Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
CODING SCHEME FOR SERIAL DATA COMMUNICATIONS
Document Type and Number:
WIPO Patent Application WO/2007/080547
Kind Code:
A2
Abstract:
An encoding scheme generates an encoded nine bit code word from each input eight bit data word. The coding scheme is such that the encoded data words have advantageous properties, such as a minimum of two polarity transitions in each encoded data word, and a maximum of five bits without a polarity transition. Five of the bits from the input eight bit data word appear unchanged in the encoded data word, while the other four bits of the encoded data word are obtained by applying appropriate logical operators to the remaining three bits of the input data word in combination with two of the five bits that appear unchanged in the encoded data word. Exception codes can also be defined, that is, nine bit code words that cannot be obtained from any eight bit data word by means of the coding scheme, and can be used to embed control information into the data stream. For example, the exception codes may advantageously have six or seven bits without a polarity transition.

Inventors:
BESTEN GERRIT WILLEM (NL)
Application Number:
PCT/IB2007/050080
Publication Date:
July 19, 2007
Filing Date:
January 11, 2007
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
KONINKL PHILIPS ELECTRONICS NV (NL)
BESTEN GERRIT WILLEM (NL)
International Classes:
H03M5/14
Foreign References:
US4775985A1988-10-04
EP0310041A21989-04-05
Other References:
BERGMANS M ET AL: "Antiwhistle Codes" IEEE TRANSACTIONS ON COMMUNICATIONS, IEEE SERVICE CENTER, PISCATAWAY, NJ, US, vol. 45, no. 8, August 1997 (1997-08), XP011008988 ISSN: 0090-6778
Attorney, Agent or Firm:
WHITE, Andrew, G. et al. (& StandardsCross Oak Lane, Redhill Surrey RH1 5HA, GB)
Download PDF:
Claims:
CLAIMS

1 . A method of encoding data, the method comprising, for each input data byte of eight bits: dividing the data byte into: a first group of three bits, and a second group of five bits; and generating an output data word containing nine bits, wherein the nine bits include the first group of three bits from the input data byte, and wherein each possible output data word has a maximum runlength of 5 bits.

2. A method as claimed in claim 1 , further comprising: dividing the second group of five bits into two unencoded bits and three encoded bits; wherein the nine bits of the output data word further include said two unencoded bits from said second group of five bits from said data byte; and wherein said step of generating the output data word comprises: applying logical operators to said second group of five bits from said data byte to obtain four further bits of the output data word.

3. A method as claimed in claim 2, wherein the nine bits of the output data word comprise: the first group of three bits from the input data byte; the two unencoded bits from the second group of five bits of the input data byte; sixth and seventh bits obtained by applying logical operators to a first of said unencoded bits and the three encoded bits in the input data byte; and eighth and ninth bits obtained by applying logical operators to a second of said unencoded bits and the three encoded bits in the input data byte.

4. A method as claimed in claim 3, wherein the two unencoded bits from the second group of five bits from the input data byte, the sixth and seventh bits, and the eighth and ninth bits appear in two blocks of three consecutive bits in the output data word.

5. A method as claimed in claim 4, wherein the two unencoded bits from the second group of five bits from the input data byte, the sixth and seventh bits, and the

eighth and ninth bits appear as the second, third and fourth, and seventh, eight and ninth bits in the output data word.

6. A method as claimed in claim 5, wherein, in each possible output data word, there is a first polarity transition between the second and third bits or between the third and fourth bits and a second polarity transition between the seventh and eighth bits or between the eighth and ninth bits, while excluding the possibility that the first polarity transition is between the second and third bits while the second polarity transition is between the eighth and ninth bits

7. A method as claimed in claim 4, wherein the two unencoded bits from the second group of five bits from the input data byte, the sixth and seventh bits, and the eighth and ninth bits appear as the first, second and third, and sixth, seventh and eighth bits in the output data word.

8. A method as claimed in claim 7, wherein, in each possible output data word, there is a first polarity transition between the first and second bits or between the second and third bits and a second polarity transition between the sixth and seventh bits or between the seventh and eighth bits, while excluding the possibility that the first polarity transition is between the first and second bits while the second polarity transition is between the seventh and eighth bits.

