throbber
I
`
`&Seagate
`Annual Report
`
`Barrett Brickner and J aekyun Moon
`
`September 26, 1995
`
`University of Minnesota
`CENTER FOR MICROMAGNETICS AND INFORMATION TECHNOLOGIES
`
`UMN EXHIBIT 2025
`LSI Corp. et al. v. Regents of Univ. of Minn.
`IPR2017-01068
`
`
`Page 1 of 19
`
`

`

`Seagate Annual Report
`
`2
`
`1 Introduction
`Various detection schemes for a linear channel corrupted with additive white Gaussian noise
`(A WGN) were studied. Except where noted, the simulations and analysis were performed using
`an actual magnetoresistive (MR) head response. The focus of the research was on the use of
`fixed-delay tree search with decision feedback (FDTS/DF) with (O,k) run length limited (RLL)
`codes. The performance of FDTS/DF is compared to a partial response maximum likelihood
`(PRML) detector and the optimum detector, maximum likelihood sequence detection (MLSD).
`Alternate formulations of the FDTS detector, based on a signal space representation, are
`presented. Finally, a new coding technique, which can be used either to reduce detector
`complexity or improve margin, is discussed.
`
`2 Channel Model
`The channel model used for all .the work presented is linear with additive white gaussian
`no_ise. A block diagram for the channel/detector is shown in Figure 1. The write current samples
`are a,..., hn is the sampled, filtered step response, nk are the AWGN samples, en is the forward
`.equalizer, and bn is the feedback filter. For a PRML detector, then bn block is not included. The
`value 7 is the delay of the detector and the depth of a FDTS structure.
`
`ak
`- - - ' l l)lo(cid:141)
`
`I 1-D
`
`n
`
`X k .---------.
`- - detector
`
`a k-i-
`
`Figure 1. Channel model and detector block diagram
`
`The sampled transition response is shown in Figure 2. The magnitude spectrum of the reponse,
`prior to processing by the anti-aliasing low pass filter, is shown in Figure 3. The equalizers were
`optimized at each SNR point before measuring the bit error rate (BER). ·The optimization
`criterion was minimum mean square enor (MMSE). The effects of equalizer length were not
`considered. A sufficiently large number of taps ( 41 for the forward equalizer and 21 for the
`feedback filter) was used so that the filter lengths would not degrade the detector performance.
`
`3 Detector Distance Properties
`The performance of a detection scheme is dominated by the pair of symbols that are
`closest to each other in Euclidean distance. For an error to occur, the amount of noise that must
`be added is half of this distance. Because the noise amplitude is assumed to be Gaussian
`distributed, a _small increase in distance can greatly reduce the probability of an error.
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 2 of 19
`
`

`

`I
`
`Seagate Annual Report
`
`0.9
`
`0.8
`
`0.7
`
`0.6
`
`0.5
`
`0.4
`
`0.3
`
`0.2
`
`0.1
`
`0
`
`l
`
`/
`
`t
`\..
`
`-0.1
`-30
`
`-20
`
`-1 0
`
`0
`Scmplo Number
`
`10
`
`20
`
`30
`
`10•
`
`'
`
`10- J
`0
`
`3
`
`-
`
`I
`'\.
`\I
`
`I
`I
`
`I
`
`I
`
`I
`
`'
`
`I
`
`I
`
`\ ,~
`
`!
`
`\ /"'-
`
`I
`
`\
`
`I
`
`I
`
`I A j -
`
`' f
`
`4
`
`5
`
`' i
`
`,
`
`8,
`
`10
`
`F"re~u• ncy n-armaliza:d to 1/ (2t>FW50)
`
`Figure 2. Sampled, filtered transition response
`
`Figure 3. Spectrum of an unfiltered transition
`
`3.1 Maximum Likelihood Sequence Detection
`Maximum Likelihood Sequence Detection (MLSD) yields the optimum detector
`performance for a linear channel with AWGN. Although implementing an unconstrained MLSD
`in a commercial disk drive is not economically feasible, it is useful as an absolute performance
`. bound against which other detection schemes may be compared. The distance between the two
`closest sequences is denoted by dmiw The performance of the MLSD detector is approximately
`
`P MLSo(e) " K ·Q [ ~:']
`
`(1)
`
`where Q(-) is the complementary distribution function for a Gaussian distribution, a is the square
`root of the noise power at the output of the forward equalizer, and K as a constant independent
`of d"';,,-
`
`The minimum distance can be bounded with_ the following [1]
`
`MIN t [ t b/k-J] 2 ':$; d~0
`
`k=O
`
`J=O
`
`{ }L
`~o
`
`:::; MIN f [ t b1ek-J] 2
`
`{ }L
`~o
`
`k=O
`
`J=O
`
`(2)
`
`where {bn; n=l, ... ,J} are the feedback filter coefficients and ba=I. The term b0=1 is a result of
`training the equalizers for a DFE; i.e., for ideal operation, the samples at the input to a DFE are
`±ha, The error sequence of length L+l, {ek} is taken to be all possible error sequences where
`ea= ±2, and all other ek are O or ±2. This assumes that the desired data sequence is taken from
`ak = ±1 so that the differences are in {±2,0}. These upper and lower bounds represent non(cid:173)
`increasing and non-decreasing functions, respectively, of the error length L. These bounds wi11
`converge as L (cid:157)
`co. The bounds, as a function of L, for the case where the user density is
`Du = 2.5 are shown in Figure 4.
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 3 of 19
`
`

