Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

C/C++

Reed-Solomon Error Correction


Transmission media, such as telephone lines, wide-area networks, and satellite links, or storage media, like optical/magnetic disk and tape, are usually imperfect. To make digital data transmission and storage reliable, error-correcting codes are indispensable. The efficient Reed-Solomon class of error-correcting codes is highly popular in many applications, including CD, DAT (digital audio tape) players, tape-backup systems, and similar devices. These all use a hardware implementation of Reed-Solomon. However, because microprocessor speeds have increased considerably, software implementations are also feasible in some applications.

In this article, I'll present a highly optimized software implementation of Reed-Solomon error correction, which I implemented while developing the "Video Backup System" for the Commodore Amiga. This product lets users connect a VCR to the Amiga via a hardware interface to use the VCR as a file-backup device. I developed the software that encodes computer data in a video signal and performs error correction on information read back from the VCR to compensate for drop-outs on the video tape. Even though the original Amiga implementation was written in C and 68000 assembly language, the version I'll discuss here is implemented in 32-bit Intel x86 assembly language using Borland C++ 4.2 and TASM 4.0.

Reed-Solomon Codes

A codeword of a Reed-Solomon (RS) code consists of a sequence of symbols over the Galois field GF(q). GF(q) is a finite field with q elements, where q=pm for some prime number p. (For an introduction to Galois fields, see Error-Recovery Codes, by Bart de Canne, DDJ, December 1994.) Reed-Solomon codes have, by definition, N=q-1. Out of these N, let K be the number of actual information symbols. The other N-K are redundancy symbols. The amount of redundancy in each codeword defines the maximum number of symbol errors that can be corrected. The necessary error-correcting capability of the code can be determined from the quality of the medium (raw error rate) and the desired reliability of the application. Let T be the number of symbol errors that can be corrected in each code word. Because all Reed-Solomon codes are maximum-distance separable, the necessary overhead to correct up to T symbol errors is only 2T symbols. Therefore, the actual information content of each codeword, K, is N-2T symbols. The resulting data rate is: K/N or 1-(2T/N).

Each codeword can be identified with a polynomial over GF(q) in the following way:

Reed-Solomon codes are cyclic. For each codeword (c0,...,cN-1) in a RS code C, (cN-1,c0,c1,..., cN-2) is also in C. Viewing codewords as polynomials, the aforementioned statement can be written as:

A T-error-correcting RS code C can be described by a single unique polynomial g(x), its generator polynomial. g(x) is a polynomial of degree 2T and the coefficient of x2T in g(x) is 1 by definition. c(x) is a codeword in C only if it is divisible by g(x). Let be a primitive element of GF(q). This means that every nonzero element of GF(q) can be written as a power of and . For a RS code,

Choosing Code Parameters

To maximize efficiency, choose code parameters that match the architecture of the implementation platform as closely as possible. A convenient unit of information on the 32-bit Intel CPU (and most other computer architectures) is a byte which can be stored, retrieved, and manipulated very efficiently. Therefore, in my RS implementation, each symbol is represented by one byte. (For a more complete example of encoding/decoding, see the section at the end of this article entitled "A Complete Reed-Solomon Encoding and Decoding Example.") A byte has 256 possible values, so the most convenient Galois field size is q=256=28, p=2, and m=8. When shortened RS codes are ignored, this automatically implies that N=255. The only degree of freedom left at this point is the choice of T, the maximum correctable number of symbol errors per codeword. Although the computer architecture does not dictate a value for T, there is a slight advantage if T is a power of 2. For my application, I implemented RS for T=8. Using this as a starting point, it is easy to create your own implementation for other values of T.

Implementation of GF(28)

GF(28) can be regarded as the set of polynomials of degree <8, with coefficients in GF(2); for example, 0 or 1. Addition, subtraction, multiplication, and division are all defined operators. In GF(28), adding two elements is accomplished by adding their corresponding coefficients modulo 2. Since subtraction modulo 2 is the same as addition (1-1 = 1+1 = 0 mod 2, 0-1 = 0+1 = 1 mod 2), subtraction and addition are the same in GF(28) as well.

