throbber

`
`CSCO-1028
`
`Cisco V. TQ Delta, IPR2016-01021
`
`Page 1 of 19
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 1 of 19
`
`

`

`
`
`CSCO-1028
`
`Cisco V. TQ Delta, IPR2016-01021
`
`Page 2 of 19
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 2 of 19
`
`

`

`
`
`
`
`Jfliflflfllflflflmfl Muifluflm
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 3 of 19
`
`

`

`Understanding Digital
`Subscriber Line Technology
`
`‘
`
`Thomas Starr
`
`Senior MTS
`
`Ameritech
`
`John M. Cioffi
`
`Professor of Electrical Engineering
`
`Stanford University
`
`Prentice Hall PTR, Upper Saddle River, NJ 07458
`http:/IWWW.phptr.com
`
`Peter Silverman
`
`Senior Architect — New Business Initiatives
`
`3COM Corporation
`
`
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 4 of 19
`
`

`

`
`
`CSCO-1028
`
`Cisco V. TQ Delta, IPR2016-01021
`
`Page 5 of 19
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 5 of 19
`
`

`

`Contents
`
`Preface
`
`xv
`
`Acknowledgments
`
`About the Authors
`
`xvii
`
`8
`
`1.4.2 Timing
`1.4.3 Channels
`
`9
`10
`
`24
`
`1
`Chapter 1 DSL Fundamentals
`1.1 Alternatives to DSLs: Fiber, Wireless, and Coax
`1.2 Worldwide Extent
`2
`1.3 Voice—Band Modems and DSLs
`1.4 Transmission Modes
`8
`1.4.1 Direction
`
`
`
`1.4.4 Single and Multipoint Topologies
`1.5 DSL Terminology
`12
`1.6 Rate Versus Reach
`12
`1.7 Crosstalk
`13
`
`11
`
`1.8 Enabling and Disabling Forces
`1.9 Applications
`17
`1.10 Evolution of Digital Transmission
`
`16
`
`21
`
`Chapter 2 Types of DSLs
`2.1 DSL Design Margin
`2.2 DSL Precursors
`
`23
`
`23
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 6 of 19
`
`

`

`
`
`CSCO-1028
`
`Cisco V. TQ Delta, IPR2016-01021
`
`Page 7 of 19
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 7 of 19
`
`

`

`Contents
`
`‘
`
`Contents
`
`3.5 Transmission Line Characterization
`
`64
`
`64
`“ABCD” Modeling
`3.5.1
`3.5.2 Transmission Line RLCG Characterization
`
`3.5.3 Characterization of a Bridged-Tap Section
`3.5.4 Loaded Coils — Series Inductance
`75
`
`67
`
`74
`
`75
`3.5.5 Computation of Transfer Function
`3.5.6 Measurements for Computation ofRLCG Parameters
`3.5. 7 Balance —— Metallic and Longitudinal
`84
`Noises
`85
`3.6.1 Crosstalk Noise
`3.6.2 Radio Noise
`
`86
`
`92
`
`98
`
`94
`Impulse Noise
`3.6.3
`97
`Spectral Compatibility
`3.7.1
`Interference Between DSLs and Multiplexing
`3. 7.2
`Se lf-Interference
`99
`3. 7.3 Crosstalk FEXT and NEXT Power Spectral Density Models
`3. 7.4 Emissions from DSLs
`104
`More Two-Port Networks
`
`139
`
`105
`
`3.8.1 Reciprocal and Lossless Two-Port Circuits
`3.8.2 Analog Filter Design and T(s)
`107
`3.8.3 Lossless Realization ofH(s)
`113
`3.8.4 Frequency/ Magnitude Scaling and Frequency Transformations
`3.8.5 Active Filters
`116
`Three—Port Networks for DSLs
`
`106
`
`119
`
`114
`
`3.9.1 POTS Splitters
`3.9.2 Hybrid Circuits
`References
`129
`
`120
`128
`
`Chapter 4 Comparison with Other Media
`4.1 Fiber-to-the-Home
`133
`
`133
`
`4.2 Coax and Hybrid Fiber Coax
`4.3 Wireless Alternatives
`136
`4.4 Satellite Services
`References
`137
`
`137
`
`134
`
`Chapter 5 Transmission Duplexing Methods
`5.1 Four-Wire Duplexing
`
`139
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 8 of 19
`
`

