Symbol encoding for tolerance to single byte errors
First Claim
Patent Images
1. An apparatus comprising:
- a processor; and
a non-transitory computer readable medium comprising one or more instructions, the instructions configured to, when executed by the processor, cause the apparatus to;
generate data based at least in part on a portion of a first symbol and a portion of a second symbol, wherein the portion of the first symbol is indicative of a first symbol type and the portion of the second symbol is indicative of a second symbol type; and
determine when the generated data is corrupted, and when the generated data is corrupted;
determine if the first symbol is valid, based at least in part on the first symbol type; and
determine if the second symbol is valid, based at least in part on the second symbol type.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a method that protects symbol types by characterizing symbols as one of two types—DATA or NON_DATA, generating a symbol characterization bit, placing the symbol characterization bit at both ends of the symbol, and transmitting the symbol with the symbol characterization bits at both ends. Thus, a single byte error may affect a type bit in two consecutive symbols, and will affect one or the other of the type bits in a single symbol, but cannot affect both type bits in a single symbol.
165 Citations
21 Claims
-
1. An apparatus comprising:
-
a processor; and a non-transitory computer readable medium comprising one or more instructions, the instructions configured to, when executed by the processor, cause the apparatus to; generate data based at least in part on a portion of a first symbol and a portion of a second symbol, wherein the portion of the first symbol is indicative of a first symbol type and the portion of the second symbol is indicative of a second symbol type; and determine when the generated data is corrupted, and when the generated data is corrupted; determine if the first symbol is valid, based at least in part on the first symbol type; and determine if the second symbol is valid, based at least in part on the second symbol type. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of recovering received data, the method comprising:
-
recovering a first symbol and second symbol from a plurality of bytes, where the first symbol spans a first byte and a second byte, and where the second symbol spans the second byte and a third byte; identifying a symbol type for each of the first recovered symbol, and the second recovered symbol; detecting that one or more bytes of the recovered first symbol and second symbol are corrupted; and restoring at least one of the first and second symbols based on the identified symbol types. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
a processor; and logic in data communication with the processor, the logic configured to; recover a first symbol and second symbol from a plurality of bytes; identify first and second symbol types for the first and second recovered symbols, respectively; determine that one or more bytes of the first and second symbols are corrupted; and restore at least one of the first and second symbols based on the identified first and second symbol types. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
Specification