Dmt symbol repetition in the presence of impulse noise

ABSTRACT

With the current initialization procedures defined in the VDSL and ADSL standards, even though the xDSL system could operate in Showtime in an impulse noise environment where symbols are being corrupted, the transceivers would not be able to reach Showtime because initialization would fail due to initialization message failure. Through the use of an improved initialization procedure for communication systems, operation in environments with higher levels of impulse noise is possible.

RELATED APPLICATION DATA

This application claims the benefit of and priority under 35 U.S.C. §119(e) to U.S. Patent Application No. 60/619,618, filed Oct. 15, 2004, entitled “xDSL Initialization in the Presence of Impulse Noise,” which is incorporated herein by reference in its entirety.

BACKGROUND

Field of the Invention

This invention generally relates to communication systems. More specifically, an exemplary embodiment of this invention relates to an initialization technique for communication systems. Another exemplary embodiment relates to error detection and correction during initialization.

Description of Related Art

Communication systems often operate in environments with impulse noise. Impulse noise is a short-term burst of noise that is higher than the normal noise that typically exists in the communication channel. For example, DSL systems operate on telephone lines and experience impulse noise from many external sources including telephones, AM radio, HAM radio, other DSL services on the same line or in the same bundle, other equipment in the home, etc. It is common practice for communication systems to use interleaving in combination with Forward Error Correction (FEC) to correct the errors caused by the impulse noise during user data transmission, i.e., SHOWTIME.

SUMMARY

Standard initialization procedures in xDSL systems, such as those specified in ADSL ITU G.992 standards and VDSL ITU G.993 standards, are designed to optimize performance, such as data rate/reach, in the presence of “stationary” crosstalk or noise. Impulse noise protection is handled with Interleaving/FEC during data transmission mode, known as “SHOWTIME” in ADSL and VDSL systems, but the current xDSL initialization procedures, also known as “training procedures,” are not designed to operate in an environment with high levels of impulse noise. As an example, there are several messages exchanged during initialization in ADSL and VDSL ITU standards that are not designed to work well in an environment with high levels of impulse noise. For example, in the ADSL2 G.992.3 standards, there are initialization messages such as R-MSG-FMT, C-MSG-FMT, R-MSG-PCB, C-MSG-PCB, R-MSG1, C-MSG1, R-MSG2, C-MSG2, R-PARAMS, C-PARAMS, etc., which use modulation techniques that do not provide high levels of immunity to impulse noise. Likewise, for example, in the VDSL1 G.993.1 standards, there are initialization messages such as O-SIGNATURE, O-UODATE, O-MSG1, 0-MSG2, O-CONTRACT, O-B&G, R-B&G, R-MSG1, R-MSG2, etc., which use modulation techniques that do not provide high levels of immunity to impulse noise. Additionally, G.994.1 (G.hs), which is used as part of the initialization procedure for most xDSL standards, uses modulation techniques that do not provide high levels of immunity to impulse noise. In particular, a receiver will not be able to correctly demodulate/decode the message information when only 1 DMT symbol is corrupted by impulse noise. This is especially problematic because xDSL systems are generally designed to be able to pass steady-state (“SHOWTIME”) data without errors in the presence of impulse noise by configuring a parameter called Impulse Noise Protection (INP). INP is defined in the ADSL2 and VDSL2 standards as the number of consecutive DMT symbols that, when completely corrupted by impulse noise, can be completely corrected by the receiver using FEC and interleaving during SHOWTIME. For example, if INP=2, then if 2 (or less) SHOWTIME DMT symbols are corrupted by impulse noise, the interleaving and FEC coding will be configured to be able to correct all the resulting bit errors. This means that with the current initialization procedures defined in the VDSL and ADSL standards, even though the xDSL system could operate in SHOWTIME in an impulse noise environment where 2 DMT symbols are being corrupted, the transceivers would not be able to reach SHOWTIME because initialization would fail due to initialization message failure.

Accordingly, an exemplary aspect of this invention relates to an improved initialization procedure for communication systems that operate in environments with higher levels of impulse noise.

More specifically, an exemplary aspect of this invention relates to an initialization sequence where the messages exchanged during initialization are designed to operate in environments with higher levels of impulse noise.