In Example 1, the most-significant bit (MSb) in a byte represents the coefficient of x7; the least-significant bit (LSb) represents the coefficient of x0. For example, x7+x4+x2 is represented by byte 1001010. The assembly language equivalent of computing the sum of two elements of GF(28) is the use of the exclusive-or instruction (XOR) on the byte representations of the elements. Multiplication in GF(28) is done modulo a polynomial f(x) of degree 8. f(x) has to be irreducible over GF(2), which means that it cannot be written as a product of two or more other polynomials over GF(2) of lesser degree. If f(x) is irreducible and every nonzero element of GF(28) can be written as a power of x modulo f(x), f(x) is called a "primitive polynomial" and x is a primitive element. Bart de Canne's article contains code for searching for such primitive polynomials (there is always at least one for every Galois field). I use the following primitive polynomial to construct GF(28): x8 + x6 + x5 + x4 +1.

Example 1: Addition and subtraction in GF(28).

(x4 + x2) + (x2 + 1) =(x4 + 1)0 - (x4 + x) = (x4 + x)x + x = 0x - x = 0

In Example 2, my implementation uses a 256×256 byte array called RSG_multiply to efficiently implement multiplication of elements of GF(28). The Intel architecture has a quirk that makes it efficient to access this array, given two values (I and J) to multiply; of the lower 16 bits of the data registers eax through edx, the CPU can separately access the upper and lower byte. Given that the upper 16 bits of ebx are 0 and that edi points to RSG_multiply, Example 3 is all that is needed to load the product of I and J into al. Understanding this makes the assembly listing easier to read. If you are hard-pressed for registers, you could even free up the register edi by making sure that the RSG_multiply array resides at a 64-KB boundary in memory to which the upper 16 bits of ebx> could point.

Example 2: Multiplication in GF(28) is done modulo f (x)= x8 + x6 + x5 + x4 + 1.

(x4 + x2) * (x2 + 1) = (x6 + x2)x8 = x6 + x5 + x4 + 1x255 = x0 = 1

Example 3: Loading the product of I and J.
mov bl,I
mov bh,J
mov al,[edi+ebx]

Division of an element a by an element b is accomplished by multiplying a by b-1, the multiplicative inverse of b. The array RSG_multinverse contains the multiplicative inverse of every nonzero element of GF(28). Finally, RSG_logarithm is a logarithm table that tells you which power of x each nonzero GF(28) element is. For instance, since x8 = x6 + x5 + x4+1, logx (x6 + x5 + x4 +1) = 8 and 011100012 = 71 hex, RSG_logarithm[0x71] equals 8. Listing One, gf256.c, is the code to prepare the arrays needed for GF(28) arithmetic. These arrays are used by both the C and the assembly language parts of the implementation.

Listing One

/****************************************************** 
 * File: gf256.c -- contains code to construct GF(2^8) and all required
 * arrays for GF(2^8) arithmetic.
 * Copyright (c) 1995 by Hugo Lyppens with permission to print in DDJ
 ******************************************************/
#include "hdr.h"
#include "rs.h"



#define POL              0x171    /* primitive polynomial used to construct
                                     GF(2^8) is: x8 + x6 + x5 + x4 + 1
                                     represented as 101110001 binary */
UBYTE                    RSG_powers[FIELDSZ];
UBYTE                    RSG_logarithm[FIELDSZ];
UBYTE                    RSG_multinv[FIELDSZ];
UBYTE                    RSG_multiply[FIELDSZ][FIELDSZ];



static UBYTE             multiply_func(UBYTE, UBYTE);
static UBYTE             multinv_func(UBYTE);



