Construction of Maximum Run-Length Limited Codes Using Sequence Replacement Techniques

The sequence replacement technique converts an input sequence into a constrained sequence in which a prescribed subsequence is forbidden to occur. Several coding algorithms are presented that use this technique for the construction of maximum run-length limited sequences. The proposed algorithms show how all forbidden subsequences can be successively or iteratively removed to obtain a constrained sequence and how special subsequences can be inserted at predefined positions in the constrained sequence to represent the indices of the positions where the forbidden subsequences were removed. Several modifications are presented to reduce the impact of transmission errors on the decoding operation, and schemes to provide error control are discussed as well. The proposed algorithms can be implemented efficiently, and the rates of the constructed codes are close to their theoretical maximum. As such, the proposed algorithms are of interest for storage systems and data networks.

[1]  Thomas M. Cover,et al.  Enumerative source encoding , 1973, IEEE Trans. Inf. Theory.

[2]  Steven W. McLaughlin,et al.  Fixed-Rate Maximum-Runlength-Limited Codes From Variable-Rate Bit Stuffing , 2007, IEEE Transactions on Information Theory.

[3]  Adriaan J. de Lind van Wijngaarden,et al.  On the construction of maximal prefix-synchronized codes , 1996, IEEE Trans. Inf. Theory.

[4]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[5]  K.A. Schouhamer Immink,et al.  Prefix-synchronized Runlength-limited Sequences , 1991, Proceedings. 1991 IEEE International Symposium on Information Theory.

[6]  Adriaan J. de Lind van Wijngaarden,et al.  Maximum runlength-limited codes with error control capabilities , 2001, IEEE J. Sel. Areas Commun..

[7]  Adriaan J. de Lind van Wijngaarden,et al.  A combinatorial technique for constructing high-rate MTR-RLL codes , 2001, IEEE J. Sel. Areas Commun..

[8]  Schouhamer Immink,et al.  Codes for mass data storage systems , 2004 .

[9]  Ron M. Roth,et al.  Efficient Code Construction for Certain Two-Dimensional Constraints , 1997, IEEE Trans. Inf. Theory.

[10]  Kees A. Schouhamer Immink A practical method for approaching the channel capacity of constrained channels , 1997, IEEE Trans. Inf. Theory.

[11]  P.H. Siegel,et al.  Modulation and coding for information storage , 1991, IEEE Communications Magazine.

[12]  A.J. van Wijngaarden,et al.  Efficient error control schemes for modulation and synchronization codes , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[13]  K. A. Schouhamer Immink,et al.  Combinatorial construction of high rate runlength-limited codes , 1996 .

[14]  T. Etzion,et al.  Efficient code constructions for certain two-dimensional constraints , 1997, Proceedings of IEEE International Symposium on Information Theory.

[15]  Robert A. Scholtz,et al.  Frame Synchronization Techniques , 1980, IEEE Trans. Commun..

[16]  Leonidas J. Guibas,et al.  String Overlaps, Pattern Matching, and Nontransitive Games , 1981, J. Comb. Theory A.

[17]  K.A.S. Immink,et al.  On the construction of constrained codes employing sequence replacement techniques , 1997, Proceedings of IEEE International Symposium on Information Theory.

[18]  Eric D. Daniel,et al.  Magnetic Recordings , 1963, Nature.