Additional exemplary aspects of the invention relate to repeating DMT symbols within initialization messages.

Additional exemplary aspects of the invention relate to duplicating and repeating DMT symbols within initialization message(s).

Additional exemplary aspects of the invention relate to copying and repeating DMT symbols within initialization message(s).

Additional exemplary aspects of the invention relate to repeating the transmission of DMT symbols that are used to modulate initialization message information bits to correctly receive the messages in an environment with impulse noise.

Further exemplary aspects of the invention relate to using forward error correction to encode and decode initialization messages during initialization.

Aspects of the invention further relate to using forward error correction and interleaving to encode and decode initialization messages during initialization.

Still further aspects of the invention relate to using error detection techniques such as Cyclic Redundancy Checksum (CRC) on portions of an initialization message during initialization.

Additional exemplary aspects of the invention relate to using error detection techniques, such as CRC on portions of the bits in an initialization message to correctly determine which DMT symbols are corrupt.

Aspects of the invention also relate to utilizing error detection techniques, such as CRC, on portions of the bits in an initialization message to determine which bits are in error in a long message.

Aspects of the invention also relate to analyzing initialization message length to dynamically determine the type(s) of initialization message error detection and correction to be used.

Further aspects of the invention relate to using error detection techniques, such as CRC, on portions of the bits in an initialization message and message retransmission to correctly receive messages during initialization.

Additional exemplary aspects of the invention also relate to utilizing error detection techniques such as CRC on portions of the bits in any message or signal to determine which DMT symbols are corrupted by impulse noise during initialization.

Additional exemplary aspects of the invention relate to transmitting and/or receiving repeated DMT symbols with at least one CRC bit on each DMT symbol.

These and other features and advantages of this invention are described in, or are apparent from, the following detailed description of the exemplary embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

The exemplary embodiments of the invention will be described in detail, with reference to the following figures wherein:

FIG. 1 is a functional block diagram illustrating an exemplary embodiment of this invention;

FIG. 2 is a flowchart outlining an exemplary embodiment for initializing a communication system according to this invention; and

FIG. 3 is a flowchart outlining a second exemplary embodiment for initializing a communication system according to this invention;

FIG. 4 is a flowchart outlining a third exemplary embodiment for initializing a communication system according to this invention;

FIG. 5 is a flowchart outlining a fourth exemplary embodiment for initializing a communication system according to this invention; and

FIG. 6 is a flowchart outlining a fifth exemplary embodiment for initializing a communication system according to this invention;

DETAILED DESCRIPTION

The exemplary embodiments of this invention will be described in relation to initialization in a wired and/or wireless communications environment, such as a DSL communication system. However, it should be appreciated, that in general, the systems and methods of this invention will work equally well for any type of communication system or protocol in any environment.

The exemplary systems and methods of this invention will also be described in relation to multicarrier modems, such as DSL modems and VDSL modems, and associated communications hardware, software and communication channels. However, to avoid unnecessarily obscuring the present invention, the following description omits well-known structures and devices that may be shown in block diagram form or otherwise summarized.

For purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the present invention. It should be appreciated however that the present invention may be practiced in a variety of ways beyond the specific details set forth herein.

Furthermore, while the exemplary embodiments illustrated herein show the various components of the system collocated, it is to be appreciated that the various components of the system can be located at distant portions of a distributed network, such as a telecommunications network and/or the Internet, or within a dedicated secure, unsecured and/or encrypted system. Thus, it should be appreciated that the components of the system can be combined into one or more devices, such as a modem, or collocated on a particular node of a distributed network, such as a telecommunications network. As will be appreciated from the following description, and for reasons of computational efficiency, the components of the system can be arranged at any location within a distributed network without affecting the operation of the system. For example, the various components can be located in a Central Office modem (CO, ATU-C, VTU-O), a Customer Premises modem (CPE, ATU-R, VTU-R), a DSL management device, or some combination thereof. Similarly, one or more functional portions of the system could be distributed between a modem and an associated computing device.