void        RSG_ConstructGaloisField()
{
     int          v;
     UBYTE        i, j;
     v = 1;
     for(i = 0; ; i++) {
          RSG_powers[i]         = (UBYTE)v;
          RSG_logarithm[v]  = i;
          v <<=1; // multiply v by alpha and reduce modulo POL
          if(v & (1<<GF_M)) {
                v ^= POL;
          }
          if(i==MAXELT-1)
                break;
     }
     RSG_powers[MAXELT] = 1;
     // construct multiplication table
     for(i = 0; ; i++ ) {
          if(i) RSG_multinv[i] = multinv_func(i);
          for(j = i; ; j++) {
              RSG_multiply[i][j] = RSG_multiply[j][i] = multiply_func(i, j);
              if(j==MAXELT)
                    break;
          }
          if(i==MAXELT)
                break;
     }
}
// compute multiplicative inverse of x. The value y for which x*y = 1
static UBYTE multinv_func(x)
UBYTE x;
{
    if(!x)
        return 0;
    return RSG_powers[FIELDSZ-1-RSG_logarithm[x]];
}
// compute product of i and j
static UBYTE multiply_func(i, j)
UBYTE i, j;
{

     int r, b, k;
     r = 0; k = j;
     for(b = 1; b<FIELDSZ; b<<=1, k<<=1) {
        if(k & (1<<GF_M)) k^=POL;
         if(i & b)       r ^= k;
     }
     return((UBYTE)r);
}

Encoding

Again, each codeword is a multiple of the generator polynomial g(x). To encode an information sequence a(x) = a0+a1x+...+ aK-1xK-1, you could multiply it by g(x) to turn it into a codeword. However, it is more efficient to compute b(x) = a(x)xN-K mod g(x). A possible encoding of a(x) is then b(x) + a(x)xN-K. Yet, I have the intuitive notion that the information symbols should come first and the redundancy symbols should be attached to the end of the data array. Since the RS codes are cyclic, this is no problem and a valid codeword that satisfies this notion can be created by cyclically rotating this encoding to the left by N-K symbol positions. The final encoding of a(x) then becomes a(x)+ b(x)xK.

As the encoder processes each information symbol in a(x), it maintains b(x). To speed things up, the code uses a table that contains g(x) for each . When the encoder finishes computing b(x), it writes it to the Kth position in the data array to create the final encoding of a(x). Listing Two (genpol.c) calculates the generator polynomial and prepares this table. The function RSG_encode in the program codecsup.asm (available electronically, along with executables; at the top of the first page of this article) is the assembly language implementation of the encoder.

Listing Two

/********************************************************************* 
 * File: genpol.c -- contains code to generate the generator polynomial
 * of degree 2*T for Reed-Solomon encoding/decoding
 * Copyright (c) 1995 by Hugo Lyppens with permission to print in DDJ
 *********************************************************************/
#include "hdr.h"
#include "rs.h"



UBYTE                    RSG_shiftregtab[FIELDSZ][2*T];
Polynomial               RSG_genpol;
void    RSG_CalcGeneratorPoly()
{
    int     i, j;
    UBYTE   a, *p;
    RSG_genpol.degree = 2*T;
    memset(RSG_genpol.c, 0, 2*T);
    RSG_genpol.c[0] = RSG_powers[0];
    RSG_genpol.c[1] = 1;
    for(j = 1; j<2*T; j++) {
        a = RSG_powers[j];
        for(i = 2*T; i>=1; i--) {
           RSG_genpol.c[i] = RSG_genpol.c[i-1]^multiply(RSG_genpol.c[i], a);
        }
        RSG_genpol.c[0] = multiply(a, RSG_genpol.c[0]);
    }
    printf("Generator polynomial: ");
    printpoly(&RSG_genpol);
    for(i = 0; ; i++) {
        p = &RSG_multiply[i][0];
        for(j = 0; j<2*T; j++) {
            RSG_shiftregtab[i][j] =
                 p[RSG_genpol.c[j]];
        }
        if(i==MAXELT)
            break;
     }
}


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.