9. A method as claimed in one of claims 4 to 8, wherein the two unencoded bits from the second group of five bits from the input data byte appear in different ones of the two blocks of three consecutive bits in the output word.

10. A method as claimed in one of claims 4 to 9, wherein the sixth and seventh bits appear in one of said two blocks of three consecutive bits in the output word, and the eighth and ninth bits appear in another of said two blocks of three consecutive bits in the output word.

1 1 . A method as claimed in claim 3, wherein the logical operators are such that there are at least two polarity transitions in each possible output data word.

12. A method as claimed in claim 3, wherein the logical operators are such that there are at least two zeroes and at least two ones in each possible output data word.

13. A method as claimed in any of claims 3 to 12, comprising: applying logical operators to the first of said unencoded bits and the group of three encoded bits in the input data byte to obtain the sixth and seventh bits according to the logic:

Y1 = (~Q1 &-Q2&-X1 ) I (Q1 &Q3) | (Q2&Q3) Y2 = (~Q1 &-Q2&-X1 ) I (Q1 &~Q3) | (Q2&-Q3)

and applying logical operators to the second of said unencoded bits and the group of three encoded bits in the input data byte to obtain the eighth and ninth bits according to the logic:

Y3 = (Q1 &~Q2) I (Q1 &Q2&-X2) | (-Q2&Q3) Y4 = (~Q1 &Q2) I (Q1 &Q2&-X2) | (~Q1 &~Q3),

wherein X1 is the first of the two unencoded bits from the second group of five bits of the input data byte, X2 is the second of the two unencoded bits from the second group of five bits of the input data byte, Q1 , Q2 and Q3 are the group of three encoded bits in the input data byte, Y1 and Y2 are the sixth and seventh bits of the output word, and Y3 and Y4 are the eighth and ninth bits of the output word, and where AND='&', OR=T, and NOT='-'.

14. A method of transmitting data from a transmitter to a receiver, the method comprising: encoding the data in accordance with a method as claimed in one of claims 1 to 13; and including amongst the encoded data at least one exception code, comprising a nine bit word that can not be obtained from any input data byte by encoding the data in accordance with said method.

15. A method as claimed in claim 14, wherein the exception code comprises a nine bit word having a runlength of 6 bits.

16. A method as claimed in claim 14, wherein the exception code comprises a nine bit word having a runlength of 7 bits.

17. A method as claimed in claim 14, wherein the exception code comprises a nine bit word having a runlength of 8 bits that, in combination with an adjacent encoded data word, can provide a runlength of up to 10 bits.

18. A method as claimed in claim 14, wherein the exception code comprises a nine bit word having a runlength of 8 bits that, in combination with an adjacent encoded data word, can provide a runlength of up to 1 1 bits.

19. A method as claimed in claim 14, wherein the exception code has a maximum runlength of 5 bits.

20. A method as claimed in claim 14, wherein, in the exception code, there is a first polarity change between the second and third bits of the word, and a second polarity change between the eighth and ninth bits of the word, but the third and fourth bits are equal, as are the seventh and eighth bits, while the third and eighth bits have opposite polarities.

21 . A transmitter, for receiving data in input data bytes of eight bits, and comprising an encoder, said encoder comprising logic for encoding said received data in accordance with a method as claimed in one of claims 1 to 13.

22. A transmitter as claimed in claim 21 , further comprising logic for including amongst the encoded data at least one exception code, comprising a nine bit word that can not be obtained from any input data byte by encoding the data in accordance with said method.

23. A transmitter as claimed in claim 22, wherein the exception code comprises a nine bit word having a runlength of 6 bits.

24. A transmitter as claimed in claim 22, wherein the exception code comprises a nine bit word having a runlength of 7 bits.

25. A transmitter as claimed in claim 22, wherein the exception code comprises a nine bit word having a runlength of 8 bits that, in combination with an adjacent encoded data word, can provide a runlength of up to 10 bits.

26. A transmitter as claimed in claim 22, wherein the exception code comprises a nine bit word having a runlength of 8 bits that, in combination with an adjacent encoded data word, can provide a runlength of up to 1 1 bits.