Furthermore, it should be appreciated that the various links, including communications channel 5, connecting the elements can be wired or wireless links, or any combination thereof, or any other known or later developed element(s) that is capable of supplying and/or communicating data to and from the connected elements. The term module as used herein can refer to any known or later developed hardware, software, firmware, or combination thereof that is capable of performing the functionality associated with that element. The terms determine, calculate and compute, and variations thereof, as used herein are used interchangeably and include any type of methodology, process, mathematical operation or technique. Transmitting modem and transmitting transceiver as well as receiving modem and receiving transceiver are used interchangeably herein.

FIG. 1 illustrates an exemplary communication system. Communication system 10 comprises a first transceiver 100 and a second transceiver 200. The transceivers 100 and 200 each comprise a DMT symbol reception/determination module 110, a majority voting module 120, a DMT symbol inspection and selection module 130, a DMT symbol repetition module 140, a FEC/interleaving module 150, an INP determination type module 160, a CRC module 170, a modulation/demodulation module 180 and a transmitter/receiver module 190. It should be appreciated that numerous components of the transceiver have been omitted for clarity. However, the transceivers 100 and 200 can also include the standard components of a typical communications device(s).

In general, the systems and methods of this invention will be described in relation to transceivers in a DSL communications environment. However, it should be appreciated that the techniques illustrated herein can be implemented into any wired or wireless communication system.

In accordance with a first exemplary embodiment, DMT symbols that are used to modulate initialization messages are sent a plurality of times. Due to this repeated transmission, if one or more of the DMT symbols are corrupted by impulse noise, the transceiver receiving the DMT symbols can still recover the information therefrom. More specifically, and in cooperation with the DMT symbol repetition module 140, the majority voting module 120 and the modulation/demodulation module 180, a DMT symbol is repeated without modification with the receiving transceiver using a variety of detection/demodulation schemes to recover the message information bits. For example, the receiving transceiver could use a “majority voting” scheme where each DMT symbol is demodulated independently and then the message information bits recovered by examining how many DMT symbols carry the same bit pattern. Alternatively, for example, the DMT symbols could be examined by the DMT symbol inspection and selection module 130 prior to demodulation in the frequency or time domain and based on these signals, the transceiver that received the DMT symbols, in cooperation with the DMT symbol inspection selection module 130, selects the most likely DMT symbol to be correct. For example, if a DMT symbol was repeated four times and one DMT symbol was corrupted by impulse noise, then the receiving transceiver could examine the four DMT symbols in the frequency domain and clearly detect that one of the four symbols has very different phase and/or amplitude characteristics than the other three DMT symbols. Based on this difference, the receiving transceiver could discard the one DMT symbol that is corrupt and use the remaining three DMT symbols to demodulate and recover the information. Moreover, in order to randomize the signal transmitted from the transmitting transceiver, the repeated DMT symbols can use phase or bit scrambling. With phase scrambling, the repeated DMT symbols can use different phase shifts on the subcarriers in order to randomize the signal. With bit scrambling, the information bits can be scrambled prior to modulating the bits on the repeated DMT symbols.

In accordance with another exemplary embodiment, the number of repeated symbols can be determined based on the SHOWTIME Impulse Noise Protection (INP) requirements. For example, if the SHOWTIME INP=2, then DMT symbols carrying initialization messages would be repeated during initialization at least INP*2+1=5 times. This way, even if two DMT symbols were corrupted by impulse noise, there would be three remaining uncorrupted DMT symbols received by the receiving transceiver. Then, for example, and with the cooperation of the majority voting module 120, a majority voting scheme could be applied to correctly demodulate and recover the DMT symbol(s) without errors. Other algorithms could also be used to derive the number of repeated DMT symbols from the INP value. For example, the number of repeated DMT symbols could be set to A*INP+B where A and B are integers.

In accordance with an exemplary embodiment, and with the cooperation of the DMT symbol repetition/determination module 110, a receiving modem determines the number of repeated DMT symbols and informs the transmitting modem thereof. For example, the receiving modem could receive an INP value from one or more of a second transceiver or a management system. Based on this received INP value, and in cooperation with the DMT symbol repetition module 140, the number of repeated DMT symbols (M) for initialization messages is determined. This determination may be based on impulse noise measurements made by the receiving transceiver or may be based on the received INP value or both. For example, if the INP value is used, M may be equal to INP*2+1. The message indicating the determined number of repeated DMT symbols (M) is then transmitted to a second transceiver. Therefore, during initialization, the message bits are modulated onto the M repeated DMT symbols.