`

`Seagate Annual Report
`
`3.2 ~I
`
`\
`\
`
`µppet B4'd
`
`I
`
`3.0
`
`2.8
`
`C ·e 2.s
`,,
`
`2.4
`
`2.2
`
`2.0
`0
`
`c..--V
`
`/
`
`-
`
`I
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`L--l--i.---
`/Lovier Bb\Xld
`
`I
`
`9
`
`10 11 12 1.3
`
`L
`Figure 4. Bounding of dmin for D u = 2.5
`
`4
`
`V v
`
`/ V
`
`i.-V
`
`/
`
`7
`6
`5
`Tree Oeplh
`
`8
`
`9
`
`10
`
`11
`
`12
`
`0.0
`
`-0.5
`
`!
`i-1.0
`.,,
`
`~ - 1.5
`
`I 0
`
`-2.0
`
`~
`
`-2.5
`0
`
`1
`
`---
`/
`I
`I
`
`2
`
`3
`
`4
`
`Figure 5. FDTS/DF Minimum Distance (/3,.,n)
`
`As shown, the upper bound rapidly converges to dm;11 while the lower bound approaches
`more slowly. The rapid convergence of the upper bound is explained by noting that for L ~ 2,
`the minimum distance error sequence determined by the upper bound was e = ±( -2, + 2,-2). Thus,
`when L = 2, the upper bound will be evaluated for this minimum distance event. Assuming that
`an event with a smaller distance does not exist beyond the range of L that was examined, there
`will be no decrease in the upper bound, because the minimum error event will already have been
`accounted for. It has been shown that at high densities, the minimum distance error sequence is
`of the form em;11 = ±(-2,+2,-2), a result which agrees with Figure 4 (2].
`
`3.2 Fixed Delay Tree Search
`A measure of performance similar to dm;11 exists for FDTS/DF. In the case of the tree
`search, the quantity of interest is the distance between the pair of conflicting symbols with the
`smallest Euclidean distance. This value, termed fimin is determined by [3]
`
`(3)
`
`Notice that this is the same as the lower bound in (2). Thus, the minimum distance in FDTS/DF
`is a non-decreasing function of the depth r. Note that because fim,,, is the lower bound for d
`the performance ofFDTS/DF must converge to the MLSD bound. This distance (in dB) from dmin
`is shown as a function of Tin Figure 5. The only question remaining is how large the tree depth
`should be. This criterion is still dominated by the need to balance complexity against
`performance, but the distance properties provide some assistance in choosing a depth. For
`.
`.
`example, there is less incentive to increase the complexity from depth r= 1 to r-2, but increasing
`from r-2 to ;=3 results in a noticeable improvement for this particular channel.
`
`;
`111
`
`11
`
`,
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`September"26, 1995
`
`
`Page 4 of 19
`
`