27. A transmitter as claimed in claim 22, wherein the exception code has a maximum runlength of 5 bits.

28. A transmitter as claimed in claim 22, wherein, in the exception code, there is a first polarity change between the second and third bits of the word, and a second polarity change between the eighth and ninth bits of the word, but the third and fourth bits are equal, as are the seventh and eighth bits, while the third and eighth bits have opposite polarities.

29. A method of decoding received encoded data, the method comprising, for each received encoded data word of nine bits: dividing the encoded data word into: a first group of five bits, and a second group of four bits; and generating an output word containing eight bits, wherein the eight bits comprise: the first group of five bits from the encoded data word; and sixth, seventh and eighth bits obtained by applying logical operators to the second group of four bits in the encoded data word.

30. A method as claimed in claim 29, comprising applying said logical operators such that:

Q1 = EXOR(YI ,Y2)&~(~Y3&Y4) Q2 = EXOR(YI ,Y2)&~(Y3&~Y4) Q3 = (Y1 &~Y2) I (Y1 &Y2&Y3) | (~Y1 &-Y2&Y3)

= (Y1 &-Y2) I (~EXOR(Y1 ,Y2)&Y3), wherein Y1 , Y2, Y3 and Y4 are said second group of four bits in the encoded data word; Q1 , Q2 and Q3 are said sixth, seventh and eighth bits of said output word; and where AND='&', OR=T, and NOT='-'.

31 . A method as claimed in claim 29 or 30, further comprising, as a preliminary step, recognizing and removing any exception codes.

32. A receiver, for receiving encoded data in encoded data words each of nine bits, and comprising a decoder, said decoder comprising logic for decoding said received data in accordance with a method as claimed in claim 25 or 26.

33. A receiver as claimed in claim 32, further comprising logic for recognizing and removing any exception codes before passing said encoded data to said decoder, and outputting control information represented by said exception codes.

Description:

CODING SCHEME FOR SERIAL DATA COMMUNICATIONS

This invention relates to a coding scheme, and in particular to a coding scheme that can be used when transmitting data and embedded information in a single data stream.

There are many situations in which it is necessary to transmit data from one electronic device to another. It may be advantageous to use a serial interface, in which the data for transmission is converted into a sequence of binary values, which are then transmitted over the interface.

In such situations, the use of a coding scheme can allow additional features into the data stream during transmission.

Various coding schemes are already known. Based on the fact that the original user data is provided in data bytes, each containing 8 data bits, coding schemes are known in which the data bits from one or more data bytes are manipulated in some way to produce encoded data containing one or more additional data bits. For example, US Patent No. 6,229,458 describes a coding scheme in which a data word made up of four data bytes (that is, 32 data bits) is encoded to form an encoded data word made up of 34 data bits.

According to a first aspect of the present invention, there is provided a method of encoding data, as defined in the attached claims. According to a second aspect of the invention, there is provided a method of decoding received encoded data. According to a third aspect of the invention, there is provided a transmitter for encoding data in accordance with the encoding method of the invention. According to a fourth aspect of the invention, there is provided a receiver for decoding data in accordance with the decoding method of the invention.

For a better understanding of the present invention, and to show how it may be put into effect, reference will now be made, by way of example, to the accompanying drawings, in which:

Figure 1 is a block schematic diagram of a communications system embodying the present invention.

Figure 2 illustrates the coding scheme according to an aspect of the present invention.

Figure 1 is a block schematic diagram of a communications system 10, in which a transmitter 12 is connected to a receiver 14 by means of a connection 16. For example, the transmitter 12 and the receiver 14 may be separate devices located within a larger device. As one specific example, the transmitter may be an application engine or a baseband processor within a mobile device, while the receiver 14 may be a graphics processor or another application specific device, although it will be appreciated that the coding scheme of the invention may be used regardless of the types of device involved.

In the transmitter 12, user data may be obtained from any process or application, for transmission to the receiver 14. The user data is passed to an encoder 18 for encoding, as described in more detail below, and the encoded data is passed to a transmit interface 20, which performs any processes required to put the encoded data into the form desired for transmission over the connection 16.