For example, in an alternative embodiment, a transmitting modem, with the cooperation of the DMT symbol repetition/determination module 110, could determine the number of repeated DMT symbols and send a message to the receiving modem indicating the value. This determination can be based on impulse noise measurements, based on a received INP value, or both. Moreover, a management system 205 could determine one or more of the INP value and the number of repeated DMT symbols and configure the transceivers for their use. This determination could be based on impulse noise measurements or may be based on the received INP value or both.

DSL systems often use FEC and interleaving during SHOWTIME to correct errors from impulse noise. In accordance with an exemplary embodiment of this invention, and with the cooperation of the FEC/Interleaving module 150, FEC can be utilized with or without interleaving to correct impulse noise that may corrupt messages during the initialization process. For example, prior to modulating information bits of an initialization message, the message information bits could be encoded using any FEC technique, such as Reed Solomon codes, hamming codes, convolution codes, trellis codes, turbo codes, LDPC codes, or the like. At the receiving modem, the FEC coding could be used to correct errors from impulse noise. For example, initialization messages could be encoded with a Reed Solomon code using the codeword size N=K+R bytes, containing K message information bytes and R FEC check bytes. This code can correct R/2 bytes. For example, if each DMT symbol is used to modulate 1 byte, and a R-S code with N=6 and R=4 is used, then the decoder at the receiving modem would be able to correct R/2=2 bytes in each codeword. This corresponds to correcting two DMT symbols, assuming each DMT symbol carries one byte. This would lead to the ability of the receiving modem being able to correctly recover the message information bits even if impulse noise corrupted two DMT symbols. Additionally, interleaving could be used to provide better immunity to impulse noise. For example, interleaving of multiple codewords could be used to spread the errors from impulse noise over multiple codewords thereby enabling the receiving transceiver to correct impulse noise events that corrupt even more DMT symbols.

For example, two DMT symbols with N=6 and R=4 could be interleaved, in cooperation with the FEC/interleaving module 150, by transmitting one byte from the first codeword and then transmitting one byte from the second codeword and continuing to alternate transmission in this manner. In this case, assuming each DMT symbol carries one byte, an impulse noise that corrupted four consecutive DMT symbols would be correctable by the receiver because four consecutive DMT symbols would always be divided between two codewords with each codeword having the ability to correct two bytes, or two DMT symbols.

During initialization, messages of various lengths are transmitted between the two transceivers 100 and 200. Some of these messages are longer than others with longer messages, due to their length, being more susceptible to impulse noise corruption. In accordance with another exemplary embodiment, and in cooperation with the INP determination type module 160, the type of impulse noise protection can be determined based, for example, on the length of the message being transmitted. For example, long initialization messages, such as C/R-PARAMS in ADSL, C/R-B&G in VDSL and G.994.1 messages are particularly problematic when transmitted in the presence of impulse noise. This is because when a message is long, it is very likely that some portion of the message will be corrupted by impulse noise and not be correctly recovered by the receiving modem. Although conventional DSL systems use standard error detection methods, such as CRC, CRC covers the entire message and does not provide any information regarding which bits, or DMT symbols, were corrupted by the impulse noise. Thus, when a CRC error is detected in a message in conventional DSL systems, the whole message is simply resent by the transmitting modem. However, in an environment with high impulse noise, the retransmitted message could be received in error as well and the retransmission process repeated without success. With the cooperation of the CRC module 170, additional error detection capability can be added to messages to enable the location of bit errors in longer messages. For example, and in cooperation with the CRC module 170, a one-byte CRC could be determined for each byte of the message. The CRC byte and the information could be modulated and transmitted, with the cooperation of the modulation/demodulation module 180 and transmitter/receiver module 190, on one DMT symbol. In this example, one DMT symbol is carrying two bytes.

At the receiving modem, the two bytes are demodulated and the CRC byte is used to detect if there was impulse noise corrupting the associated DMT symbol. If the CRC indicates there are no errors, then the receiving modem correctly received the message byte. If the CRC shows that there are errors, then the receiving modem needs to receive the DMT symbol again, with the cooperation of the DMT symbol reception module 140, in order to correctly recover the information. In this example, one CRC byte is transmitted with one information byte on each DMT symbol and the receiver can demodulate the entire message in this manner.

