Vector signaling code with improved noise margin
11716227 · 2023-08-01
Assignee
Inventors
Cpc classification
B41J2/00
PERFORMING OPERATIONS; TRANSPORTING
H04L1/00
ELECTRICITY
H04L25/02
ELECTRICITY
H04L25/49
ELECTRICITY
H04L25/0272
ELECTRICITY
International classification
H04L25/49
ELECTRICITY
B41J2/00
PERFORMING OPERATIONS; TRANSPORTING
H03M5/14
ELECTRICITY
H04L1/00
ELECTRICITY
Abstract
Methods are described allowing a vector signaling code to encode multi-level data without the significant alphabet size increase known to cause symbol dynamic range compression and thus increased noise susceptibility. By intentionally restricting the number of codewords used, good pin efficiency may be maintained along with improved system signal-to-noise ratio.
Claims
1. A method comprising: receiving a set of symbols of a multi-level orthogonal differential vector signaling (ODVS) codeword, each symbol received in parallel via a respective wire of a plurality of wires of a multi-wire bus, the multi-level ODVS codeword corresponding to an orthogonal matrix transformation of an input vector selected from a set of input vectors that disallows extreme post-transformation alphabet values; generating a set of multi-level outputs, each multi-level output generated by forming a respective linear combination of the received set of symbols of the multi-level ODVS codeword, the respective linear combination associated with a respective sub-channel of a plurality of mutually orthogonal sub-channels; comparing each multi-level output of the set of multi-level outputs to at least two different reference voltages to form a respective set of sliced outputs of a plurality of sets of sliced outputs; and generating a set of output data bits based on the plurality of sets of sliced outputs.
2. The method of claim 1, wherein each multi-level output is compared to two different reference voltages to generate a respective set of two sliced outputs, the respective set of two sliced outputs having one of three possible states.
3. The method of claim 1, wherein generating the set of output data bits comprises performing a modulus conversion on the plurality of sets of sliced outputs.
4. The method of claim 1, wherein each multi-level output is compared to three different reference voltages to generate a respective set of three sliced outputs, the respective set of three sliced outputs having one of four possible states.
5. The method of claim 4, wherein the respective set of three sliced outputs is directly converted into a respective set of two output data bits of the set of output data bits.
6. The method of claim 1, further comprising generating the symbols of the multi-level ODVS codeword by mapping a set of input bits to the input vector of the set of input vectors, and performing the orthogonal matrix transformation on the input vector by forming a weighted summation of the plurality of mutually orthogonal sub-channels, each mutually orthogonal sub-channel weighted by a corresponding pulse amplitude modulation (PAM)-M element of the input vector, wherein M is an integer greater than 2.
7. The method of claim 6, wherein at least one element of the input vector is a ‘0’.
8. The method of claim 1, wherein the plurality of mutually sub-channel vectors collectively form a Hadamard matrix.
9. The method of claim 8, wherein the input vector comprises three pulse amplitude modulation (PAM)-3 elements, and wherein the Hadamard matrix is a size four Hadamard matrix.
10. The method of claim 9, wherein the post-transformation alphabet comprises five values.
11. An apparatus comprising: a linear combinatorial network configured to: receive a set of symbols of a multi-level orthogonal differential vector signaling (ODVS) codeword in parallel, each symbol received via a respective wire of a multi-wire bus, the multi-level ODVS codeword corresponding to an orthogonal matrix transformation of an input vector selected from a set of input vectors that disallows extreme post-transformation alphabet values; and to generate a set of multi-level outputs, each multi-level output generated by forming a respective linear combination of the received set of symbols of the multi-level ODVS codeword, the respective linear combination associated with a respective sub-channel of a plurality of mutually orthogonal sub-channels; a set of pulse amplitude modulation (PAM)-X slicers configured to compare each multi-level output of the set of multi-level outputs to at least two different reference voltages to form a respective set of sliced outputs of a plurality of sets of sliced outputs, wherein X is an integer greater than two; and a decoder configured to generate a set of output data bits based on the plurality of sets of sliced outputs.