The encoder 18 also receives control information, for example in the form of control flags, that is intended to be embedded in the stream of data for transmission. Again, this will be described in more detail below.

In the receiver 14, the data is received at an interface 22, and passed to a decoder 24 for decoding. The interface 22 performs any processes required to retrieve the encoded data, and the decoder extracts the control information embedded in the transmitted data stream, and recreates the original user data from the encoded data, so that the recreated original user data can be passed to any subsequent process or application, for further processing.

As described in more detail below, the user data is received in the form of data bytes, each containing eight data bits. Each of these data bytes is converted into a sequence of nine encoded data bits.

Figure 2 illustrates the encoding scheme in more detail.

Specifically, as shown in Figure 2, the eight data bits of a byte 50 of user data are identified as [B1 , B2, B3, X1 , X2, Q1 , Q2, Q3]. In fact, this can be obtained by means of any arbitrary bijective (eight bits to eight bits) logical transformation of the input data byte, provided that the inverse function is available at the receiver side. For example, the eight data bits of the byte 50 can be an arbitrary permutation of the input data byte, where additionally each bit position can be inverted or not, compared to its source bit in the data byte, provided that the permutation and the inversions are known in advance, and can be reversed in the receiver. However, other bijective, reversible, transformations are also possible.

In the encoding process according to one embodiment of the invention, three of the bits of the input data byte appear unchanged in the encoded data word. The other six bits of the encoded data word form two blocks of three bits, separated by two of these unchanged bits. More specifically, in the encoding process as shown in Figure 2, three of the bits of the input data byte, namely the bits identified as B1 , B2 and B3, appear unchanged in the first, fifth and sixth bit positions respectively of the encoded data word 60. Two further bits of the input data byte, namely the bits identified as X1 and X2, appear unchanged in the second and ninth bit positions respectively of the encoded data word 60.

Further, in the encoding process, as shown in Figure 2, the bits Q1 , Q2 and Q3 of the input data byte are encoded in a logic block 30, also using the bits X1 and X2 of the input data byte, to form the bits Y1 , Y2, Y3 and Y4 appearing in the third, fourth, seventh and eighth bit positions respectively of the encoded data word.

As mentioned previously, one of the purposes of such an encoding technique is to ensure that the encoded data words have certain desirable properties.

For example, it can be advantageous to provide a coding scheme in which is guaranteed that there will be a certain minimum number of polarity transitions in each encoded data word.

Further, it can be advantageous to provide a coding scheme in which there is a guaranteed maximum run length, that is, a guarantee that there will not be more than a predetermined number of identical bits, either within an encoded data word, or extending across two or more consecutive encoded data words.

According to the preferred embodiment of the present invention, the coding scheme operates such that there is guaranteed to be a first polarity change either between the second and third bits of the encoded data word, or between the third and fourth bits of the encoded data word, and such that there is guaranteed to be a second polarity change either between the seventh and eighth bits of the encoded data word, or between the eighth and ninth bits of the encoded data word, while excluding the possibility that the first polarity change is between the second and third bits of the encoded data word while the second polarity change is between the eighth and ninth bits of the encoded data word.

This guarantees that there are at least two polarity changes in each encoded data word, and also guarantees that every serialized stream of encoded data words has a maximum run length of five bits.

This could also be achieved in an equivalent manner by guaranteeing that there is a first polarity change either between the first and second bits of the encoded data word, or between the second and third bits of the encoded data word, and guaranteeing that there is a second polarity change either between the sixth and seventh bits of the encoded data word, or between the seventh and eighth bits of the encoded data word, while excluding the possibility that the first polarity change is between the first and second bits of the encoded data word while the second polarity change is between the seventh and eighth bits of the encoded data word. For example, this can be achieved by shifting the bit identified as B1 to the ninth bit position of the encoded data word 60, and shifting each of the other bits in the encoded data word 60 one position to the left.