`

`r
`
`Seagate Annual Report
`
`5
`
`4 Coding to Improve Signal Margin
`The bit error rate (BER) performance of optimal and suboptimal sequence estimators in
`an additive white Gaussian noise (A WGN) channel is dominated by the Euclidean distance
`between the two closest, conflicting sequences. For MLSD, it h·as been shown that at high data
`densities, the error rate performance is dominated by the error sequence e = ±(-2,+2,-2), where
`e is the difference between two valid sequences. An examination of the error sequences that
`correspond to /3,,,;n for FDTS/DF show that the most likely error sequence consists of three or
`more consecutive non-zero values in the error sequence. The Euclidean distance between the
`various conflicting sequences in the tree search indicates that eliminating error sequences
`containing ±( ... ,-2,+f,·2, ... ) will yield a significant improvement in distance.
`
`4.1 Coding Objective
`two pairs of
`the
`Figure 6 shows
`conflicting patterns that can cause the error
`sequence e = ±(-2,+2,-2). The sequences shown
`are non-return-to-zero (NRZ) sequences, which
`correspond to the write current waveform in a
`magnetic recording system. One or both of the
`conflicting patterns can be eliminated by requiring
`that the valid sequences contain no more than two
`consecutive transitions. A transition corresponds
`to a change in the level of the NRZ sequence.
`
`0, 0, 0, -2,+2,-2, 0, 0, 0
`
`--------n-......-..-_____,_____
`
`Figure 6. Sequence~ that cause e=±(-2,+2,-2).
`
`4.2 Maximum Transition Run Coding
`In order to increase the minimum sequence distance, a new class of codes, designated
`maximum transition run (MTR) codes, is introduce. These codes limit the number of consecutive
`transitions that can occur in a recorded sequence. As noted before, eliminating three or more
`consecutive transitions results in a significant increase in minimum distance. Therefore, the use
`of MTR=2;k codes is proposed for use in magnetic recording. The k constraint is the same as the
`k constraint used in RLL coding. The RLL d constraint for the MTR codes is d=O. If the written
`data is considered as an NRZI (non-return-to-zero inversion) sequence, where a 1 corresponds
`.to a change in the level of the corresponding NRZ sequence, and a O signifies no change, the
`MTR=2 constraint means that no more than two consecutive 1 'scan occur. For the remainder of
`this report, data and code words are assumed to be an NRZI representation.
`The properties of a MTR=2 code are discussed in the context of code design. The
`characteristics of several codes that could be readily applied to data storage are examined. The
`discussion will focus on block codes, in which there is a one-to-one mapping between an m-bit
`block of user bits and an n-bit codeword. More complex and efficient codes can be developed
`by using a state machine as the encoder. While the design techniques for these codes is beyond
`the scope of this paper, they can be applied to develop codes which incorporate the MTR
`constraint.
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 5 of 19
`
`

`

`r
`I
`
`Seagate Annual Report
`
`6
`
`0
`
`0
`
`4.3 Code Capacities
`A state diagram for a code that suppresses
`three or more consecutive transitions is shown in
`Figure 7. A sequence that meets the MTR=2
`constraint can be obtained by moving along the
`arrows connecting states and reading off the label
`above the arrow. This state diagram may be
`described algebraically with an adjacency matrix
`f
`A
`h
`1

`b
`th
`, w ere e ement aiJ is
`e num er o arrows
`originating at state i and ending at state j. For the
`state machine in Figure 7, the adjacency :a~ix[i' ~ ~ ]
`
`Figure 7. State diagram for codes that suppress three
`consecutive transitions.
`
`The capacity (or upper bound on the code rate) is given by [4]
`
`1 0 0
`
`(4)
`
`(5)
`
`where fl.max is the largest eigenvalue of A. For the adjacency matrix given by (4), the capacity is
`C = 0.8791. The capacities for various codes is given in Table I.
`
`Table I. Capacities of MTR=2;k codes
`
`I
`
`I
`
`I
`
`Code Constraint
`
`MTR=2;k:::o:,
`
`MTR= 2;k=l0
`
`MTR=2;k=9
`
`MTR=2;k=8
`
`MTR=2;k=7
`
`MTR=2;k=6
`
`MTR=2;k=5
`
`MTR=2;k=4
`
`MTR=2;k=3
`
`Capacity
`
`0.8791
`
`0.8782
`
`0.8774
`
`0.8760
`
`0.8732
`
`0.8680
`
`0.8579
`
`0.8376
`
`0.7947
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 6 of 19
`
`

`

`I Seagate Annual Report
`
`7
`
`The capacity of the code limits the achievable code rate. A large code rate is important
`for two reasons. First, for a given rate of user bits, coding with a low code rate will require a
`larger channel bandwidth. Second, a low code rate translates to a larger symbol density on the
`storage medium, which results in increased intersymbol interference (ISI). The sample rate for
`a channel operating at a user data rate of 100 Mbit/sec is shown in Table II for several RLL and
`MTR codes. Note that all the MTR codes except the rate 12/14 code can be implemented as a
`block code.
`Table II. Sampling rates required to obtain 100 Mbit/sec
`
`I
`
`Code
`
`RLL (0,4/4)
`
`MTR=2;k=7
`
`MTR=2;k=7
`
`MTR=2;k=8
`
`MTR=2;k=6
`
`MTR=2;k=6
`
`MTR=2;k=8
`
`RLL (1,7)
`
`I
`
`Code Rate
`
`I
`
`Sample Rate
`
`I
`
`8/9
`
`12/14
`
`16/19
`
`10/12
`
`9/11
`
`8/10
`
`4/5
`
`2/3
`
`113 MS/s
`
`117 MS/s
`
`119 MS/s
`
`120 MS/s
`
`122 MS/s
`
`125 MS/s
`
`125 MS/s
`
`150 MS/s
`
`4.4 Block Code Design
`Given the MTR constraint and an RLL k constraint, a computer search can be used to find
`the 2n m-bit codewords required to implement a block code. In order to meet the k constraint at
`the boundaries, codewords with k1+ 1 leading O's or k2+ I trailing O's, where k1+k2=k, are removed
`from the search. When k is even, k1=k2=k/2; when k is odd, k1- l =k2 or kr 1 =k1• Valid block codes
`with an MTR=2 constraint are shown for various combinations of n and kin Table III. Efficiency
`is defined as the ratio of code rate to capacity.
`
`B. Brickner, J . Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 7 of 19
`
`