12. The apparatus of claim 11, wherein each PAM-X slicer is a PAM-3 slicer configured to compare each multi-level to two different reference voltages to generate a respective set of two sliced outputs, the respective set of two sliced outputs having one of three possible states.
13. The apparatus of claim 11, wherein the decoder is configured to generate the set of output data bits by performing a modulus conversion on the plurality of sets of sliced outputs.
14. The apparatus of claim 11, wherein each PAM-X slicer is a PAM-4 slicer configured to compare a corresponding multi-level output to three different reference voltages to generate a respective set of three sliced outputs, the respective set of three sliced outputs having one of four possible states.
15. The apparatus of claim 14, wherein the decoder is configured to convert each respective set of three sliced outputs directly into a respective set of two output data bits of the set of output data bits.
16. The apparatus of claim 11, further comprising an encoder configured to generate the symbols of the multi-level ODVS codeword by (i) mapping a set of input bits to the input vector of the set of input vectors, and (ii) performing the orthogonal matrix transformation on the input vector by forming a weighted summation of the plurality of mutually orthogonal sub-channels, each mutually orthogonal sub-channel weighted by a corresponding pulse amplitude modulation (PAM)-M element of the input vector, wherein M is an integer greater than 2.
17. The apparatus of claim 16, wherein at least one element of the input vector is a ‘0’.
18. The apparatus of claim 11, wherein the plurality of mutually sub-channel vectors collectively form a Hadamard matrix.
19. The apparatus of claim 18, wherein the input vector comprises three pulse amplitude modulation (PAM)-3 elements, and wherein the Hadamard matrix is a size four Hadamard matrix.
20. The apparatus of claim 19, wherein the post-transformation alphabet comprises five values.
Description
BRIEF DESCRIPTION OF FIGURES
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
DETAILED DESCRIPTION
(11) When using the Hadamard Transform, or some other orthogonal transform, to construct vector signaling codes the code alphabet size may grow to be considerably larger than that of the input data alphabet. As one example, the ENRZ code described in FOX II and called H4 code by Cronie I encodes three binary data bits into a four element codeword with a four value alphabet. Typically, the larger the code alphabet size, the smaller the swing at the comparator outputs used to detect the code, and therefore the smaller the SNR of the system in terms of vertical eye opening. In the case of ENRZ, the code is constrained to only require two of the four possible alphabet values in any given codeword, thus avoiding this problem. For codes not naturally providing such constraints, it may be desirable to decrease the code alphabet size at the expense of (slightly) lowering the pin-efficiency. Methods are described to achieve this kind of tradeoff.
Multi-Level Data and Orthogonal Vector Signaling Code
(12) Expanding on the description taught in Cronie I and other prior art, the construction of orthogonal vector signaling codes encoding multi-level Input Data proceeds as illustrated in
(0,c.sub.1,c.sub.2, . . . ,c.sub.N−1)*A (Eqn. 1)
(13) wherein the c.sub.i may belong to a constellation of PAM-M values, and wherein PAM-M denotes the set {M−1, M−3, . . . , 3−M, 1−M}/(M−1). By convention, the matrix multiplication of Equation 1 is generally combined with a normalization operation, in which all results are divided by a scaling factor to keep the range of results within the bounds +1 to −1. The N coordinates of the scaled results 225 are transmitted on the N communication wires 235 using drivers 230.
(14) At the receiver, the received values (v.sub.1, . . . , v.sub.N) on the wires are processed by a receiver frontend 240 that performs tasks such as continuous time linear equalization and amplification to compensate for transmission line losses, and the processed received signals 245 are forwarded to a linear combinatorial network 250. The result of this network 255 is functionally equivalent to performing the matrix multiplication
(15)
(16) where B is the matrix consisting of rows 2, . . . , N of A in the case where the sum of the columns of A is nonzero in the first position. More generally, if the sum of the columns of the matrix A is nonzero in position k, say, then B consists of all rows of A except row k. Again, by convention this matrix multiplication of Equation 2 is generally combined with a normalization operation in which all results are divided by a scaling factor to keep the range of results within the bounds +1 to −1.