`

`
`
`CSCO-1028
`
`Cisco V. TQ Delta, IPR2016-01021
`
`Page 9 of 19
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 9 of 19
`
`

`

`Contents
`
`Contents
`
`7.2.6 ADSL T1413 DMT
`
`235
`
`236
`
`247
`
`256
`
`265
`270
`
`274
`Interleaving Methods
`7.4.3
`7.4.4 Concatenated Coding and Multilayer Coding
`7.4.5 ADSL Special Case
`277
`7.4.6 CRC Checks
`281
`7.4. 7 Scramblers
`285
`References
`288
`
`277
`
`Initialization, Timing and Performance
`Chapter 8
`8.1
`Initialization Methods
`297
`8.1.1 Activation
`297
`8.1.2 Gain Estimation
`
`299
`
`7.2. 7 Clipping and Scaling (Peak-to-Average Issues)
`7.2.8 Fast Fourier Transforms for DMT
`242
`7.2.9 Multiplexing Methods for Multicarrier Transmission
`7.210 Narrowband Noise Rejection
`251
`Trellis Coding
`256
`7.3.1 Constellation Partitioning and Expansion
`7.3.2 Enumeration of Popular Codes
`262
`7.3.3 Shaping Effects
`262
`7.3.4 Turbo Codes
`263
`Error Control
`264
`7.4.1 Basic Error Control
`7.4.2 Reed-Solomon Codes
`
`344
`
`302
`
`303
`
`8.1.3 Synchronization (Clock, Frame)
`8.1.4 First Channel Identification
`8.1.5 Channel Equalization
`311
`8.1.6 Secondary Channel Identification and Exchange
`Adaptation of Receiver and Transmitter
`314
`8.2.1 Receiver Equalization Updating
`315
`8.2.2 Transmitter Adjustment
`318
`Measurement of Performance
`324
`
`314
`
`3.25
`
`8.3.1 Test Loops and Noise Generation
`8.3.2 Measure of Performance
`333
`337
`Timing Recovery Methods
`337
`8.4.1 Basic PLL Operation
`341
`8.4.2 Open—Loop Timing Recovery
`8.4.3 Decision-Directed Timing Recovery
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 10 of 19
`
`

`

`
`
`CSCO-1028
`
`Cisco V. TQ Delta, IPR2016-01021
`
`Page 11 of 19
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 11 of 19
`
`

`

`Contents
`
`Contents
`
`13.1.2 RFC 1661 — The Point-To-Point Protocol
`13.2 FUNI over ADSL
`388
`13.2.1
`FUNI Frame Structure
`13.2.2
`Reference
`
`Encapsulation
`389
`
`389
`
`388
`
`387
`
`Chapter 14 ADSL in the Context of End-to-End Systems
`14.1 An Overview of a Generic DSL Architecture
`394
`14.1.1
`The Customer’s Premises
`394
`14.1.2
`14.1.3
`
`395
`The DSL Loop
`Termination ofDSL in the Carrier’s Central Office
`or Remote Site
`3.95
`The Carrier’s Back-End Data Network
`
`396
`
`14.1.4
`14.1.5
`
`The Interface to the Service Provider’s Network
`Potential ADSL Services and the Service Requirements
`
`391
`
`398
`398
`
`Specific Architectures for Deploying ADSL in Different
`Business Models
`399
`Several ADSL Architectures
`14.4.1
`14.4.2
`14.4.3
`14.4.4
`14.4.5
`14.4.6
`References
`
`423
`
`402
`
`A Packet—Based Architecture for Small Deployments
`ATM Access Networks
`403
`RFC 1483
`405
`PPP over ATM
`
`407
`
`402
`
`Tunneled Gateway Architecture
`PPP Terminated Aggregation
`410
`
`408
`40.9 -
`
`Chapter 15 Network Architecture and Regulation
`15.1
`Private Line
`411
`15.2
`Circuit Switched
`15.3
`Packet Switched
`ATM
`413
`' 15.4
`15.5
`15.6
`15.7
`
`4\14
`Remote Terminal
`Competitive Data Access Alternatives
`Regulation
`416
`
`414
`
`41 1
`412
`
`411
`
`Chapter 16 Standards
`16.1
`420
`ITU
`16.2 Committee T1
`16.3 ETSI
`
`421
`
`419
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 12 of 19
`
`

`

`
`
`CSCO-1028
`
`Cisco V. TQ Delta, IPR2016-01021
`
`Page 13 of 19
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 13 of 19
`
`