If impulse noise has corrupted some of the DMT symbols in the longer message, the message can be retransmitted and the receiving modem perform a CRC check on the previously corrupted DMT symbols to determine if they are now received without errors. Since impulse noise is typically uncorrelated with the transmitted message signal, it is highly likely that different DMT symbols will be corrupted when the signal is retransmitted, which means that the receiving modem will probably receive the previously corrupted DMT symbols without errors the second time that the message is transmitted. In the unlikely event that the same DMT symbols are still in error, the message could be retransmitted over and over until all DMT symbols are received without errors. It is possible upon retransmission that the impulse noise will cause errors in different DMT symbols than in the previous transmission. Therefore, the receiving modem could store the correctly recovered message bits for DMT symbols from the previously received message. The receiver can also store all the previously received message bits that were received without error and simply utilize the retransmitted message to correctly determine the message bits and the DMT symbols that were in error previously.

For example, the receiving modem can send a message to the transmitting modem requesting the transmitting modem to retransmit only a portion of the message that was previously received in error.

While the examples above describe computing a CRC and adding a CRC byte to each byte in the message, a plurality of CRC bits could be computed for any number of bits in the message and transmitted to a receiving modem. Moreover, although the examples above describe modulating two bytes in each DMT symbol, any number of bits can be modulated on each DMT symbol. Although the examples above describe transmitting one CRC byte in every DMT symbol, any number of CRC bits can be modulated on each DMT symbol including, but not limited to, CRC bits being carried on only a subset of the DMT symbols. For this case, some DMT symbols may not have any CRC bits. As an example, one CRC byte could be computed for each four message bytes and each DMT symbol could carry one byte. In this case, the first four DMT symbols would be used to modulate the message bytes and the fifth DMT symbol would carry the CRC byte. At the receiving modem, the CRC would be used to detect if any of the five DMT symbols were corrupted by impulse noise. If the CRC showed an error has occurred, then the retransmission techniques described above could be used.

In another exemplary embodiment, the DMT symbol repetition and error detection capabilities are combined to combat impulse noise on the communications line. For example, if a DMT symbol is repeated M times, and a CRC byte is transmitted with every DMT symbol, then the receiving modem could use the CRC byte to determine if each DMT symbol was being correctly demodulated. In this case, a majority voting scheme, or other frequency/time domain impulse noise detection method, such as those discussed above, would not necessarily be required. One advantage of this method is that it may require repeating a fewer number of DMT symbols. For example, if the impulse noise corrupts one DMT symbol, a majority-voting scheme, in conjunction with the majority voting module 120, would require at least three DMT symbols to make a decision. However, if a CRC byte was sent with each DMT symbol, then only two repeated DMT symbols would be necessary since the CRC, with the assistance of the CRC module 170, would correctly identify the uncorrupted DMT symbol and discard the corrupted DMT symbol. If the INP value was being used to determine the number of repeated DMT symbols, then this method may require repeating a fewer number of DMT symbols. For example, it may be necessary to only repeat INP+1 DMT symbols, as opposed to 2*INP+1 in the case where a CRC is not used. Illustratively, if INP=2, then it may be necessary to only transmit INP+1=3 repeated DMT symbols since the CRC byte could be used to detect the one correct DMT symbol and discard the two corrupted DMT symbols.

In accordance with an exemplary embodiment, the receiving modem determines the number of repeated DMT symbols and informs the transmitting modem thereof. In this exemplary embodiment, an INP value is received from a second transceiver or a management system 205. The number of repeated DMT symbols (M) is determined for the initialization messages in cooperation with the DMT symbol repetition module 140. This determination may be based on impulse noise measurements made by, for example, a receiving transceiver, or may be based on the received INP value or both. For example, if the INP value is used, M may be equal to INP+1. A message is then transmitted, with the cooperation of the transmitter/receiver module 190 to the transmitting modem indicating the determined number of repeated DMT symbols (M). Therefore, during initialization, the modem would receive messages wherein the message bits are modulated onto the M repeated DMT symbols with each DMT symbol containing at least one CRC bit for error detection.