(17) If A is a Hadamard matrix, one example of a suitable linear combinatorial network is that of the well-known Fast Walsh Transform; another example is the multi-input differential comparator of Holden I operated in a linear output mode.
(18) The individual components of this new vector are then passed through a PAM-M detector 260 wherein the thresholds of the detector are set appropriately to detect the M levels produced by the matrix multiplication of Eqn. 2 at 255. These detected results 265 are then decoded 270 to produce Output Data.
(19) In some embodiments, the PAM-M detector may be a PAM-3 detector 420 as shown in
Alphabet Size
(20) The individual coordinates after the multiplication of Equation 1 may belong to an alphabet of size larger than M, which is the size of the original alphabet of the c.sub.i. For example, where A is a Hadamard matrix, the size of the alphabet (that is, the total number of different signal levels transmitted on the wires) may grow to (N−1)*(M−1)+1, which can be quite a large number. More significantly, the range of values represented by this enlarged alphabet also grows, thus the normalization operation required to scale the matrix multiplication results to the range +1 to −1 (e.g. so that they may be transmitted over a physical communications medium using fixed and thus limited driver voltage sources) requires division by larger scaling factors, resulting in the steps between alphabet values shrinking. Thus, when transmitted over a noisy communications channel, these increasing scale factors can lead to a reduced signal-to-noise ratio (SNR) on the wire.
(21) This expansion of the matrix multiplication result range is similar to the increased crest factor observed in CDMA communications systems as the number of modulation channels is increased. Either additional transmission power must be provided to support higher peak signal strength, or the overall transmission envelope is maintained within a constrained range and the individual channel SNR decreases.
(22) To avoid these reduced SNR effects, it is desirable to constrain the alphabet required to communicate the results of the Equation 1 multiplication. Cronie II describes pruning of the symbol constellation produced by an encoding matrix multiplications as in Equation 1 to maximize the Euclidian distance between the signals generated by the encoding operation relative to the noise power of the communications channel. Although that constraint method improves SNR, it also significantly reduces the amount of data transmitted per pin or pin efficiency, and does not directly address the increased normalization scaling factor required.
Enhancing Detection SNR
(23) In the method to be applied here we choose the vector (c.sub.1, c.sub.2, . . . , c.sub.N−1) from a constrained set of vectors, also called a “pre-code” in the following, in such a way as to decrease the alphabet size produced by the multiplication of Equation 1 by eliminating extreme values, thus eliminating the need for larger normalization factors for the results. In at least one embodiment, the constrained set of vectors is determined as a portion of a maximal set of vectors, and the transformation applied representing multiplication of the constrained set of vectors with a non-simple orthogonal matrix forms constrained-alphabet codewords of a constrained-alphabet vector signaling code. These constrained-alphabet codewords include elements having values selected from a constrained post-transformation alphabet formed by the transformation of the constrained set of vectors. This constrained post-transformation alphabet is a reduced version excluding extreme values (i.e. values having large respective magnitudes) of a non-constrained post-transform alphabet that would be formed by applying the transformation to the maximal set of vectors. As mentioned above, this constrained post-transformation alphabet requires smaller normalization factors, which in turn increases the SNR of a system in accordance with at least one embodiment of the invention.
(24) This can be done in a variety of ways, as described below using the illustration of
Forcing to Zero
(25) In a first example embodiment, a given number of the c.sub.i are forced to be zero, constraining the scope of the resulting matrix multiplication results. Where k of the c.sub.i are forced to be equal to zero, the constrained post-transformation alphabet size after the multiplication in Equation 1 will grow to at most a size of (N−k−1)*(M−1)+1 for a Hadamard matrix. This can be substantially smaller in certain cases. Moreover, unlike in the method of Cronie II, the reduction of the code-space may not be too much. Since the forced value of 0 will be part of the detected results (as in 355 of
(26) As a specific example, consider an embodiment with N=4, M=3, and the Hadamard matrix of size 4. In this case the unconstrained pre-code has 27 elements, and the unconstrained post-transform alphabet size is 7. However, choosing a constrained set of vectors (c.sub.1, c.sub.2, c.sub.3) which contain at least one zero, i.e., k=1, a constrained post-transform alphabet having a size of 5 is formed. The number of such constrained-alphabet codewords is 19; the 12 permutations of (1, 0, 0, −1), the 6 permutations of (½, ½, −½, −½), and the vector (0, 0, 0, 0). In at least one embodiment, the codeword (0, 0, 0, 0) is not chosen for transmission, in order to have the same amount of power used for every transmitted codeword. Among the remaining 18 constrained-alphabet codewords any 16 can be chosen for transmission, encoding four binary bits of data. The remaining two constrained-alphabet codewords are available for control functions, pattern breaking, or other auxiliary communication use.