`

`
`
`CSCO-1028
`
`Cisco V. TQ Delta, IPR2016-01021
`
`Page 14 of 19
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 14 of 19
`
`

`

`d communica—
`
`leo) applications,
`luding micropro—
`in the mid-19905
`retwork exceeded
`:nt of DSLs began
`
`1portant, even for
`
`. During the 19805
`phone lines would
`of fiber fever argu-
`
`per transport would
`,d thereby delay the
`
`focused their fiber
`5 sites and to fiber—
`ners. When asked if
`"ADSL is an interim
`
`egarding who would
`at the
`
`:rformance, simplify
`
`to permit the cus—
`
`tomer the freedom to choose among many competitive providers of equipment. System develop-
`ment slowed because equipment designers did not know what features were required, equipment
`vendors did not know which sales channels to use, and telephone company engineers did not
`know who would be responsible for installation and maintenance. For basic rate ISDN in the
`United States, it was resolved that the customer—end transceiver would be owned by the cus-
`tomer. However, in many other countries the opposite resolution was reached. Either model can
`work, but only after the decision is firmly made.
`ADSL encountered a different regulatory quagmire: would the telephone companies offer
`ADSL as a regulated or unregulated service. The regulatory envirdnment in the United States
`made both alternatives equally unattractive, and worse yet was the prospect that the rules could
`change again at any time. Once again, the price paid for stimulating a competitive market was
`delaying the introduction of new services by nearly two years. With a market window of five
`years for some services, the chilling effect of regulation can easily cause innovators to become
`stodgy.
`
`rate per month. Services may be characterized in terms of guaranteed throughput and availabil—
`
`
`
`Applications
`
`/ D
`
`SL Fundamentals
`
`The success of a service (and its underlying technology) depends greatly on its price and
`its relation to available alternatives. Service price, in turn, depends greatly on the cost of equip-
`ment and labor costs for operation. Equipment and operating costs are reduced as the number of
`customers grows. Low-cost service is best achieved by establishing a service that addresses the
`most customers and minimizes additional infrastructure costs via use of existing facilities. For
`DSLs, additional transceiver circuitry that extends loop reach or enables additional applications
`may ultimately enable the reduction of service price by expanding the addressable market. A
`recurring theme in the field of DSLs is that the cost of additional capability in the transceiver
`yields greater savings from reduced operating costs, greater loop reach, or possible additional
`applications.
`
`1-9 Applications
`
`The first step in developing a technology or system is identification of the customers’ needs and
`their implications on functional requirements. End-user demand for products and services is
`driven by saving money, making money, accomplishing necessary tasks, saving time, and some-
`times the possession of a status symbol. TheSe demands are satisfied by applications: hardware
`and software that perform certain tasks for the user. An application is a package of hardware,
`software, and, in some cases, a network service that provides a solution to specific end customer
`needs. A service performs certain tasks, or provides certain capabilities, for which the customer
`(or someone else) pays for on a recurring basis (e.g., per use, or per month). In many cases, a
`Service may be used to support many applications. At the risk of circular reasoning, a service is
`something provided by a service provider, such as a telecommunications carrier company. The
`applications listed in the following tables apply to both public and private network services.
`The end user may be charged for a service per use, per minute of use, per byte, or a flat
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 15 of 19
`
`

`

`Gaussian. but the approximation is good enough for the tutorial purposes of this document.
`
`where T is the symbol period or time it takes to send each constellation point and H is defined
`below.
`When the points in the input signal distribution are not equally likely, as sometimes occurs
`with one—dimensional distribution of the samples entering the line with transmission methods
`like DMT, the entropy generalizes to
`
`Figure 7.21 ANSI T1.413 DMT transmitter.
`
`Clipping and Scaling (Peak-to-Average Issues)
`7.2.7
`Entropy is an information-theorctic quantity that is a generalization of data rate. In DSL,
`designers often use signal constellations where each point is equally likely to occur. If there are
`M equally likely points for each symbol, the entropy and the data rate are related easily by
`
`H log2(M)
`R = —
`T
`T
`
`bits/second
`
`(7 .92)
`
`H =
`
`p. 108297.)
`
`(7.93)
`
`which reduces to log2( M )if all points are equally likely with p]- : l/M.
`If viewed in the time domain as one—dimensional signals, the probability distribution Of
`multichannel signals approaches a Gaussian distribution through the (ab-) use of central-limit
`theorem arguments.12
`
`
`
`12.
`
`Actually, no discrete distribution ever truly becomes Gaussian, and there are always peak limits unlike the
`
`
`
`Chapter 7 - Intersymbol lnterterenee, Equalization, and DMT
`
`Constell
`-ation
`encoder
`and
`gain
`sealer
`
`IIIIIII
`
`ordering
`'fime
`
`0
`Trellis Input
`Dara flame k: 0 m 255
`
`
`
`2’“? a“
`na 09 processing
`
`|III
`
`III|
`
`E
`FEC Output
`Dara Flame
`
`
`
`Sync
`Control
`
`WWW P0”'”-
`
`A
`Mux
`Data Frame
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 16 of 19
`
`