`

`I Seagate Annual Report .
`
`Table m. Block codes with maximum transition run constraint: MTR=2;k
`
`8
`
`..
`- - cod.ewords - -
`rate efficiency available required
`n k
`---
`2 o.sooo
`2 0.5000
`4 ' 3 0.7S00
`
`4
`4
`
`4
`5
`
`' 4
`
`3 0.6000
`5
`4
`s s 3 0.6000
`s 6
`3 0.6000
`s 7
`3 0.6000
`5
`8
`4 0.8000
`4 0.6667
`6 s 4 0. 6667
`4 0.6667
`6
`6
`7
`0.6667
`6
`4
`6
`8
`4 0.6667
`0.6667
`6
`9
`4
`6 10 4 0. 6667
`5 0. 714 3
`7
`4
`7
`5
`5 0.7143
`7
`6
`5 0. 7143
`7
`7
`5 0.7143
`8
`7
`5 0. 7143
`7
`5 0. 7143
`9
`7 10 5 0.7143
`0 .7500
`4
`8
`6
`5
`6 0.7S00
`8
`8
`6 0.7500
`6
`8
`6 0.7S00
`7
`8
`8
`6 0.7S00
`6 0.7S00
`9
`8
`8 10 6 0.7500
`9
`6 0.6667
`4
`9
`5
`7 0. 7778
`6
`7 0. 7778
`9
`9
`7
`7 0. 7778
`8
`9
`7 0.7778
`9
`9
`7 0. 7778
`9 10 7 0.7778
`10
`7 0.7000
`4
`l~ s 7
`0 . 7000
`10
`6
`8 0.8000
`10 7
`8 0.8000
`10 8
`8 0.8000
`10 9
`8 0.8000
`10 10 8 0.8000
`11 4
`8 0.7273
`8 0. 7273
`11 5
`9 0. 8182
`ll. 6
`11 7
`9 0.8182
`11 8
`9 0. 8182
`9 0.8182
`l l 9
`ll 1 0
`9 0.8182
`12
`9 0.7S00
`4
`12 s 9 0.7S00
`12 6
`9 0.7500
`12 7
`9 0.7500
`12 8 10 0.8333
`12 9 10 0.8333
`12 10 10 0.8333
`
`O.S969
`0.5828
`0.8640
`0. 7163
`0. 6994
`0. 6912
`0.6871
`0. 9133
`0.7959
`0. 7771
`0.7'80
`0. 7634
`0. 7611
`0.7598
`0.7591
`0.8527
`0.8326
`0.8229
`0.8180
`0.81S4
`0. 8141
`0.8133
`0 . 8954
`0.8742
`0. 864 0
`0.8S89
`0.8562
`0.8548
`0.8540
`0.7959
`0 . 9066
`0.8960
`0.8907
`0.8879
`0.8864
`0.8856
`0.83S7
`0.8159
`0.9216
`0.9161
`0. 9133
`0. 9117
`0.9109
`0. 8682
`0. 8477
`0. 942'
`0. 9370
`0.9340
`0.9325
`0.9316
`0.8954
`0,8742
`0. 864 0
`0.8S89
`0.9513
`0.9497
`0. 9489
`
`- - codewords - -
`rat:e efticiency available r e quired
`
`n k m
`- - -
`13 4 10 0.7692
`13 5 10 0. 7692
`13 6 10 0 .7692
`7 10 0.7692
`13
`13 8 10 0. 7692
`13 9 10 0.7692
`13 10 11 0. 8462
`14 4 l l 0. 7 857
`14 5 l l 0.7857
`14 6 11 0.7857
`14 7 11 0.7857
`14 8 11 0.7857
`14 9 l l 0.7857
`l4 10 ll 0.78S7
`15 4 l l 0.7333
`15 5 12 0.8000
`15 6 12 0.8000
`15 7 12 0.8000
`15 8 12 0 .8000
`15 9 12 0.8000
`15 10 12 0.8000
`16
`4 12 0.7500
`16 5 13 0 .8125
`16 6 13 0.8125
`16 7 13 0.8125
`16 8 l3 0.8125
`16 9 13 0.812S
`16 10 13 0 . 8125
`17 4 13 0.7647
`17 5 13 0. 764 7
`17 6 14 0.8235
`17 7 14 0.823S
`17 8 14 0.8235
`17 9 14 0.8235
`17 10 l4 0 .8235
`18 4 14 0. 7778
`0 . 7778
`18 5 14
`6 15 0.8333
`1 8
`18 7 15 0.8333
`18 8 15 0.8333
`18 9 15 0 .8333
`18 10 15 0.8333
`19 4 15 0.7895
`19 5 15 0 .7895
`19 6 15 0.7895
`19 7 l6 0 . 8421
`19 8 16 0.8421
`19 9 16 0. 94'21
`19 10 16 0. 8421
`20 4 16 0.8000
`20 5 16 0.8000
`20 6 16 0.8000
`20 7 16 0.8000
`20 8 17 0 . 8500
`20 9 17 0.8500
`20 10 17 0.8500
`
`0. 9183
`0.8966
`0.8862
`0.8809
`0.8781
`0.8767
`0. 9635
`0 . 9380
`0. 9159
`0.9052
`0.8998
`0.8970
`0.8955
`0.8947
`0.8755
`0.9325
`0. 9216
`0.9161
`0.9133
`0.9117
`0 . 9109
`0.8954
`0 . 9471
`0.9360
`0.9305
`0. 927S
`0.9260
`0. 9252
`0.9129
`0.8914
`0. 9487
`0. 9431
`0.9401
`0.9386
`0.9377
`0.9285
`0.9066
`0.9600
`0.9543
`0.9513
`0. 94 97
`0.9489
`0.9425
`0.9202
`0.9095
`0.9644
`0. 9613
`0.9597
`0.9589
`0 .9551
`0.9325
`0 .9216
`0. 9161
`0.9703
`0.9687
`0.9679
`
`1188
`1471
`1712
`1841
`19S6
`2017
`2074
`2122
`2667
`3124
`3372
`3590
`3705
`3814
`3792
`4834
`5702
`6176
`6588
`6807
`7010
`6778
`8760
`10408
`11313
`12090
`12505
`12886
`12112
`15877
`18996
`20723
`22188
`22972
`23686
`21646
`28776
`34670
`37960
`40720
`42202
`43536
`38684
`52153
`63278
`69534
`74732
`77529
`80024
`69132
`94523
`115492
`127369
`137152
`142429
`147092
`
`1024
`1024
`1024
`1024
`1024
`1024
`2048
`2048
`2048
`2048
`2048
`2048
`2048
`2048
`2048
`4096
`4096
`4096
`4096
`4096
`4096
`4096
`8192
`8192
`8192
`8192
`8192
`8192
`8192
`8192
`16384
`16384
`16384
`16384
`16384
`16384
`16384
`32768
`32768
`32768
`32768
`32768
`32768
`32768
`32768
`6S536
`65S36
`65536
`65536
`65536
`65536
`65S36
`65536
`131072
`131072
`l31072
`
`6
`7
`8
`12
`13
`14
`1S
`lo
`20
`23
`26
`21
`28
`29
`30
`36
`41
`46
`49
`52
`53
`S4
`66
`75
`84
`89
`94
`97
`100
`116
`137
`1S4
`163
`172
`177
`182
`208
`247
`282
`299
`316
`325
`334
`372
`448
`514
`S49
`580
`597
`614
`664
`812
`938
`100S
`106'
`1097
`1128
`
`4
`4
`8
`8
`8
`8
`8
`16
`l6
`1'
`16
`16
`16
`16
`16
`32
`32
`32
`32
`32
`32
`32
`64
`64
`64
`64
`64
`64
`64
`64
`128
`128
`128
`128
`128
`128
`128
`128
`256
`2S6
`256
`256
`256
`256
`256
`512
`512
`512
`512
`512
`512
`512
`512
`512
`1024
`1024
`1024
`
`As an example of a MTR block code, the rate 4/5, MTR=2;k=8 block code is given in
`Table IV. The pairing of user data blocks and codewords were chosen so that the second bit in
`the codeword corresponds to the second bit in the user data. Many other pairings are possible;
`the one chosen is reasonable, but not necessarily optimal in terms of minimizing the logic
`implementation. Note that the k=8 constraint comes into effect when the codewords 10000 09001
`occur in sequence. The user data and codeword pairs are represented by
`X3XzX1Xo .. Y,v'y'v'1Yo
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 8 of 19
`
`