(27) An encoder embodiment for the precode operation is now described with reference to the specific precode consisting of all the 12 permutations of the vector (1, 0, 0, −1), and the four additional vectors (½, ½, −½, −½), (−½, ½, ½, −½), (−½, −½, ½, ½), and (½, −½, −½, ½). The task of this encoder is to produce four bit vectors u, v, w, s from a four bit input (a, b, c, d). In operation, the encoded vector is equal to u−v+(w−s)/2. In other words, u encodes the positions of the 1's, v encodes the position of the −1's, w encodes the positions of the ½'s, and s encodes the positions of the −½'s. Explicit logical formulas are given below. In these formulas, “*” is the logical AND, ¬c is the logical inverse of c, “xor” denotes the xor operation, and “nor” denotes the logical NOR operation.
(28) If (a*b)=0, then:
u=(c*d,¬c*d,c*¬d,nor(c,d))
v=(xor(c,¬a)*xor(d,¬b),xor(c,a)*xor(d,¬b),xor(c,¬a)*xor(d,b),xor(c,a)*xor(d,b)
w=(0,0,0,0),s=(0,0,0,0)
If (a*b)=1, then:
u=(0,0,0,0)
v=(0,0,0,0)
w=(¬xor(c,d),¬c,xor(c,d),c)
s=(xor(c,d),c,(¬xor(c,d),¬c)
(29) As a second example, consider an embodiment with N=8, M=3, and the Hadamard matrix of size 8. In this case the unconstrained pre-code has 3.sup.7=2187 elements and an unconstrained post-transformation alphabet of size (N−1)*(M−1)+1=15. Choosing a pre-code comprising all PAM-3 vectors of length 7 with at least one 0, one obtains a pre-code of size 2187−128=2059 which means that it is still possible to transmit 11 bits on the 8 communication wires. The constrained post-transformation alphabet has a size of (N−2)*(M−1)+1=13. The SNR increase is 20*log 10(15/13)=1.24 dB.
(30) In an alternative embodiment where k=4, i.e. in which it is required that at least four of the coordinates of (c.sub.1, c.sub.2, . . . , c.sub.7) be zero, this construction yields a pre-code of size 379 which is sufficient for transmission of 8 bits on the 8 wires. The constrained post-transformation alphabet size is in this case 3*(M−1)+1=7. The SNR increase is 20*log 10(15/7)=6.62 dB. This SNR increase was achieved by reducing the rate from 11 bits to 8 bits on 8 wires, i.e., by a reduction of the rate by roughly 38%.
(31) Table I shows the SNR increase for embodiments N=8, M=5, and various values of k. In this case the unconstrained pre-code is capable of transmitting 16 bits over the 8 wire interface.
(32) TABLE-US-00001 TABLE I k = 0 k = 1 k = 2 k = 3 k = 4 #bits 15 15 13 11 8 SNR 2.97 6.46 10.7 16.0 23.4 increase
(33) It may be observed from the results of Table I that it is advantageous to increase the SNR by 6.46 dB (i.e. k=1) while losing 1 bit over the unconstrained transmission. Transmission with a pin efficiency of 1 (8 binary bits over the 8 wire interface) is also possible (k=4) and leads to an SNR increase of 23.4 dB.
Explicit Codespace Pruning
(34) Although the ‘forcing to zero’ method requires only a fairly simple pre-coder, other methods of constraining the emitted set of codewords to avoid extreme alphabet values may provide more flexibility and/or a larger usable codespace.