`

`A clip is defined to occur when the transmit signal sample exceeds the maximum imple—
`mented value for the transmitter (often set by a digital-to—analog converter’s maximum value).
`This random event’s probability of course depends on the clip level. For a Gaussian distribution
`and a probability of clip of 10—7, the clip instantaneous power level is 14.2 dB higher than the
`average power of the signal. For a clip probability of 1075, this value reduces to 12.5 dB, and for
`10—3, the value is 10 dB. A reduction of a very large peak—to—average ratio (PAR) to a smaller
`one can reduce the complexity of a transmitter, especially reducing the power consumption of
`linear analog driver circuits.
`
`As an example, let us take an ADSL signal, as per T1413. The probability of a clip is
`about 10‘8 with the specified 15 dB PAR. Thus, at a sample rate of 2.208 MHZ, clips occur then
`at data rate 1078(2208 >< 10°) - [761,-], where [29],}, is the number of bits necessary to convey the size
`and position of the clip to the receiver, typically less than 20 bits. Thus, it would then take about
`0.5 bits/second to eliminate clips with PAR 2 15 dB, a very low data rate loss. This 0.5 bits/sec—
`ond is the entropy of the clip. Equivalently, if the clip occurs, in reality only 0.5 bits/second of
`data rate should be lost.
`'
`
`.
`
`‘Z‘
`
`t
`’
`
`This study of entropy summarizes the motivations of Wulich [49], and Ochiai and Imai
`[50], Davis and Jedwab [51], and Patterson [52], who all investigate the use of various coding
`methods that preclude the occurrence of data sequences that cause high PAR in OFDM transmis—
`sion. Such methods, unfortunately, seem to exhibit higher rate loss than necessary, largely to
`simplify implementation. Further study is necessary before any of these methods are applicable
`to DMT ADSL.
`
`eument.
`'
`-
`-
`5 Peak “mus “nuke
`
`th
`
`e
`
`7.2.7.1 Dynamic Clip Scaling
`Dynamic clip scaling [59] is an early proprietary clip—mitigation method used in some
`.
`.
`.
`.
`.
`.
`.
`.
`DMT DSLs. A Single tone is reserved for indication of a scale factor for the more symbol. This
`
`MW
`:e Equalization, and DMT
`Multichannel Line Codes
`
`Analog processing
`
`1 0f data rate' 1“ DSL’
`
`
`
`Indeed, ADSL modems could increase PAR significantly without noticeable reduction in
`the data rate. Even at a PAR of 10 dB, the loss in data rate, or the entropy of the clip, is still
`below 50 kbps, which is much less than the downstream data rates of 1.5 to 8 Mbps.
`A practical drawback is that to keep the additional data rate reduction small, a large buffer
`(memory) may be necessary, along with the consequent delay increase. If a transmitter first
`needs to compute a preliminary output to detect a clip and then redo this computation with a
`slightly altered bit stream to encode the clip instead of allowing it, the transmitter complexity
`can double. A similar doubling can occur at the receiver in first decoding the information to
`learn of the clip, reconstruct the large sample, and then decode again.
`Fortunately, a number of low—complexity and low-delay methods have been developed and
`are individually discussed in the next few subsections. The two Tellado methods, tone reduction
`[53] and tone injection [54], [55] (parts of which were independently found by Gatherer and P01-
`ley [56] and by Kschischang, Narula, and Eyuboglu [57]) are those that gain the most PAR
`reduction and appear strong candidates to be implemented in DSLs of the future (see Sections
`7.2.7.4 and 7.2.7.5). An upcoming book [66] has a chapter by M. Friese of Dcutsche Telekom
`devoted to PAR reduction methods (see Chapter 4).
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 17 of 19
`
`