For the transmitting modem, the transmitting modem would receive a message indicating the determined number of repeated DMT symbols and, during initialization, modulate at least one message bit onto a DMT symbol and transmit the DMT symbol (M) times, wherein each DMT symbol contains at least one CRC bit for error detection.

Alternatively, the transmitting modem could determine a number of repeated DMT symbols and send a message to the receiving modem. As described above, this determination could be based on impulse noise measurements or may be based on the received INP value or both.

Still alternatively, a management system could determine the number of DMT symbols and configure the transceivers accordingly. As described above, this determination may be made based on impulse noise measurements made by the receiving transceiver or may be based on the received INP value or both. While the above-described exemplary embodiments are illustrated independently of one another, it should be appreciated the various techniques can be combined in whole or in part.

FIG. 2 illustrates an exemplary initialization methodology and communication between first and second transceivers. More specifically, for the first transceiver, control begins in step S100 and continues to step S110. In step S110, an INP value is determined or, for example, received from a management system or another transceiver.

Next, in step S120, the INP value is transmitted to the second transceiver. Then, in step S130, a value M is received by the first transceiver where M is the number of repeated DMT symbols for initialization messages. Control then continues to step S140.

In step S140, and during initialization, the first transceiver modulates at least one message bit onto the M repeated DMT symbols. Next, in step S150, the M number of DMT symbols are transmitted to the second transceiver. Control then continues to step S160 where the control sequence ends.

For the second transceiver, control begins in step S105 and continues to step S115. In step S115 an INP value is received. Next, in step S125, the number of repeated DMT symbols (M) is determined for use in initialization and the value M transmitted to the first transceiver. Then, in step S135, the second transceiver receives the M number of repeated DMT symbols. Control then continues to step S145 where the control sequence ends.

As with the previously discussed embodiments, and while not specifically illustrated in the flowchart, additional error detection capability can also be added to initialization message(s) to enable the location of bit errors. For example, each DMT symbol could also include at least one CRC bit, which can be used to detect if the DMT symbol is received correctly or in error. However, this embodiment is not limited thereto and any error detection technique in any configuration will work with the invention.

FIG. 3 illustrates a second exemplary methodology and communication between transceivers for initialization. More specifically, for the first transceiver, control begins in step S200 and continues to step S210. In step S210, an INP value is determined or, for example, received from a management system or another transceiver. Next, in step S220, the number repeated DMT symbols (M) for initialization messages is determined and transmitted to a second transceiver. Then, in step S230, and during initialization, at least one message bit is modulated onto the M repeated DMT symbols. Control then continues to step S240.

In step S240, the M symbols are transmitted to the second transceiver. Control then continues to step S250 where the control sequence ends.

For the second transceiver, control begins in step S205 and continues to step S215. In step S215, the value for M is received. Next, in step S225, the M number of DMT symbols are received. Control then continues to step S235 where the control sequence ends.

As with the previously discussed embodiments, and while not specifically illustrated in the flowchart, additional error detection capability can also be added to initialization message(s) to enable the location of bit errors. For example, each DMT symbol could also include at least one CRC bit, which can be used to detect if the DMT symbol is received correctly or in error. However, this embodiment is not limited thereto and any error detection technique in any configuration will work with the invention.

FIG. 4 illustrates another exemplary initialization methodology and communication between transceivers. More specifically, for the first transceiver, control begins in step S202 and continues to step S204. In step S204, an INP value is determined or, for example, received from a management system or another transceiver. Next, in step S206, the number of repeated DMT symbols (M) for initialization messages is determined and transmitted to a second transceiver. Then, in step S208, the M number of DMT symbols are received. Control then continues to step S209 where the control sequence ends.

For the second transceiver, control begins in step S201 and continues to step S203. In step S203, M is received. Next, in step S205, and during initialization, at least one message bit is modulated onto the M repeated DMT symbols Then, in step S207, the M number of DMT symbols are transmitted. Control then continues to step S211 where the control sequence ends.

As with the previously discussed embodiments, and while not specifically illustrated in the flowchart, additional error detection capability can also be added to initialization message(s) to enable the location of bit errors. For example, each DMT symbol could also include at least one CRC bit, which can be used to detect if the DMT symbol is received correctly or in error. However, this embodiment is not limited thereto and any error detection technique in any configuration will work with the invention.