(35) As a first example, consider an embodiment in which the matrix A is the Hadamard matrix of order 8, and where M=2, i.e., the c.sub.i are +1 or −1. Without a pre-code, the size of the unconstrained post-transformation alphabet after the multiplication in Equation 1 is 8, and the unconstrained post-transformation alphabet (after normalization) consists of the values ±1, ± 5/7, ± 3/7, ± 1/7. There are exactly 16 vectors (0, c.sub.1, . . . , c.sub.7) leading to the alphabet elements ±1. These are the codewords of the [7, 4, 3] Hamming code (using binary antipodal modulation of the bits):
(36) [[1, 1, 1, 1, 1, 1, 1], [−1, −1, −1, 1, 1, 1, 1], [−1, 1, 1, −1, −1, 1, 1], [1, −1, −1, −1, −1, 1, 1], [1, −1, 1, −1, 1, −1, 1], [−1, 1, −1, −1, 1, −1, 1], [−1, −1, 1, 1, −1, −1, 1], [1, 1, −1, 1, −1, −1, 1], [−1, −1, 1, −1, 1, 1, −1], [1, 1, −1, −1, 1, 1, −1], [1, −1, 1, 1, −1, 1, −1], [−1, 1, −1, 1, −1, 1, −1], [−1, 1, 1, 1, 1, −1, −1], [1, −1, −1, 1, 1, −1, −1], [1, 1, 1, −1, −1, −1, −1], [−1, −1, −1, −1, −1, −1, −1]].
(37) Thus, this method comprises identification of matrix multiplication results containing predetermined unacceptable alphabet values and the particular input values to that multiplication which results in generation of those codewords. The pre-code operation thus requires elimination (or equivalently, exclusion from the data-to-precode mapping) of those matrix multiplication input vectors. For descriptive purposes, this document refers to this method of pre-coding as “explicit codespace pruning”, as the pre-code explicitly avoids generating particular output vectors leading to unacceptable codewords.
(38) Disallowing these vectors, the result of the multiplication in Equation 1 will belong to a constrained post-transformation alphabet of size 6, which after normalization can be viewed as ±1, ±⅗, ±⅕. The resulting vector signaling code is capable of transmitting one of 128−16=112 codewords in every transmission, and its SNR is 20*log.sub.10(4/3)=2.5 dB better than the unconstrained case. The rate loss of this signaling code as compared to the unconstrained code is 7−log.sub.2(112)˜0.19, which is less than 3%.
(39) Another example is provided by an embodiment in which N=8, and M=4. In this case A is again a Hadamard matrix of size 8. If the vectors (0, c.sub.1, . . . , c.sub.7) are unconstrained, then the size of the resulting unconstrained post-transformation alphabet is 22. By disallowing the same 16 vectors as in the previous example, the size of the constrained post-transformation alphabet is reduced to 20 and the SNR is increased by 20*log 10(22/20)=0.83 dB. Disallowing another appropriate set of 112 vectors leads to a constrained post-transformation alphabet of size 18 and an increase of SNR by 20*log 10(22/18)=1.74 dB. The set to be disallowed is obtained in the following way: We choose for the vector (0, c.sub.1, . . . , c.sub.7) all possible combinations except those in which (c.sub.1, . . . , c.sub.7) is one of the vectors of the [7, 4, 3] Hamming code above, or if (c.sub.1, . . . , c.sub.7) is obtained from such a vector by replacing any of the entries by ±⅓, and wherein the sign is chosen to be equal to the sign of the original entry (so, for example, the vector (−1, −⅓, −1, 1, 1, 1, 1) is disallowed since it is obtained from the vector (−1, −1, −1, 1, 1, 1, 1) by replacing the third entry by −⅓). Further improvements of the SNR are possible by disallowing a progressive number of possibilities for the vector (c.sub.1, . . . , c.sub.7): Disallowing another 448 vectors reduces the number of codewords of the precode to 4.sup.7−448−112−16=15808, i.e., reduces the number of transmitted bits from 14 to 13.94, reduces the alphabet size to 16, and increases the SNR by 20*log 10(22/16)=2.76 dB.