`

`I Seagate Annual Report
`
`The equations for the encoder are
`
`'
`
`-
`Yo = X<f1 + X<f2X3 + X<fzX3
`-
`Yi = Xo,X1Xz + X1XzX3 + X1X2X3
`Y2 = Xz
`-
`· Y3 = X1X3 + XoXzX3
`----
`Y4 = XoX1XzX3 + XoX1 + X1XzX3
`
`The corresponding decoder is
`
`Xo = Yo + Y1Y4
`XI = Y1 + YoY4 + Yv'4
`Xz = Y2
`-
`-
`X3 = Y3 + Y1Yi)'4 + Y1Y2Y4
`
`9
`
`(6)
`
`(7)
`
`Two-level NAND logic implementations of (6) and (7) are shown in Figure 8 and
`Figure 9, respectively. These logic rules are representative of those that could be developed for
`any of the MTR block codes.
`Table IV. A rate 4/5, MTR=2;k=8 block code: user data - codeword
`
`0000 - 10000
`_ 0001 - 00001
`0010- 00010
`0011 - 10001
`
`0100- 00100
`0101 - 00101
`0110- 00110
`0111 - 10110
`
`1000 - 01000
`1001 - 01001
`1010-01010
`1011 - 10010
`
`1100 - 01100
`1101 - 01101
`1110 - 10100
`1111 - 10101
`
`B. Brickner, J . Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 9 of 19
`
`