`

`
`
`CSCO-1028
`
`Cisco V. TQ Delta, IPR2016-01021
`
`Page 18 of 19
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 18 of 19
`
`

`

`:e, Equalization, and DMT
`
`ecoding and is added
`: of a clip. The four
`3, —2 dB, and —3 dB;
`Usually 0 dB is sent,
`—1, —2 , or —3 is sent.
`will not cause another
`al back to its original
`
`:rease in noise is less
`scurred. This method
`
`:quires the transmitter
`.es combined with the
`
`l are discussed below.
`
`lity, it is very unlikely
`
`tear to have simulta—
`
`, [61], [62], which has
`ted mapping method
`e known transmit sub—
`
`ed) in a corresponding
`n a tone and/or part of
`re receiver then knows
`
`omplexity of the addi-
`ip to the nth power of
`resulting in a few dB
`peaks, i.e., the second
`
`Iuller and Huber [64]
`
`,t separates the DMT/
`phase rotation applied
`11 IFFTs are performed
`LIE added in a way that
`
`ups needs to be carried
`ese investigates a num-
`e PAR, in his work and
`
`
`Multichannel Line Codes
`239
`
`Verbin’s Method Another approach due to Verbin [67] instead makes use of the obser»
`vation that the sum of two cyclically prefixed sequences will produce at the channel output a
`sequence that corresponds to the sum of the two corresponding sets of parallel channels. Verbin
`then selects from up to 7 possible sums, each corresponding to essentially an orthogonal energy—
`preserving transformation, of the even and odd parts of the nominal channel input. The one with
`the smallest peak is transmitted (and again the receiver must be told which corresponding
`receiver transformation to use via a control channel like a single tone or the pilot). This method
`obtains about 2 dB improvement. To avoid complicating gain issues with the FEQ implementa—
`tion, Verbin selects orthogonal transformations that correspond to permuting the order of the
`subchannels at the output, but otherwise do not lead to interference between DFT outputs. This
`restriction is not necessary, but makes the receiver simpler. This method also causes a reduction
`in the probability of a peak roughly as the nth power of the clip probability, where n is the num-
`ber of transforms. However, the occurrence of secondary, tertiary peaks limits gain to about 2 to
`3 dB as Verbin shows [67]. This method is simpler than recomputing an entire IFFT for intro—
`duction of randomness.
`
`signature waveform. Indeed simple analog lowpass filtering can lead to loss of the PAR reduc-
`
`7.2.7.3 Gatherer/Policy Method
`The Gatherer/Polley (GP) method [56] represents a significant improvement on dynamic
`clip scaling and on all the randomized reencoding methods. First, this method does not require
`coordination between transmitter and receiver, a significant benefit becaUSe standardization is
`less relevant in this case, Second, no extra IFFT or transforms are necessary although there is
`hidden complexity in a search procedure.
`The GP method notes that tones are often unused in DMT (intentionally or because DMT
`turns them off). Some energy may be allocated to unused tones as desired as long as spectral
`mask constraints (and any power constraints) are met. A signal may be constructed correspond-
`ing to use of unused tones. Offline optimization of the possible inputs is done to find a time—
`domain signature waveform that has a large peak in it and is otherwise small at other time
`instants. Addition of the signature waveform to the transmitted DMT signal corresponds to
`insertion of energy on unused tones and does not increase intermodulation distortion. When a
`large peak is detected, the signature waveform is added to the transmit signal with negative
`amplitude to the peak to reduce the level to under the desired clip level. The signature waveform
`must be cyclically rotated into the position of the peak, but that corresponds only to a linear—
`phase change on the inputs of the unused tones (meaning it can be ignored by the receiver). Bet-
`ter signature waveforms require more unused tones and allow increasingly lower settings for the
`clip level. Gatherer and Policy have been able to reduce PAR by 3 dB using this method.
`One limitation is the possibility of generating new peaks elsewhere, and so the signature
`waveform may have to be added several times until acceptable peak level is obtained, thus limit-
`ing the reduction in PAR. Another caution is that peaks can be shifted to the receiver if only sub—
`channels that would not make it through the transmission Channel are used to generate the
`
`CSCO-1028
`Cisco v. TQ Delta, IPR2016-01021
`Page 19 of 19
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket