Professional Documents
Culture Documents
6, JUNE 2021
Abstract— In this work, a Bose-Chaudhuri-Hocquenghem syndrome can be termed the ‘final syndrome’. A non-zero
(BCH) code decoder based on the Meggitt algorithm is imple- final syndrome indicates that the decoding result is incorrect,
mented for wireless body area network (WBAN) applications. however, checking the final syndrome is not an intrinsic
Compared to other implementations based on the popular
Peterson algorithm, the proposed decoder has the extra capability feature of the Peterson algorithm. In the proposed decoder, the
of checking the syndrome for the decoding result, and is able to syndromes corresponding to a predetermined set of correctable
detect 20 times more failed decoding results without introducing error patterns are stored in the decoder, and the errors are
additional complexity. When the proposed decoder is used as sequentially corrected by cyclically shifting the received vector
the hard-decision decoder (HDD) core of a Chase-2 decoder, the stored in a first-in-first-out (FIFO) buffer. The final syndrome
bit-error rate (BER) performance can be improved by about
0.3 dB because of the reduction in undetectable errors. Based is derived once all the cyclically shifted versions of the
on a comparison of the indices for corrected bits and those of received vector are processed. Notification of a failed decoding
the flipping bits, a test pattern reduction technique is proposed attempt is given if the final syndrome is non-zero. By using the
for the Chase-2 decoder that does not sacrifice the error-rate proposed decoder based on the Meggitt algorithm, the number
performance. The synthesis results show that the hardware of detectable failed decoding attempts increases by more than
complexity for the HDD core can be reduced by more than 50%
using a 90 nm standard cell technology. 20 times.
Based on the Chase-2 decoder [9], many BCH decoders
Index Terms— BCH code, wireless body area network for WBAN applications are able to provide a soft-decision
(WBAN), cyclic code, Chase-2 decoder.
decoder (SDD) result [3], [4], and their hard-decision decoder
I. I NTRODUCTION (HDD) cores are based on the Peterson algorithm. It is possible
that a candidate that has a non-zero final syndrome is selected
T HE IEEE 802.15.6 standard is planned for wireless body
area network (WBAN) applications [1], and adopts the
(63,51) Bose-Chaudhuri-Hocquenghem (BCH) code [2] and
as the decoding result from the Chase-2 decoder. When the
HDD core is replaced with the proposed decoder based on the
its shortened (31,19) code in order to enhance the reliability Meggitt algorithm, an invalid candidate can be rejected when
of data transmission. Many decoders have been implemented it is detected as a failed decoding attempt. The simulation
for WBAN applications [3], [4] [5], and most are based on the results show that the bit-error rate (BER) performance can be
Peterson algorithm [6]. The syndrome corresponding to the improved by about 0.3 dB with the assistance of the reduction
received vector, which is termed the ‘initial syndrome’ in this in undetectable errors. In addition, a test pattern reduction
letter, is first computed by the decoder, then the coefficients technique is proposed for the Chase-2 decoder. By comparing
for the error location polynomial (ELP) are derived based the indices of the bits corrected in the first decoding attempt
on the syndrome. The roots of the ELP that indicate the with those of the flipping bits, the number of test pattern can
locations of the error bits can be found using the Chien search be reduced and the error-rate performance can be maintained.
process. A failed decoding attempt occurs when the received The HDD core is realized using 90 nm CMOS standard cell
vector contains more errors than the correction capability. If a technology. The synthesis result shows that the total area of
failed decoding attempt is detected, a re-transmission can be the design is about 2100 μm2 , which is equivalent to about
requested and there may be a better opportunity for the correct 750 2-input NAND gates. Compared to the implementation
data to be successfully received. For decoders based on the based on the Peterson algorithm, which occupies about 5200
Peterson algorithm, a failed decoding attempt is detected when μm2 when using the same technology, the proposed decoder
an ELP that has valid roots cannot be derived from the initial only requires a hardware complexity of about 41%.
syndrome [3], [5], [7].