`

`Seagate Annual Report
`
`1 O
`
`x3 x2 xl xO
`
`. Figure 8. Logic Implementation of a rate 4/5 MTR=2;/c=i8 encoder.
`
`y4 y3 y2 yl yO
`
`yl
`
`y3
`
`y4
`
`xO
`
`xl
`
`x3
`
`Figure 9. Logic Implementation of a rate 4/5 MTR=2;k=8 decoder.
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 10 of 19
`
`

`

`Seagate Annual Report
`
`11
`
`y'
`
`4.5 Detector Design
`In order to obtain the full benefits of the MTR=2 coding, the detector structure must be
`modified so that illegal paths are removed from consideration. For example, in the r=3 FDTS,
`the paths
`
`are automatically eliminated. These are shown shaded in Figure 10. Additionally, paths which
`violate the constraint can be elirp.inated by considering the previously decided symbol. In the case
`of a r=2 FDTS, the path corresponding to the previous decision, ak.3 is eliminated; i.e.,
`(ak, ak-1' ak_2, (2~_3) = ±(+1, -1, +1, - 1)
`
`The two possibilities are shown in Figure 11. Although the examples given here and the
`simulation results presented later are based on FDTS/DF, the MTR coding techniques will also
`yield improved performance when used with other sequence estimators such as maximum ·
`likelihood sequence detection and reduced state sequence estimation.
`
`Figure 10. FDTS r-3 showing paths eliminated by
`MTR=2;k codes.
`
`F igure 11. FDTS r-2 showing paths eliminated by
`MTR=2;k b~sed on ak.J•
`
`5 Signal Space Detection
`A signal space representation of the detection process involves mapping a received data
`vector into an M-dimensional space. This received vector consists of the current sample and 7
`previous samples; thus, M = T + 1. The detection problem is a matter of determining which of
`the possible noiseless points is closest to the received data. For a pair of points, this can be
`interpreted as determining on which side of the orthogonal bisector of the segment between the
`two points, the input sample lies. When several points are involved, the boundary is composed
`of several linear segments. In the· next section, the design of these boundaries is considered.
`
`8. Brickner, J . Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 11 of 19
`
`

`

`'
`
`Seagate Annual Report
`
`5.1 Implementation of Boundaries
`A linear signal space boundary can be
`implemented using an FIR filter, an offset term,
`and a binary slicer (or single-bit quantizer).
`Consider Figure 12, where two point, f and g are
`shown separated by a linear boundary. A point in
`the shaded region is closest to point f; conversely,
`a point in the unshaded region is closest to g.
`The boundary between two points is
`defined by the locus of point equidistantly spaced
`from the two points being separated. Equivalently,
`the square of the distance may he used, which
`gives
`
`This can be simplified to
`
`12
`
`:::;(cid:173)
`~ Of -- -- --+------'
`I<
`
`_,
`
`(g0,g1)
`
`_,
`- 2L - -~- - - - ' -- -~ - - - J
`-2
`0
`x(k)
`
`Figure 12. A linear boundary separating two points in
`two-dimensional space
`
`T
`
`(8)
`
`(9)
`
`The line ( or hyperplane in high dimensions) can be realized by using an FIR filter augmented
`with an adder to provide an offset term. The result is
`t L W;x1c-; + c = 0
`
`(10)
`
`i• O
`
`where W is the FIR weight vector defined by
`
`and the offset term is
`
`C = t (J;2 - g/)
`
`i:O
`
`(11)
`
`(12)
`
`For the remainder of this section, the term FIR filter will signify a standard FIR filter augmented
`with an offset term. The sign of the output determines which side of the boundary x is on. Thus,
`a simple slicer converts the FIR output to a binary partitioning of the signal space. A block
`diagram for implementing a linear boundary is shown in Figure 13.
`
`8. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 12 of 19
`
`