(40)
(41) Explicit codespace pruning is not only applicable to PAM-M transmission when M is even. It can also be applied to the case of odd M. An example is provided by an embodiment in which N=8, and M=3. In this case A is again a Hadamard matrix of size 8. If the vectors (0, c.sub.1, . . . , c.sub.7) are unconstrained, then the size of the resulting unconstrained post-transformation alphabet is 15. By disallowing the same 16 vectors as in the example for M=2, the size of the constrained post-transformation alphabet is reduced to 13 and the SNR is increased by 20*log 10(15/13)=1.24 dB, while the number of codewords is reduced from 3.sup.7=2187 to 2171. The number of transmitted bits is reduced from 11.095 to 11.084. This same result is achieved by the zero-forcing method.
(42) Disallowing a further set of 112 vectors leads to a constrained post-transformation alphabet of size 11 and an increase of SNR by 20*log 10(15/11)=2.69 dB. The set to be disallowed is obtained in the following way: We choose for the vector (0, c.sub.1, . . . , c.sub.7) all possible combinations except those in which (c.sub.1, . . . , c.sub.7) is one of the vectors of the [7, 4, 3] Hamming code above, or if (c.sub.1, . . . , c.sub.7) is obtained from such a vector by replacing any of the entries by 0 (so, for example, the vector (−1, 0, −1, 1, 1, 1, 1) is disallowed since it is obtained from the vector (−1, −1, −1, 1, 1, 1, 1) by replacing the third entry by 0).
(43) Further improvements of the SNR are possible by disallowing a progressive number of possibilities for the vector (c.sub.1, . . . , c.sub.7): Disallowing another 448 vectors reduces the number of codewords of the precode to 3.sup.7−448−112−16=1611, i.e., reduces the number of transmitted bits from 11.095=log.sub.2(3.sup.7) to 10.65, reduces the constrained post-transformation alphabet size to 9, and increases the SNR by 20*log 10(15/9)=4.44 dB.
(44)
Offline Codebook Generation
(45) A generic diagram illustrating the previously described methods is shown as the block diagram of
(46) As shown in
Combination Designs
(47) It will be apparent to one familiar with the art that the functional combinations and resulting circuit optimizations taught in the prior art may be equally well applied in combination with the present invention.
(48) One embodiment illustrated as
Embodiments
(49) In accordance with at least one embodiment, a system comprises: a plurality of conductors configured to receive a set of input data bits; a pre-encoder configured to map the set of input data bits into symbols of a pre-code codeword of a pre-code, wherein the pre-code comprises a constrained set of vectors determined from a maximal set of vectors, and wherein the pre-code is associated with a constrained post-transformation alphabet comprising a portion of low magnitude symbol values selected from an unconstrained post-transformation alphabet associated with the maximal set of vectors; an encoder configured to generate a constrained-alphabet codeword of a constrained-alphabet vector signaling code, the constrained-alphabet codeword representing a transformation of the pre-code codeword with a first non-simple orthogonal matrix, wherein the constrained-alphabet codeword comprises symbols of the constrained post-transformation alphabet; and, a driver configured to transmit the constrained-alphabet codeword on a multi-wire communication bus.
(50) In at least one embodiment, each vector in the constrained set comprises N−1 symbols, each symbol having a value selected from a constellation of PAM-M values, and the first non-simple orthogonal matrix has a size of N, wherein N and M are integers greater than or equal to 3. In at least one embodiment, the unconstrained post-transformation alphabet comprises (N−1)*(M−1)+1 possible symbol values. In at least one embodiment, M is odd, and wherein each vector in the constrained set comprises k symbols equal to 0, and the constrained post-transformation alphabet comprises (N−k−1)*(M−1)+1 possible symbol values, wherein k is an integer greater than or equal to 1.
(51) In at least one embodiment, the constrained post-transformation alphabet comprises predetermined low magnitude values selected from the unconstrained post-transformation alphabet. In at least one embodiment, the portion of low magnitude symbol values have magnitudes under a predetermined threshold.