The stated guarantees can be obtained by using the following coding table:

As a result, in the preferred embodiment, the logic block 30 applies the following logical relationships to obtain the required bits of the output data word:

Y1 = (~Q1 &~Q2&~X1 ) I (Q1 &Q3) | (Q2&Q3)

Y2 = (~Q1 &-Q2&-X1 ) I (Q1 &~Q3) | (Q2&-Q3)

Y3 = (Q1 &~Q2) I (Q1 &Q2&-X2) | (-Q2&Q3)

Y4 = (~Q1 &Q2) I (Q1 &Q2&-X2) | (~Q1 &~Q3),

where AND='&', OR=T, and NOT='-'.

Thus, the logic block 30 only requires a relatively small number of simple logic functions, and does not require any complex calculations.

This encoding scheme therefore provides encoded data words having desirable properties.

Moreover, it allows various unique exception/escape codes to be defined. These codes can be inserted into the data stream, as described above, to embed control information into the transmitted data.

In particular, a first group of these exception codes are referred to as "comma codes". As described above, the 9 bit encoded data words obtained from all of the possible 8 bit input data words can be guaranteed to have a maximum run length of five bits. However, 9 bit code words with longer run lengths can be defined, and these can be inserted into a data stream for special purposes, that is, not representing data. For example, as is known to the person skilled in the art, these 9 bit code words with longer run lengths can be used for performing synchronization, for synchronization checks, to identify the beginning and end of data packets, to insert skip and/or idle codes, and some error checking capabilities.

In particular, it is possible to define a number of 9 bit code words that contain specific bit sequences that can be guaranteed not to appear anywhere within any serialized sequence of encoded data words obtained from possible 8 bit input data words. Codes with this property are referred to as "comma codes". This has the effect that, even if the receiver has not been synchronized with the transmitter, meaning that the receiver has not yet identified the beginning and end of each transmitted 9 bit word, the receiver is able to identify these specific bit sequences,

and then use its knowledge about these specific bit sequences to achieve synchronization.

In fact, based on the coding scheme described above, where the bit identified as B1 appears as the first bit in the encoded data word, and there is guaranteed to be a first polarity change either between the second and third bits of the encoded data word, or between the third and fourth bits of the encoded data word, and there is guaranteed to be a second polarity change either between the seventh and eighth bits of the encoded data word, or between the eighth and ninth bits of the encoded data word, while excluding the possibility that the first polarity change is between the second and third bits of the encoded data word while the second polarity change is between the eighth and ninth bits of the encoded data word, there are at least four ways to define four unique exception codes with a runlength of 6 bits. There are also two exception codes with a runlength of 7 bits and two exception codes that can be combined with subsequent valid codewords to produce bit sequences with a runlength of at least 8 bits, but may result in bit sequences with a runlength of up to 1 1 bits, depending on the subsequent code word.

The four ways of defining four unique exception codes with a runlength of 6 bits are listed in the following table, identified as Options 1 -4:

It should be noted that the exception codes in the last of these three categories can be flipped; that is, the code 100000000 can be replaced by 000000001 , and 01 1 1 1 1 1 1 1 can be replaced by 1 1 1 1 1 1 1 10. In that case, sequences with a runlength of up to 10 bits may be obtained, depending on the preceding code word, in the case where the bit identified as B1 appears as the first bit in the encoded data word.

In the alternative described above, where the bit identified as B1 appears as the ninth bit in the encoded data word, and there is guaranteed to be a first polarity change either between the first and second bits of the encoded data word, or between the second and third bits of the encoded data word, and there is also guaranteed to be a second polarity change either between the sixth and seventh bits of the encoded data word, or between the seventh and eighth bits of the encoded data word, while excluding the possibility that the first polarity change is between the first and second bits of the encoded data word while the second polarity change is between the seventh and eighth bits of the encoded data word, the exception codes in the last of these three categories may result in bit sequences with a runlength of up to 10 bits, depending on the subsequent code word. Again, however, the exception codes in the last of these three categories can be flipped, as described above, and, in that case, sequences with a runlength of up to 1 1 bits may be obtained, depending on the preceding code word.