FIG. 5 illustrates another exemplary initialization methodology according to this invention. In particular, control begins in step S300 and continues to step S310. In step S310, the CRC to byte ratio is determined. Next, in step S320, one or more CRC bits are determined for a number of bytes or bits. Then, in step S330, the one or more CRC bits are modulated in addition to additional information on a DMT symbol. Control then continues to step S340.

In step S340, the DMT symbol is demodulated and the one or more CRC bits are used to detect errors. Next, in step S350, a determination is made whether the CRC bits have revealed errors. If errors are present, control continues to step S360. Otherwise, control jumps to step S380 where the control sequence ends.

In step S360, retransmission of one or more DMT symbols or portions thereof are requested. Then, in step S370, the errored DMT symbols are discarded. Control then continues back to step S350.

FIG. 6 illustrates another exemplary embodiment for communication initialization according to this invention. In particular, control begins in step S400 and continues to step S410. In step S410, an INP value is determined or, for example, received from a management system or another transceiver. Next, in step S420, the number of repeated DMT symbols M is determined for initialization messages. Then, in step S430, the value for the number of repeated DMT symbols is transmitted to, or received from, as appropriate, a second transceiver. Control then continues to step S440.

In step S440, one or more initialization messages are transmitted or received, as appropriate, wherein at least one message bit is modulated onto a DMT symbol and the DMT symbol(s) is repeated M times with each DMT symbol including at least one CRC bit. Next, in step S450, the combination of CRC bit(s) and repeated DMT symbols are utilized to insure integrity of the initialization message(s). Control then continues to step S460 where the control sequence ends.

While the above-described flowcharts have been discussed in relation to a particular sequence of events, it should be appreciated that changes to this sequence can occur without materially effecting the operation of the invention. Additionally, the exact sequence of events need not occur as set forth in the exemplary embodiments, but rather the steps can be performed by one or the other transceiver in the communication system provided both transceivers are aware of the technique being used for initialization. Additionally, the exemplary techniques illustrated herein are not limited to the specifically illustrated embodiments but can also be utilized with the other exemplary embodiments.

The above-described system can be implemented on wired and/or wireless telecommunications devices, such a modem, a multicarrier modem, a DSL modem, an ADSL modem, an xDSL modem, a VDSL modem, a linecard, test equipment, a multicarrier transceiver, a wired and/or wireless wide/local area network system, a satellite communication system, a modem equipped with diagnostic capabilities, or the like, or on a separate programmed general purpose computer having a communications device or in conjunction with any of the following communications protocols: CDSL, ADSL2, ADSL2+, VDSL1, VDSL2, HDSL, DSL Lite, IDSL, RADSL, SDSL, UDSL or the like.

Additionally, the systems, methods and protocols of this invention can be implemented on a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device such as PLD, PLA, FPGA, PAL, a modem, a transmitter/receiver, any comparable means, or the like. In general, any device capable of implementing a state machine that is in turn capable of implementing the methodology illustrated herein can be used to implement the various communication methods, protocols and techniques according to this invention.

Furthermore, the disclosed methods may be readily implemented in software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms. Alternatively, the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with this invention is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized. The communication systems, methods and protocols illustrated herein can be readily implemented in hardware and/or software using any known or later developed systems or structures, devices and/or software by those of ordinary skill in the applicable art from the functional description provided herein and with a general basic knowledge of the computer and telecommunications arts.

Moreover, the disclosed methods may be readily implemented in software that can be stored on a storage medium, executed on programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like. In these instances, the systems and methods of this invention can be implemented as program embedded on personal computer such as an applet, JAVA® or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated communication system or system component, or the like. The system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system, such as the hardware and software systems of a communications transceiver.

It is therefore apparent that there has been provided, in accordance with the present invention, systems and methods for initializing transceivers. While this invention has been described in conjunction with a number of embodiments, it is evident that many alternatives, modifications and variations would be or are apparent to those of ordinary skill in the applicable arts. Accordingly, it is intended to embrace all such alternatives, modifications, equivalents and variations that are within the spirit and scope of this invention. 

1. A communication system initialization method comprising determining a number of DMT symbols to be repeated during initialization based on an impulse noise protection value. 2-43. (canceled) 