgn(π) ^(_(z)) ^((i,j)))(S−F _(Q)(|π_(z)(i, j)|))wherein: ${S = {\left( {- 1} \right)^{\delta}{\sum\limits_{j = 0}^{J - 1}{F_{Q}\left( \left| {\pi_{z}\left( {i,j} \right)} \right| \right)}}}},$

δ=(−1)^(⊕) ^(_(j−1)) ^(j=0) ^(sgn (π) ^(_(z)) ^((i,j))), and F_(Q) (x) denotes a quantized version of the function F(x)=log[(e^(x)+1)/(e^(x)−1)].
 5. An decoder as claimed in claim 2, wherein the Z processor computes the λz(i,j) metrics using the following quantized version F_(Q) (x) of the function F(x)=log[(e^(x)+1)/(e^(x)−1)]: ${F_{Q}(x)} = \left\{ \begin{matrix} {5.00,} & {\quad {{0 \leq x \leq 0.10};}} \\ {2.25,} & {\quad {{0.10 \leq x \leq 0.35};}} \\ {1.50,} & {\quad {{0.35 \leq x \leq 0.60};}} \\ {1.00,} & {\quad {{0.60 \leq x \leq 0.90};}} \\ {0.75,} & {\quad {{0.90 \leq x \leq 1.20};}} \\ {0.50,} & {\quad {{1.20 \leq x \leq 1.60};}} \\ {0.30,} & {\quad {1.60 \leq x \leq 2.30}} \\ {0.10,} & {\quad {2.30 \leq {x.}}} \end{matrix} \right.$


6. A decoder as claimed in claim 1, wherein the X processor calculates the a-posteriori values q(i) based on ${{q(i)} = {{\sum\limits_{j = 0}^{J - 1}{\lambda_{x}\left( {i,j} \right)}} + {{LLR}(i)}}},$

calculates the πx(i,j) metrics based on π_(x)(i,j)=q(i)−λ_(x)(i,j), and determines the n-number of estimated code bits based on

_(i)=sgn(q(i)).
 7. A decoder as claimed in claim 1, wherein the constant used by the scaler equals 4/spectral density No of the noisy channel.
 8. A decoder as claimed in claim 1, wherein the input means further receives input of a fixed number of iterations, the X processor determining the n-number of estimated code bits

_(i) after the fixed number of iterations.
 9. A decoder as claimed in claim 1, wherein the information exchange control unit performs the cyclic shifts of the parity-check polynomial h(x) by multiplying successive ones of x⁰ to x^(n−1) times the parity-check polynomial h(x) and performs the reverse order of the cyclic shifts of the parity-check polynomial h(x) by multiplying successive ones of x⁰ to x^(n−1) times the reciprocal h⁻¹(x) (x^(n)h(x⁻¹)) of the parity-check polynomial h(x).
 10. A decoder as claimed in claim 1, wherein in a first iteration the X processor makes preliminary hard decisions on the a-posteriori values q(i) to produce hard decision values for highly reliable positions, the information exchange control unit using the hard decisions when distributing the πx(i,j) metrics and the λz(i,j) metrics.
 11. A decoder as claimed in claim 10, wherein the Z processor makes the preliminary hard decisions based on whether a a-posteriori value q(i) exceeds a threshold T. 