If the exception codes can be guaranteed to have a polarity transition between the first and second bits, then it becomes easy to achieve alignment based on the exception codes, which means that option 1 is the preferred solution. That is, if the exception codes listed in the table as Option 1 are used, then, when the receiver detects six consecutive bits with the same bit value, it will know that this indicates that one of the exception codes has been transmitted. Moreover, since each of the exception codes has a polarity transition between the first and second bits, (and each of the exception codes with a runlength of 6 also has a polarity transition between the seventh and eighth bits), the receiver can identify the start and the end of the exception code word, and can then use this to identify the start and the end of each subsequent received code word.

Because the two codes in the last runlength category can cause a significantly higher maximum possible runlength, it is attractive to limit usage of exception codes to the first two runlength categories with maximum runlengths of 6 and 7 respectively. If four exception codes are sufficient, the overall maximum runlength can be limited to 6.

A further category of exception codes can be defined. Specifically, these are the code words where there is a first polarity change between the second and third bits of the encoded data word, and a second polarity change between the eighth and ninth bits of the encoded data word, but the third and fourth bits are equal, as are

the seventh and eighth bits, while the third and eighth bits (and hence also the fourth and seventh bits) have opposite polarities.

These code words therefore have the form:

61 , 1 , 0, 0, -32, .33, 1 , 1 , 0 Or

61 , 0, 1 , 1 , 62, 63, 0, 0, 1 .

It can be seen that there are two possible forms for these code words and, in each case, B1 , B2 and B3 can take any values, giving eight possible combinations, leading to 16 of these code words in total.

Again, these exception codes can be used to embed control information into the data stream, as required. However, the exception codes of this category are not unique, as the bit sequences can also appear in a sliding window across the boundary between two consecutive encoded data words, and so these code words can only be used once synchronization has been achieved, that is, once the receiver knows where each received code word begins and ends.

The exception codes can be stored in the encoder 18, or elsewhere, and can then simply be inserted complete into the data stream for transmission. Alternatively, encoding logic can be provided for generating the exception codes from received control information. After encoding, and insertion of any required exception codes, the data stream can be transmitted to the decoder 24. In the decoder 24, it is first necessary to recognize and remove any exception codes that were inserted into the data stream.

For example, exception codes with runlengths greater than 5 can be identified simply by the presence of these runlengths. The regular exception codes can for example be recognized by identifying that the third and fourth bits are equal, as are the seventh and eighth bits, while the third and eight bits (and hence also the fourth and seventh bits) have opposite polarities. The control information corresponding to any extracted exception codes can then be passed on to a further control process.

Any other code words, representing encoded data words, can be decoded. It is clear from the discussion of the encoder 18 above that the bits B1 , B2, B3, X1 and X2 appearing in the encoded data word do not need to be decoded, as they were unchanged by the encoding process.

It should also be noted that, although the bits Y1 , Y2, Y3 and Y4 of the encoded data word were obtained from the bits Q1 , Q2 and Q3 of the input data byte, also using the bits X1 and X2 of the input data byte, it is possible to decode the bits Y1 , Y2, Y3 and Y4 of the encoded data word to the required bits Q1 , Q2 and Q3 of the decoded data byte, without also using the bits X1 and X2.

The received nine bit code word is therefore divided into a first group, containing the five bits B1 , B2, B3, X1 and X2 that do not need to be decoded, and a second group, containing the four bits Y1 , Y2, Y3 and Y4, it being noted that the first group of bits are not the first five bits in the received code word, and the second group of bits are not the last four bits in the received code word.

Specifically, the logical relation for decoding is:

Q1 = EXOR(YI ,Y2)&~(~Y3&Y4) Q2 = EXOR(YI ,Y2)&~(Y3&~Y4) Q3 = (Y1 &~Y2) I (Y1 &Y2&Y3) | (~Y1 &-Y2&Y3) = (Y1 &-Y2) I (~EXOR(Y1 ,Y2)&Y3)

where AND='&\ OR=T, and NOT='-'.

Thus, the decoder 24 only requires a relatively small number of simple logic functions, and does not require any complex calculations.

Finally, in order to obtain the output data byte, this decoded data word must undergo a process to reverse any bijective transformation, such as any permutation and/or inversions that were applied to the input data byte before encoding.

There is therefore described a method for encoding data, which can provide encoded data having desirable properties, while also providing the possibility of useful exception codes, without causing an undesirably large increase in the amount of data to be transmitted.