Thanks to the fact that BCH codes are also cyclic codes, II. BCH C ODES AND THE P ETERSON A LGORITHM
the decoder implementated in this work is based on the A BCH code is a subclass of a cyclic linear block code. For
Meggitt algorithm [8], which allows a more reliable detection an (N, K) cyclic code, a length-K information sequence u is
for the failed decoding attempt that is achieved by checking encoded to a length-N codeword v, which can be respectively
the syndrome corresponding to the decoding results. This represented as polynomials of degrees N and K, The encoding
process can be represented as v(X) = u(X)g(X), where
Manuscript received January 27, 2021; revised February 23, 2021; accepted g(X) is the generator polynomial for the code, and X N + 1 =
March 9, 2021. Date of publication March 17, 2021; date of current version
June 10, 2021. The associate editor coordinating the review of this letter and h(X)g(X), then all cyclically shifted versions of v(X) are
approving it for publication was X. Jiang. also codewords.
The author is with the Department of Electrical Engineering, Chang Gung The (63, 51) BCH code is constructed from GF(26 ), and the
University, Taoyuan 33302, Taiwan, and also with Chang Gung Memorial
Hospital, Taoyuan 33302, Taiwan (e-mail: akula.lee@gmail.com). code length is equal to N = 26 − 1. Its generator polynomial
Digital Object Identifier 10.1109/LCOMM.2021.3066246 g(X) is the LCM of the two minimum polynomials, Φ1 (X)
1558-2558 © 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.
LEE: EFFICIENT BCH DECODER FOR WBAN APPLICATIONS 1767
and Φ3 (X). When the Peterson algorithm is applied to decod- A. Decoding Algorithm for the Proposed HDD Core
ing the BCH code, the first step is to compute the syndrome. Based on the Meggitt algorithm, the BCH code is decoded
The received vector r can be denoted as r(X) = v(X)+e(X), as a cyclic code. The received vector stored in a FIFO
where e(X) is the error pattern. Divide r(X) by Φ1 (X) buffer is cyclically shifted, and the error patterns are shifted
and Φ3 (X), the syndrome components corresponding to the at the same time. Since all cyclically shifted versions of a
remainders s1 (X) and s3 (X). These are combined as the codeword are also codewords, the decoder is designed to
syndrome s = [s1 , s3 ]. Since all codewords are multiples of identify any error located in the final register of the FIFO
g(x), they must also be multiples of both Φ1 (X) and Φ3 (X). buffer, i.e., X N −1 , for the stored vector. This means that only
A non-zero syndrome indicates that the received vector is not those syndromes corresponding to the patterns that have an
a codeword. The second step is identifying the coefficients of error located at X N −1 need to be recorded in the decoder,
the ELP based on the syndrome. The (63, 51) BCH code is and all the correctable patterns can be detected when one of
designed to correct two errors, and its ELP is represented as their errors is shifted to X N −1 .
a degree-2 polynomial: After the initial syndrome is derived, the syndromes cor-
δ(X) = 1 + δ1 X + δ2 X 2 , (1) responding to the cyclically shifted versions of the received
vector can be obtained. For instance, let r(1) (X) denote the
where δ1 = s1 and δ2 = (s31 + s3 )/s1 . The final step is one digit cyclic shift right version on the received vector r(X),
(1)
to identify the roots of the ELP by substituting all GF(26 ) and s1 (X) denotes the remainder after dividing r(1) (X) by
(1)
elements into (1), where the substitution process is known as Φ1 (X). The following equations show that s1 (X) can be
the Chien search. Each root of the ELP is corresponds to a derived from s1 (X):
single error bit index. It can be observed that when
r(1) (X) = rN −1 + r0 X + · · · + rN −2 X N −1
s1 = 0, s3 = 0, (2) = rN −1 + r0 X + · · · + rN −2 X N −1
the coefficient δ2 cannot be derived, and consequently the roots +rN −1 X N + rN −1 X N
of the ELP presented in (1) cannot be evaluated. In this case, = rN −1 + Xr(X) + rN −1 X N
the decoding process should be aborted, and a failed decoding = rN −1 (X N + 1) + Xr(X)
is altered [2].