(52) In at least one embodiment, the first non-simple orthogonal matrix is a Hadamard matrix. In at least one embodiment, the Hadamard matrix has a size of at least 4. In at least one embodiment, the pre-encoder comprises logic elements configured to map the set of input data bits to the pre-code codeword. In at least one embodiment, the constrained-alphabet vector signaling code is a balanced code. In at least one embodiment, the constrained-alphabet vector signaling code is ternary.
(53) In at least one embodiment, the system further comprises a receiver, the receiver comprising: a multi-wire communication bus configured to receive the constrained-alphabet codeword; a linear combination network configured to obtain the pre-code codeword based on a transformation of the constrained-alphabet codeword by a second non-simple orthogonal matrix, the second non-simple orthogonal matrix based on the first non-simple orthogonal matrix; and, a detector configured to detect the symbols of the pre-code codeword, and generate a set of output data bits representative of the set of input data bits. In at least one embodiment, the detector is a PAM-M detector, the PAM-M detector comprising a plurality of comparators configured to generate a plurality of comparator outputs, each comparator associated with a respective reference voltage of a set of reference voltages, and wherein the plurality of comparator outputs correspond to the output data bits.
(54) In at least one embodiment in accordance with
(55) In at least one embodiment, each vector in the constrained set comprises N−1 symbols, each symbol having a value selected from a constellation of PAM-M values, and the first non-simple orthogonal matrix has a size of N, wherein N and M are integers greater than or equal to 3. In at least one embodiment, the unconstrained alphabet comprises n=(N−1)*(M−1)+1 possible symbol values. In at least one embodiment, M is odd, and wherein each vector in the constrained set comprises k symbols equal to 0, and the constrained alphabet comprises m=(N−k−1)*(M−1)+1 possible symbol values, wherein k is an integer greater than or equal to 1.
(56) In at least one embodiment, the constrained alphabet comprises predetermined low magnitude values selected from the unconstrained alphabet. In at least one embodiment, each of the m low magnitude symbol values have magnitudes under a predetermined threshold.
(57) In at least one embodiment, the non-simple orthogonal matrix is a Hadamard matrix. In at least one embodiment, the Hadamard matrix has a size of at least 4. In at least one embodiment, the constrained-alphabet vector signaling code is a balanced code. In at least one embodiment, the constrained-alphabet vector signaling code is ternary.
(58) In at least one embodiment, the method further comprises: receiving the constrained-alphabet codeword on a plurality of conductors; obtaining the pre-code codeword based on a transformation of the constrained-alphabet codeword with a second non-simple orthogonal matrix, the second non-simple orthogonal matrix based on the first non-simple orthogonal matrix; and, generating a set of output data bits by a detector, wherein the set of output data bits is generated based on the pre-code codeword, and are representative of the set of input data bits. In at least one embodiment, generating the set of output data bits comprises forming a plurality of comparator outputs using a plurality of comparators, each comparator associated with a respective reference voltage of a set of reference voltages.
(59) The examples presented herein describe the use of vector signaling codes for communication over a point-to-point wire interconnection. However, this should not been seen in any way as limiting the scope of the described invention. The methods disclosed in this application are equally applicable to other interconnection topologies and other communication media including optical, capacitive, inductive, and wireless communications, which may rely on any of the characteristics of the described invention, including minimization of reception or detection resources by selective modification or subset selection of code space. The methods disclosed in this application are equally applicable to embodiments where the encoded information is stored and subsequently retrieved, specifically including dynamic and static random-access memory, non-volatile memory, and flash programmable memory. Descriptive terms such as “voltage” or “signal level” should be considered to include equivalents in other measurement systems, such as “optical intensity”, “RF modulation”, “stored charge”, etc.
(60) As used herein, the term “physical signal” includes any suitable behavior and/or attribute of a physical phenomenon capable of conveying information. Physical signals may be tangible and non-transitory. “Code” and “codeword” may represent physically-representable constructs, capable of being recorded in physical media, embodied as physical devices, and communicated as measurable physical signals over physical interconnections.