`

`Seagate Annual Report
`
`13
`
`Figure 13. Implementation of a linear boundary using
`an FIR filter
`
`Figure 14. Two-dimensional
`representation for D.=2.5
`
`x(lo.)
`
`signal
`
`space
`
`In general, performing detection for d = 0 coding requires more than one FIR filter. When
`multiple hyperplanes are used to define the boundary, a simple logic circuit using the FIR/slicer
`values as inputs can be used to make the decision. As an example, the 2-dimensional case
`corresponding to D,, = 2.5 is shown in Figure 14, where the shaded region corresponds to
`ak-1 = +l.
`Although it may not be obvious, a feedback loop internai to the detector is required to
`maintain the desired minimum distance. The purpose of this loop is to cancel ISI terms inside the
`FIR filters due to previously determined symbols. For example, without an internal feedback loop,
`the noiseless points in a 3-dimensional space would take the form
`x = (xk, xk-1, xk-2) = (akbo +ak_1b1 +ak_2b2, ak_1bo +ak_zb2 +ak_3b3, ak_zbo +ak-i2 +ak_4b3)
`
`Because a detector operating in 3 dimensions has a delay of r-=2, the symbols ak.3 and ak.4 have
`already been determined, so their inclusion does not provide any additional information. In fact,
`if these are not removed, each doubles the number of symbols in space, because the detector must
`consider all of the case where each is ±1 separately. Examination of these added points has
`indicated that the overall effect is a reduction in the minimum distance. The feedback operation
`in signal space can be viewed as a translation of the decision boundary so that it is in the correct
`position for a set of data symbols consistent with the past decisions. After applying feedback, the
`coordinates in 3-dimensional space become
`x = (xk, xk-1' xk-2) = (akbo+ak-1b1 +ak-2b2, ak-1bo+ak-2b1, ak_zb~)
`
`5.2 Simplifications
`Signal space detection will have the same distance properties as FDTS/DF, provided a
`hyperplane (boundary) exists for each pair of conflicting points. Conflicting points are simply two
`points in the M-dimensional space, one of which corresponds to the symbol ak•T=+ 1 and the other
`to ak•r=-1. Thus, a total of 22
`' boundaries are required; e.g. an implementation of r-=3 would
`require 64 boundaries. Clearly, this is more complex than a direct implementation of FDTS,
`which would require only 2t+1=16 multiplies for the branch metric calculations. Fortunately,
`symmetry allows a substantial reduction in the number of multipliers for the SSD (signal space
`detector).
`If 64 FIR filters are implemented in 4-dimensional space, a total of 256 multiplies and
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 13 of 19
`
`

`

`Seagate Annual Report
`
`14
`
`64 additions are required, not including the internal feedback. Because the coordinate in the
`( rt-1 t dimension is determined by ak-rbo, the corresponding multiplier is Wr = 4. A total of 64
`multipliers may be removed by dividing through by this term. Further, the symmetry of the FIR
`portion (not including the offset) will be identical, and the only difference will be that the
`negative of the offset for one is added to the second. This was illustrated in Figure 14, where two
`of the lines have the same slope, but different intercepts (offsets). These simplifications are
`mentioned, not to propose the use of a full set of hyperplanes, but rather to indicate that there
`are many ways to reduce the complexity of these FIR filters.
`The two dimensional case presented earlier indicates an important simplification; one of
`the boundary lines was unnecessary and could be removed with affecting performance. The same
`will be true in higher dimensions so that a set of boundaries may removed without degrading the
`detector. Because the detector performance is dominated by pairs separated by /3m;m the boundaries
`between points with distances much greater thanf3min can be translated and rotated to some degree
`without significantly affecting the error rate. A set of hyperplanes may be placed in such a way
`as to separate these pairs so that several pairs share the same boundary. Methods for adaptively
`placing a small number of hyperplanes to achieve optimal performance under that constraint are
`being explored. The signal space implementation has an added savings because the path metric
`update required for FDTS is eliminated.
`As an example of the structure that was discussed, consider the 2-dimensional case,
`corresponding to FDTS/DF with r=l, pictured in Figure 15. This corresponds to the signal space
`in Figure 14. If W,.(j) corresponds to the jlh term of thejth boundary (or FIR filter), then the filter

`weights are
`
`The offset terms are given by
`
`c'U) = cU)
`W1U) '
`
`j = 1,2
`
`(13)
`
`(14)
`
`Where the W,(j) and c(j) terms are given by equations (11) and (12). W'(l) sets the slope of the
`two parallel lines, while W'(3) specifies the line that is closest to the x1c., axis.
`
`5.3 Relationship to FDTS/DF
`The signal space detector was developed in an attempt to simplify the FDTS algorithm;
`therefore, it is instructive to examine parallels in the two methods. In each case, an input
`sequence of fixed length is compared to all possible noiseless sequences, and a decision is made
`in favor of the sequence that is closest in Euclidean distance to the input. With FDTS, this
`distance measurement is made by computing the squared distance of a single input from the
`noiseless symbols and adding this branch metric to a path metric accumulator. In the case of
`signal space detection, filters are used to form boundaries between regions corresponding to
`conflicting symbols. The location of the input symbol in relation to these boundaries is then used
`to make a decision. The output of the detector is then used to cancel ISI at the input, due to these
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 14 of 19
`
`