= rN −1 Φ1 (X)h(X) + X(Φ1 (X)a(X) + s1 (X))
= rN −1 Φ1 (X)h(X) + XΦ1 (X)a(X) + Xs1 (X)
III. T HE P ROPOSED M EGGITT-BASED D ECODING
= Φ1 (X)(rN −1 h(X) + Xa(X))
Although the constraint from (2) is popular in many (1)
+Φ1 (X)a(X) + s1 (X). (3)
decoders based on the Peterson algorithm, it is only able to
detect a small number of the total failed decoding attempts. The last two rows of the previous equation show that
(1)
Let αj of GF(26 ) denote the value of the syndrome component Xs1 (X) = Φ1 (X)a(X) + s(1) (X), then s1 (X) can also be
s1 (X) corresponding to the error occuring at the j-th bit of derived as the remainder of Xs1 (X) being divided by Φ1 (X),
the receiver. When a vector containing three errors occurs at where multiplying X by s1 (X) is equal to shifting s1 (X) by
the positions of j1 , j2 and j3 is received, s1 (X) = 0 only (1)
one digit. Similarly, the syndrome s3 (X) corresponding to
happens if αj1 +αj2 +αj3 = 0, i.e., αj3 = αj1 +αj2 . However, Φ3 (X) can be derived from s3 (X).
consider that j1 and j2 are fixed, for the other 60 j3 values, this Then, it can be expected that if s is the syndrome cor-
uncorrectable vector cannot be detected by (2). In other words, responding to a correctable error pattern e, then the syn-
Eq. (2) can only detect about 1/61 = 0.0164 uncorrectable dromes s(1) , s(2) , · · · , s(N −1) corresponding to all the N − 1
vectors. The simulation results show that the constraint from cyclic shift versions of e can be derived from s, where
(2) is only able to detect less than 2% of the total number of (n) (n)
s(n) = [s1 , s3 ], n = 1, 2, · · · , N − 1. This means that,
failed decoding attempts. as long as s is stored in the decoder, all error patterns
It can be expected that, if the final syndrome correspond- e(1) , e(2) , · · · , e(N −1) can be detected by cyclically shifting
ing to the decoding result is derived, more failed decoding the received vector stored in the FIFO buffer.
attempts will be detected. According to our experiments, a
non-zero final syndrome can be used to detect more than 50%
of the failed decoding attempts. According to our experiment B. Chase-2 Decoding Based on the Proposed HDD Core
for those received vectors containing three error bits, the final The frame error rate (FER) performance for both the (63,51)
syndrome cannot detect the failed decoding attempts when and (31,19) codes are presented in Fig. 1, where BPSK
only the received vectors decoded as the other codewords are modulation is used and the signal is transmitted through
different to the transmitted codewords. the AWGN channel. The rates of undetectable errors are
Since deriving the final syndrome is not an intrinsic feature also demonstrated. Because less than 2% of the total failed
of the Peterson decoder, the proposed decoder presented decoding attempts can be detected using the constraint in
in this work is based on the Meggitt algorithm, which is (2), the undetectable error rate is almost identical to the
suitable for short cyclic codes that have a small correction FER. For detections using the final syndrome, more than 50%
capability. of the failed decoding attempts can be identified, then the
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.
1768 IEEE COMMUNICATIONS LETTERS, VOL. 25, NO. 6, JUNE 2021
Fig. 1. FER and undetectable error rates for a (63, 51) BCH code and its Fig. 2. BER performance for the (63, 51) BCH code and its (31, 19) shortened
(31, 19) shortened code. code.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.
LEE: EFFICIENT BCH DECODER FOR WBAN APPLICATIONS 1769
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.
1770 IEEE COMMUNICATIONS LETTERS, VOL. 25, NO. 6, JUNE 2021
Fig. 4. The proposed decoder for WBAN applications based on the Meggitt algorithm.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.