`

`I
`
`Seagate Annual Report
`
`15
`
`-b1
`+b1
`..___--- -~ o~----~
`
`Figure 15. Two-Dimensional Signal Space Detector
`
`past symbols. There is an important relationship between the ip.temal feedback used in the signal
`space detector and FDTS. The internal feedback cancels ISI due to symbols that have already
`been decided~ but in the detector delay line, rather than at its input. In FDTS, this action is
`accomplished by discarding half of the tree with every decision so that the !SI from the symbol
`that was decided is a constant offset in all of the path metrics.
`
`5.4 Signal Dependent Threshold
`Examination of Figure 14 shows that for any value of xk the boundary between the two
`regions intersects xk-I at a single point. Thus, a decision can be made by comparing xk-I with the
`boundary point, denoted O(xJ. Thus the decision rule is

`
`(15)
`
`where SGN is the signum function which returns + 1 when the argument is greater than O and -1
`otherwise. As with the FIR formulation of signal space detection, an internal feedback loop is
`required. A block diagram for this digital implementation is shown in Figure 16, where the ROM
`serves as a lookup table for the functional mapping from xk to the bow1dary point.
`
`+b 1
`-b 1
`
`ROM
`Figure 16. Using a ROM to implement a signal dependent threshold
`
`8. Brickner, J. Moon
`
`University of Minnesota
`
`September 26, 1995
`
`
`Page 15 of 19
`
`

`

`Seagate Annual Report
`
`16
`
`6 Simulation Results
`The performance of the detectors and coding schemes discussed was investigated using Monte
`Carlo simulations. During the simulations, the equalizers were optimized at minimize the mean
`squared error (MSE) at the output, for each SNR point plotted. A minimum of 500 errors were
`counted at each point. During the simulations, the SNR was increased until the bit error rate
`(BER) fell below 1 error in 105 bits. All of the simulations were performed using the MR
`response, except for the signal space detector (SSD) simulations, which used a Lorentzi~ pulse.
`In all ·cases, the user density was Du=2.5.
`
`6.1 Detector Performance
`The performance of the FDTS/DF .detector with a d=O code is shown in Figure 17. As
`
`1E-01
`
`1E-02
`
`1 E-03
`
`1E-04
`
`Q)
`+-
`0 u::
`
`I..
`0
`I..
`I.. w
`+-co
`
`---DFE
`
`-+-
`r-=1
`~
`r=2
`-a-
`r=3
`~
`
`.r=4 --.-
`
`r=5
`
`1 E-0 5 +--t----+--+--
`5
`7
`6
`8
`
`--+--+--t----+--+---+--'--ffi-....u....:i
`9
`10
`11
`12 13 14 15
`16
`SNR (dB)
`
`Figure 17. Simulated performance of FDTS/DF at D.=2.5, with a d=-0 code
`
`predicted by the fimin curve, there is• a noticeable increase in detector performance from r=O to r= I
`and from r=2 to r=3, but increasing from r=3 to r-=4 yields a minimal gain. The performance of
`FDTS/DF for r=l and r=3 using the (0,4/4) code is compared against PRML, EPRML, and DFE
`in Figure 18. The curve Q(dm1j2a) gives the approximate l'vfLSD bound.
`
`B. Brickner, J. Moon
`
`University of Minnesota
`
`Se ptember 26, 1995
`
`
`Page 16 of 19
`
`

`

`Seagate Annual Report
`
`17
`
`1E-01
`
`1E- 02
`
`(I)
`+-
`0
`~
`
`L 1E-03
`0
`L
`L w
`+-
`CD
`
`1E-04
`
`---PRML
`
`--+-
`EPRML
`~
`DFE
`-s-
`r=l
`~
`r=3
`--A-
`Q(dmin/2a-)
`
`1 E -0 5 +--,---+-
`7
`5
`
`-+-----'T-----311E--'-+->--+-----,---i
`..---+-----.----+-~
`9
`1 7
`13
`15
`11
`19
`SNR (dB)
`
`Figure 18. Comparison of Several Detection Methods
`
`6.2 Coding Gain
`The use of a code which eliminates the data sequences most likely to cause errors has
`been proposed as a method for improving detector margin. To verify these claims, simulations
`were performed using a rate 4/5 and rate 16/19 MfR=2;k code with a FDTS/DF detector. The
`resulting error rate curves are shown in Figure 19 and Figure 20.
`A summary of the performance for the three codes is shown in Figure 21. This graph
`reveals several points of interest. As noted in the discussion of /3111111
`, the distance increase from
`one tree depth to the next is not a smooth function. However, the use of a MTR=2;k code
`smo

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket